Designing a terminal Pavel Tuček 2010, FI MU. Introduction 1. Micropayment scheme 2. Environment 3. Types of terminals 4. Other parts of system 5. Future.

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

Computer Parts There are many parts that work together to make a computer work.
Troy Leach April 2012 The PCI Security Standards Council.
Ecosystem Scenarios for Cloud-based NFC Payments
Operating System.
Professor Michael J. Losacco CIS 1110 – Using Computers Introduction to Computers Chapter 1.
Mark Davis Missouri WIC Customer Service Manager (MIS/EBT) 2012 Missouri WIC Conference.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Essential Introduction to Computers. What is a Computer? An electronic device, operating under the control of instructions stored in its own memory, that.
Computer Basics 1 Computer Basic 1 includes two lessons:
Office 2003 Introductory Concepts and Techniques M i c r o s o f t CPTG104 Intro to Information Systems Dr. Hwang Essential Introduction to Computers.
E-Voting Machine - Design Presentation Group M1 Jessica Kim Chi Ho Yoon Jonathan Chiang Donald Cober Mon. Sept 8 Initial Design Secure Electronic Voting.
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
Present by : Juan José Foronda
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Server System. Introduction A server system is a computer, or series of computers, that link other computers or electronic devices together. They often.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
On-Line Information Systems Choice, Criteria and Design ESTELLA ADAMIDOU, ARISTEA – ALEXANDRA PRIGKOU MSc in Finance and Financial Information Systems.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Microsoft Office 2007 Essential Introduction to Computers.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Faculty of Computer & Information
OCS Systems On-Line Photocopy Accounting On-Line Print Accounting Track office printing and copying.
INFORMATION SYSTEM-SOFTWARE Topic: OPERATING SYSTEM CONCEPTS.
By Brian Sutherland and Chou Peter Hoang
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Systems that support electronically executed business transactions.
By: Victoria Cain CPU- the component of a computer system that PROCESSES basic operations of the system. Monitor- a cathode-ray tube used for display.
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
BUSINESS SOFTWARE SOLUTION. INTRODUCTION Joseph Chidubem Orjinta. President and Founder of Blualpha Nigeria Limited  B.Eng Computer Science and Engineering,
© 2016 Pearson Education, Inc. Appendix C Accounting Information Systems.
Lec.2: Computer HardwareLec.2: Computer Hardware Foundation year 1 Lecturer: Fatma El-Zahraa Mohamed Year: 2015/2016.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Computer Basics Mr. Chu MPHS CIS 1.
1 Advanced Operating Systems - Fall 2009 Lecture 2 – January 12, 2009 Dan C. Marinescu Office: HEC 439 B.
Computer Parts There are many parts that work together to make a computer work.
SECURE MICROPAYMENT SCHEME FOR NEWSPAPER SUBSCRIPTION Pay Per Article Dr. M. Sandirigama Fasna JF. Irfan MAM. Rishadhy MJM.
BMTS 242: Computer and Systems Lecture 1: Introduction to Computer System Yousef Alharbi Website
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Introduction To Computers
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
361 Hardware, Software, and Computer Performance Lec 2.
Vending machine monitoring system Industry&Business &Government IT transformation.
Introducing Networks and the Internet Mrs. Wilson Rocky Point High School.
Electronic Banking & Security Electronic Banking & Security.
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
 Input - A device, such as a keyboard, used to enter information into a computer  Output - Electronic or electromechanical equipment connected to.
Hardware Architecture
©2008 Woodcock Washburn LLP Basic Claim Drafting in Computer Systems Lance D. Reich Partner Woodcock Washburn LLP Seattle, Washington.
Smart Money Concept.
CS111 Computer Programming
Introduction to Cloud Computing
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
Identity Processor Secures IoT Systems
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
Purpose, functions and types of hardware including input, output, storage, processor and peripheral devices; definitions and examples; interaction between.
LO2 – Understand Computer Software
Networks Hardware.
Presentation transcript:

Designing a terminal Pavel Tuček 2010, FI MU

Introduction 1. Micropayment scheme 2. Environment 3. Types of terminals 4. Other parts of system 5. Future work 2 Pavel Tuček – PA168 – Own Talk

Micropayment scheme 3 Main participants: Pavel Tuček – PA168 – Own Talk

Environment for terminals 4 Pavel Tuček – PA168 – Own Talk

Types of terminals 5 Types of terminals should be as few as possible! But one type is not enough. Let’s split our micropayment scheme into two parts: 1.Broker’s relationship to users. 2.Broker’s relationship to vendors. Motivation for this step is increasing trustworthiness of the whole system. In case there will be only one terminal, users might doubt whether their communication with broker wasn’t monitored or even intercepted by the vendor. Pavel Tuček – PA168 – Own Talk

Types of terminals 6 Terminal type #1 – Broker’s terminal (BT) BT is intended to be the center for customer care at the vendor’s site, but managed by broker. This terminal must be online. Pavel Tuček – PA168 – Own Talk

Types of terminals 7 Terminal type #1 – Broker’s terminal (BT) BT is intended to be the center for customer care at the vendor’s site, but managed by broker. This terminal must be online. Functions depending on the payment scheme: user registration with broker, user certificate revocation by user upon key compromise. Other functions: money recharging, account management, creating transaction logs. Pavel Tuček – PA168 – Own Talk

Types of terminals 8 Terminal type #2 – Vendor’s terminal (VT) VT is intended to be connected to a device which needs to be served by it. That might be a printer, vending machines for hot and cold drinks, and snacks, etc. VT might be online or offline according to the vendor’s infrastructure, but it will be definitely offline considering the broker’s infrastructure. Functions depending on the payment scheme: item purchase by user at vendor. Pavel Tuček – PA168 – Own Talk

Types of terminals 9 Terminal type #2 – Vendor’s terminal (VT) Pavel Tuček – PA168 – Own Talk

Types of terminals 10 Terminal type #2 – Vendor’s terminal (VT) VT is intended to be connected to a device which needs to be served by it. That might be a printer, vending machines for hot and cold drinks, and snacks, etc. VT might be online or offline according to the vendor’s infrastructure, but it will be definitely offline considering broker’s infrastructure. Other functions: picking coin per transaction, sending coins to vendor’s management server (VMS), creating transaction logs, error logs,… sending data to VMS (transaction logs, errors,…). Pavel Tuček – PA168 – Own Talk

Terminals’ specifications 11 Hardware requirements: card reader, display, input device (pin pad/keyboard/display), CPU, memory (RAM/ROM/flash), network component (industry standards 1 /Wi- Fi/BT/GSM/none), management connection (if talking about offline terminal: industry standards/USB/Wi-Fi/BT), smart card or TPM, connection to the served device. 1 ANT, 6LoWPAN, DASH7, ONE-NET, ZigBee, MiWi, Wibree and others. Pavel Tuček – PA168 – Own Talk

Terminals’ specifications 12 There are several candidates for the main CPU, but we can divide them into to groups. Pavel Tuček – PA168 – Own Talk The x86 compatible CPUs (Intel Atom, AMD Athlon Neo, VIA Nano) ARM-based CPUs or more precisely SoCs (TI's OMAP 3 series and Freescale's i.MX51 based on the Cortex-A8 processor, or the Qualcomm Snapdragon and Marvell Armada 500/600 based on custom ARMv7 implementations) The main difference is in design, while x86 compatible CPUs are CISC, the ARM-based CPUs are RISC. This implies different size of chip (number of transistors) and it’s different power consumption.

Terminals’ specifications 13 Cryptographic requirements: certificate store, random number generator, SHA-2 family hash function, RSA algorithm, AES encryption. Pavel Tuček – PA168 – Own Talk

Other parts of system 14 Broker’s management server (BMS) BMS will be the management center for taking care of users and vendors. Most likely it will be an information system or a server application. Functions depending on the payment scheme: user certificate issuance by broker, vendor registration with broker, vendor certificate issuance by broker, user certificate revocation by broker, vendor certificate revocation by broker, vendor elimination from the system. Other functions: send data to all VMSs (broker’s blacklist,….) create transaction logs. Pavel Tuček – PA168 – Own Talk

Other parts of system 15 Vendor’s management server (VMS) VMS is intended to be the main center for the customer care at the vendor’s place. One of its purposes is the management function for all VMSs and the other is communication with BMS. VMS will be a computer/server with a special-purpose operating system. Functions depending on the payment scheme: item claim by user at vendor, vendor certificate revocation by vendor upon key compromise. Other functions: collecting coins from all VTs, sending coins to BMS for redemption, sending data to all VTs (broker’s blacklist, vendor’s blacklist,….), managing vendor’s blacklist, VT certificate issuance, creating transaction logs. Pavel Tuček – PA168 – Own Talk

Other parts of system 16 Mobile broker’s terminal (MBT) An application with similar or same functionality as the Broker’s terminal has. Application will be intended to use in mobile phones and personal computers equipped with smart card or smart card reader. Pavel Tuček – PA168 – Own Talk

Future work Layout of the terminal mainboard. 2. Connections of single components in the terminal. 3. Temper resistance of the terminal. 4. Certification of the terminal. 5. Broker’s and vendor’s management servers. 6. Running 3 rd party’s application in an untrustworthy environment. Pavel Tuček – PA168 – Own Talk

Questions Questions are appreciated! 18 Pavel Tuček – PA168 – Own Talk

Thanks Thank you for attention! 19 Pavel Tuček – PA168 – Own Talk