CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

NexSentry Imaging Solutions
M.B.A. II SEMESTER Course No. 208 Paper No. – XVI E-Business Dr.N.C.Dhande Unit II e-business frameworks e-selling process, e-buying, e-procurement, e-payments:
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Ecosystem Scenarios for Cloud-based NFC Payments
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Secure Communication Architectures.
ELECTRONIC PRODUCTS SUMMER SALES MEETING NEW AND ENHANCED PRODUCTS.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Remote Access Network Management Kelly Given Allison Traina.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Mobile POS & Fuel.
Digital Payment Systems
Intercard The Right System March 6, 2012 Alberto Borrero Vice-President, Int´l Marketing & Sales Intercard Mobile: Skype: aborrero
Public Key Infrastructure from the Most Trusted Name in e-Security.
Smart card – A BT perspective Libraries ATM access Catering & Vending Transit University campuses Passports/ID cards Electronics benefits transfer Access.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
Secure Electronic Transaction (SET)
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
Author: Ingelin Olsen Content Strategy- mission and vision Functionality Demo Summary.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Is Proud to Offer…. Everything You Could Wish For In Instant Card Issuance Security Speed Simplicity The Card Genie ™ System.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
All Rights Reserved, Swurv, secure gateway interoperable communication multidomain traffic system APPLICATION LAYER TECHNICAL DISCUSSION.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
TransArmorSM A Secure Transaction ManagementSM Solution
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Module 7: Configuring Terminal Services. Overview Describe how the components of Terminal Services work together Identify new Terminal Services core features.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
E-Payment Methods Fazal rehman shamil. 2001Daniel L. Silver2 Major Architectural Components of the Web Internet Browser Database Server Client 1 Server.
SMART CARDS Presented By Jishnu Sasikumar Reg No : 09 PG 142.
INTRODUCTION TO SIM.DLL AGENDA SIM.DLL Overview and Features SIM.DLL Requirements Supported Terminals Transaction Flow Benefits.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Mercury ™ Carwash Payment System. Fleet & Gift Cards MC300 MC310.
Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work at the POS? SafeProxy Merchant Anti FraudAnalytics First Data.
Identity and Access Management
Smart Money Concept.
practice-questions.html If you Are Thinking about your dumps? Introduction:
PREPARED BY: RUMMY MIRANDA
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Iserve – Bulk Cash Deposit Kiosk
Presentation transcript:

CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001

CLXMGCS.ppt USER / ISSUER BENEFITS Convenience Quicker transaction time Fraud reduction Multi-use capability On card loyalty Information Float and Breakage OVERALL BENEFITS Significant product differentiation Higher security Improves records/transaction accuracy More storage capacity Quicker accesses to data (off-line transaction) Can be more cost effective overall Why Smart Cards

CLXMGCS.ppt The Movie Gold Card System Is a Set of Hardware and Software Components That Work Seamlessly Together to Create a Transaction Platform for Loyalty and Stored Value

CLXMGCS.ppt CLX MG Cards We Can Deliver to You or to Your Customers Cards Printed With Almost Any Design Imaginable Movie Gold Cards

CLXMGCS.ppt Movie Gold Card Reader/Writers We Will Deliver to You or to Your POS Supplier Readers/Writers that are specifically designed for your system. Transaction Card Readers

CLXMGCS.ppt We license you free of charge the use of the Movie Gold Card Software for you to sub license to Your POS Supplier Movie Gold Card API Application Program Interfaces Movie Gold Card Middleware- API-OCX-Lib

CLXMGCS.ppt A Basic System Movie Gold Application Program Interfaces Theater's Management Information Systems T=0T=1T=14 Theater's Point of Sale Systems Movie Gold Card Middleware- API-OCX-Lib Transaction Card Readers Card File System Movie Gold Card System CardLogix Specially Formatted Smart Cards Chips

CLXMGCS.ppt Movie Gold Card System Architecture Components Users Authorization Devices (reader or terminal) The Internet or direct dial or tcp-ip Box office or Kiosk or ATM PCs with a reader or terminal POS Transaction Database Server Bank ATM Network Smart Card Individual Theater Complex Users Smart Card Home PC to Web Ticketing Site

CLXMGCS.ppt Secure Sign-on Options Architecture Components Users Authentication Methods Messaging Encryption Methods (Appliances) Authorization Devices User Name & Passwords Digital Certificates Authorization Components Non-Repudiation Methods Transaction Server Information Or Value In House or Third Party Certificate Authorities The Internet DES 3DES PPP Tunneling Movie Gold Customer Key System DES Authentication & RSA Key Exchange RSA Digital Signature Authorization Server Smart Card

CLXMGCS.ppt CardLogix Specially Formatted Smart Cards Chips System Lock Encryption Lock Internet Ticket Storage Dual Purse/Stored Value-Files Multilevel Security Features Two Customer Point Files Demographic Data Storage Transaction Log Secure Display Mechanisms Unique Theater Circuit ID System Unique Card ID System Card Issuance information In the Clear- Display Mechanisms Movie Gold Card Architecture

CLXMGCS.ppt Security by Design Features No ID #’s printed on the cards No source of semiconductor indicated- not indicated by Snooping All Cards have a read and write system passwords Individual Triple DES Encryption of value and data per card Bad card number file is executed through POS 100% guarantee of no Duplicate #s ever being produced All Software is tracked and managed with secure methodologies

CLXMGCS.ppt The System adds another revenue stream to operations Builds a bridge to customers Deliberate Focus On Enabling the Theater Owners Existing and future Systems Complete Cross Platform Interoperability Highest Security Available Highest Quality Available Why The CardLogix System