Digital Pen En 2008

629 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
629
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital Pen En 2008

  1. 1. Digital Pen Solutions Security Solutions & Services – SBL Enterprise - Architecture
  2. 2. Contents Contents Overview Technology Business Success cases 2 Security Solutions & Services – SBL Enterprise - Architecture
  3. 3. Overview Mobility – Anywhere at Anytime Breaking static links with the office, where the information systems are located. Optimization - improvement of business processes that require professional journey. Maximum usage of resources and investment in information systems Mobility – A good investment IT efficiency (13.7%) Implementation cost retrieved in 4,3 months Other cost ROI about 129% in the first year User reductions productivity (23.7%) (59.7%) Better quality of life of employees IT Productivity Costs reduction in remote access and laptops (3.0%) IDC - 2005 3 Security Solutions & Services – SBL Enterprise - Architecture
  4. 4. Technology – Mobile Forms General Vision System description Using a “normal” pen, with a high technology inside, whatever you write or draw can be sent to a PC or using a mobile phone through the Internet, to any web server local or remote. 4 Security Solutions & Services – SBL Enterprise - Architecture
  5. 5. Technology – the device Components: Digital Pens Unique code: user identification BluetoothTM Allow data transmitting Battery Memory Store coordinates, pressure, execution time, codes, etc. Processor Analyze images and establish stroke coordinates Camera Capture pattern photos Ink 5 Security Solutions & Services – SBL Enterprise - Architecture
  6. 6. Technology – The Paper Paper components Pattern Great points combination (2 raised to the power of 72). 6x6 points area gives a unique position. Establishment of pen position. It allows specific functions definition. It could be printed in a lot of surfaces. Almost invisible. It has a specific code for each application. 6 Security Solutions & Services – SBL Enterprise - Architecture
  7. 7. Technology – General Architecture THASH: Thales Application Source Handler THOR: Thales prOcessing Router 7 Security Solutions & Services – SBL Enterprise - Architecture
  8. 8. Technology - Security Security Unique pattern in all the word: Organization and application identification Pen unique code in all the word: User identification Previous sending pattern code and pen code identification It could be requested a PIN code before sending (using a mobile phone or a PC). Only strokes are the data which is sent. Only coordinates in a paper not related with the content semantic. Whatever is written or drawn could be encrypted “end-to-end” User could knows if his request had success, he could receive additional information (SMS, etc) 8 Security Solutions & Services – SBL Enterprise - Architecture
  9. 9. Business – Organizational Productivity Processes Processes optimization and cost reduction Current sending forms process: Send Delivery Receipt Data Fulfill Scan Recognize Validate Extraction FAX Sending Sending forms using Digital Pen: Data Fulfill Recognize Validate Extraction 9 Security Solutions & Services – SBL Enterprise - Architecture
  10. 10. Thales Offer Integration and components: Thales supplies a set of components and tools to cover all the steps in the lifecycle of Digital Pen applications development and deployment: Forms design and edition tools. Router applications to allow sending data through mobile phones or directly download into a PC platform. Data forms management components. Backend systems integration components Form printing systems and license management. Infrastructures: Thales supplies infrastructures management services derived from the solution: Hardware, basis software and server communications Mobile devices management software Related services: adding value to achieve a 360 service: Pens and paper licenses provisioning Centralized printing service Users and administrators training Helpdesk service Process consultancy Backend integration consultancy Change management Verification service of handwriting recognition 10 Security Solutions & Services – SBL Enterprise - Architecture
  11. 11. Success cases: example Technical Inspection of vehicles VB.NET technology for the router in PC. ASP.NET Server. ASP.NET validation web. 11 Security Solutions & Services – SBL Enterprise - Architecture
  12. 12. Success cases: example Gas Natural inspections Java technology of router in the mobile phone J2EE Server J2EE validation web 12 Security Solutions & Services – SBL Enterprise - Architecture
  13. 13. Thank you for your attention

×