JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.

Slides:



Advertisements
Similar presentations
Good Morning! Data Access Worldwide welcomes you to WEB POWER 2000!
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Netcentives Inc. 475 Brannan St. San Francisco, CA NASDAQ: NCNT Netcentives Inc. 475 Brannan St. San Francisco,
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Single view of customer Support deposit and loan accounts Fully integrated General Ledger module that can be customised according to customer specification.
Objectives In this session, you will learn to:
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
8.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
EGEMS A Dedicated Web Based System for Ground Water Data Processing Analysis and Storage.
eFueloil information systems Applications Prof. Dr.Mohamed El-Azab
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
CSCI 6962: Server-side Design and Programming
Real Security InterSwyft Technical information's.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Session 11: Security with ASP.NET
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Architecture of the R/3 System Chapter 14 C & L Chapter 8 M & W.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Chapter 13 – Network Security
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Database Application Security Models Database Application Security Models 1.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Part II - Microsoft ® Project 2000 Enterprise Deployment Templates.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
European Laboratory for Particle Physics NICE NT Web Services Alberto Di Meglio CERN IT/DIS/NCS.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
An Enterprise Computer Architecture ASIG – Sept 12, 2001.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
WEB SERVER SOFTWARE FEATURE SETS
The business logic engine for Microsoft IIS Speaker T.M. Arnett.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Business Applications– Using Java _____ Presented by Priya Saha.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Server Concepts Dr. Charles W. Kann.
Goals Introduce the Windows Server 2003 family of operating systems
Introduction to Databases Transparencies
RKL Remote key loading.
Serpil TOK, Zeki BAYRAM. Eastern MediterraneanUniversity Famagusta
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
Unit 8 Network Security.
Electronic Payment Security Technologies
Web Servers (IIS and Apache)
Presentation transcript:

JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly for financial market. –Areas of specializations –Platforms: Windows (95, NT, 2000,2003); –Technical expertise: MSSQL Server, Sybase, Oracle, C, C++, Visual C++/Basic/C#, MS Interdev, ASP, IIS, BC++, Delphi. Microsoft business partner (product integration partnership member) Compaq/HP business partner

System Security The most advanced security systems used nowadays : Public Key Infrastructure –SSL 3; –RSA public keys modulo 1024 bits; –Sha1 algorithm for thumbprint; –Digital Certificates (with time stamp); –Dynamic key exchange; –128 bits – Cipher Strength; –Client and Bank authentification … so we know with whom we talk and you also … Network protocol separation; SQL Protection steps

The Concept of Three - Tier Architecture Benefits –Common interface to heterogeneous data stores; –Software and hardware scalability without affecting system performance; –System reliability and maintainability; –Increased data security; –Business logic sharing. Application Server Data Logic Business Logic Web based forms Data Stores Used by our Internet Service

Internet Banking Architecture Browser Bank’s Database Web Servers BackOffice Application Customer databases SQL Servers BackOffice Database : Clients

Data flow One information unit named “electronic message”; –flexible structure with pairs; –easy and fast transfer; Two-phase data transfer; –Import of incoming messages from customer database; –Export of outgoing messages from bank’s database system; Flow control and monitoring done by BackOffice application.

Presentation layer Only an Internet browser is required; Enhanced security mechanism through Secured Socket Layer protocol; Dynamic Web pages through DHTML and ASP technology; Full customization. BrowserWeb Server request URL Web page Customer database SQL query Query results

Business layer Provides services to the presentation and data layers –Bi-directional transfer of electronic messages; –Deployment of basic banking information to customer database; –Customer registration and access control; Enforces customer business rules –Data checking and validation; –Signature mechanism for customer operations; Enforces bank business rules –Data checking and validation; –Acceptance mechanism for customer transactions; –Translate transaction data to and from specific formats. Bank SideBackOffice ApplicationCustomer side

Electronic Message Processing Logic Chain of states to control message evolution –Uncompleted : not successfully transferred; –Unprocessed : completely imported; –Refused by user : rejected by authorized bank personnel; –Accepted : accepted by authorized bank personnel; –Refused by app : not successfully processed; –Transferred : successfully processed; Special authorized mechanism to change manually message status ; Configurable mask of valid states for a message.

Internet Banking Conclusions Full access to bank services with minimum hardware and software configuration for customer; Total location independence for the customers; Maximum security through access control, encryption and authentication; Customizable application core; Customizable user interface through Web power.