SlideShare a Scribd company logo
www.acs.com.hk
1.   Product Overview
2.   Product Feature
3.   Product Value
4.   Comparison Chart
5.   Product Application
6.   Product Roadmap
7.   Q&A



                           2
3
ACOS5 Series (32KB EEPROM)
Cryptographic Smart Card and Token




     Module             Full-Sized Card   SIM-Sized Card   CryptoMate USB
                                                                Token


                                                                      4
5
High User Memory – 32KB !            ISO-7816 8 - contact module

                                      Strong Cryptographic Capabilities:
International Standard Compliance
                                      DES + 3DES + MAC + AES-128bits +
     —ISO 7816-1/2/3/4/8/9
                                       RSA-512,1024,2048 bits + Secure
                                                 Messaging
           Protocol T=0
                                      Fast communication speed: 9,600
                                         – 115,200 bps (switchable)
  File Structure: Supports Linear
   fixed record + Linear variable            Configurable ATR +
 record + Cyclic file + Transparent
                file                      Mutual Authentication w/
                                          Session Key Generation

                                                                       6
7
Time-to-market                            Ease of integration
Mask chip: shortens development & lead    Can be quickly used with PKCS-& CSP-
time                                      compliant software like Netscape,
                                          Mozilla, Internet Explorer and Outlook
                                          Express
Unrivaled Security
Complies with ISO standards
                                          High-speed card
                                          1.) Baud rate up to 115K bps
Perfect medium for PKI applications
                                          2.) Cryptographic processor
safeguarding your Certificate private &
public keys.                              Meet the growing need for high security
                                          smart card application

High Portability
                                          Strong Performance
Can be used on different machines
                                          1.) RSA-512 signature:
without compromising your security.
                                          62.5 ms (w/ CRT), 123.4 ms (w/o CRT)
                                          2.) RSA-1024 signature:
                                          193.9ms sec (w/CRT), 604.8ms (w/o CRT)
                                          3.) RSA-2048 signature:
                                          1081.2 ms (w/CRT)                         8
9
Category                    ACOS3             ACOS6-SAM   ACOS5
         Product Code          ACOS3-16   ACOS3-24/64    ACOS6-16   ACOS5-32

                                      Modules

ISO 7816 compliant 6-contact
module
ISO 7816 compliant 8-contact
module
                                Communication Speed

9,600 bps (default)

14,400 bps

28,800 bps

115,200 bps

223,200 bps




                                                                               10
Category                ACOS3               ACOS6-SAM   ACOS5
         Product Code    ACOS3-16       ACOS3-24/64    ACOS6-16   ACOS5-32

                                   EEPROM

User Memory (byte)         16K            24K/64K        16K        32K

                                 Configuration

Configurable ATR

Configurable Baud Rate

                                    Protocol

T=0

                                   Standard

ISO 7816 - 1/2/3

ISO 7816 - 4

ISO 7816 – 8/9




                                                                             11
Category                ACOS3               ACOS6-SAM   ACOS5
          Product Code         ACOS3-16     ACOS3-24/64    ACOS6-16   ACOS5-32

                                     File Systems

Directory File

Transparent (Binary) File

Linear Fixed Record

Linear variable Record

Cyclic File

                                     Security Keys

User, Admin & Application
Specified PIN Support
DES/3DES key x2

Customizable PIN & Key Codes




                                                                                 12
Category                  ACOS3                ACOS6-SAM   ACOS5
           Product Code      ACOS3-16     ACOS3-24/64      ACOS6-16   ACOS5-32

                             Cryptographic Capabilities

DES

3DES

MAC

AES-128 bits

RSA-512, 1024, 2048 bits

Secure Messaging

                                EEPROM Endurance

100,000 write/erase cycles

500,000 write/erase cycles

                                  Data Retention

10 years




                                                                                 13
Category                      ACOS3            ACOS6-SAM   ACOS5
          Product Code         ACOS3-16    ACOS3-24/64    ACOS6-16   ACOS5-32

                                     Applications

Customer Loyalty

Payment System

E-Purse

Network Security

Corporate Identity

Microsoft Windows Logon        Custom           Custom

PKI Application

Cryptographic Middleware
Layers CSP & PKCS#11
Security Access Module (SAM)




                                                                                14
15
PKI
                     Application   Corporate Security/
                                      Identification
Network Security
                                                         Payment system /
                                                             e-Purse




      Secure Email

                         Windows Logon           Physical Access
                            (Custom)                 Control
                                                                            16
17
for End Customers       For Developers
 (Enterprise Use)




CryptoMate Client Kit     ACOS5 SDK




                                         18
19
20
Apr 06   Jun 06   Sep 06                              Jan 08   Jun 08
ACOS3-   ACOS5-   ACOS5                               ACOS3-   ACOS3-
  16       32      SDK                                  24       64


          2006                        2007                2008          2009
                            ACOS5-USB                                   ACOS5-
                                          ACOS5-CTM
                               Token                                      64
                                             EVK
                           (CryptoMate)
                                                                        Q2 09



                                      Mar 07




                                                                                 21
22
Products           Description
ACOS5-32-GP       ACOS 32K bytes cryptographic
                  card (glossy PVC)
ACOS5-32-SIM-GP   ACOS 32K bytes cryptographic
                  SIM card (glossy PVC)
SDK-ACOS5         ACOS5 Software Development
                  Kit
ACOS5-CTM-R       CryptoMate USB Token,
                  RoHS -compliant
EVK-ACOS5-CTM     CryptoMate Client Kit




                                                 23
24

More Related Content

Viewers also liked

ACR38 product presentation by Advanced Card Systems Ltd.
ACR38 product presentation by Advanced Card Systems Ltd.ACR38 product presentation by Advanced Card Systems Ltd.
ACR38 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
ACR83 product presentation by Advanced Card Systems Ltd.
ACR83 product presentation by Advanced Card Systems Ltd.ACR83 product presentation by Advanced Card Systems Ltd.
ACR83 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
ACR38 Series PC-Linked Readers
ACR38 Series PC-Linked ReadersACR38 Series PC-Linked Readers
ACR38 Series PC-Linked Readers
Advanced Card Systems Ltd.
 
ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
ACR33U-A1 SMARTDuo PC-Linked Reader
ACR33U-A1 SMARTDuo PC-Linked ReaderACR33U-A1 SMARTDuo PC-Linked Reader
ACR33U-A1 SMARTDuo PC-Linked Reader
Advanced Card Systems Ltd.
 
ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
ACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCD
Advanced Card Systems Ltd.
 

Viewers also liked (9)

ACR38 product presentation by Advanced Card Systems Ltd.
ACR38 product presentation by Advanced Card Systems Ltd.ACR38 product presentation by Advanced Card Systems Ltd.
ACR38 product presentation by Advanced Card Systems Ltd.
 
ACR83 product presentation by Advanced Card Systems Ltd.
ACR83 product presentation by Advanced Card Systems Ltd.ACR83 product presentation by Advanced Card Systems Ltd.
ACR83 product presentation by Advanced Card Systems Ltd.
 
ACR38 Series PC-Linked Readers
ACR38 Series PC-Linked ReadersACR38 Series PC-Linked Readers
ACR38 Series PC-Linked Readers
 
ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.
 
AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.
 
ACR33U-A1 SMARTDuo PC-Linked Reader
ACR33U-A1 SMARTDuo PC-Linked ReaderACR33U-A1 SMARTDuo PC-Linked Reader
ACR33U-A1 SMARTDuo PC-Linked Reader
 
ACR89U Handheld Smart Card Reader
ACR89U Handheld Smart Card ReaderACR89U Handheld Smart Card Reader
ACR89U Handheld Smart Card Reader
 
ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.
 
ACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCDACR122L VisualVantage Serial NFC Reader with LCD
ACR122L VisualVantage Serial NFC Reader with LCD
 

Similar to ACOS5 product presentation by Advanced Card Systems Ltd.

Geepy roadmap 2017
Geepy roadmap 2017Geepy roadmap 2017
Geepy roadmap 2017
Eddie Velásquez
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
Bosch ACD-IC16K37-50 Data Sheet
Bosch ACD-IC16K37-50 Data SheetBosch ACD-IC16K37-50 Data Sheet
Bosch ACD-IC16K37-50 Data Sheet
JMAC Supply
 
Bosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data SheetBosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data Sheet
JMAC Supply
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
Arm
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllers
ardiri
 
Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server SpecificationsBloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server SpecificationsBloombase
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
SlingSecure Mobile Encryption
 
S32KBRA4.pdf
S32KBRA4.pdfS32KBRA4.pdf
S32KBRA4.pdf
AbinAV20
 
Light Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxLight Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptx
DineshBoobalan
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
ADVA
 
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Embarcados
 
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
TrustBearer
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
Tom Diederich
 
Creating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache PulsarCreating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache Pulsar
Karthik Ramasamy
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
Cisco Canada
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
Rebekah Rodriguez
 

Similar to ACOS5 product presentation by Advanced Card Systems Ltd. (20)

Scop 11nov2011
Scop   11nov2011Scop   11nov2011
Scop 11nov2011
 
Geepy roadmap 2017
Geepy roadmap 2017Geepy roadmap 2017
Geepy roadmap 2017
 
Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
Bosch ACD-IC16K37-50 Data Sheet
Bosch ACD-IC16K37-50 Data SheetBosch ACD-IC16K37-50 Data Sheet
Bosch ACD-IC16K37-50 Data Sheet
 
Bosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data SheetBosch ACD-IC2K37-50 Data Sheet
Bosch ACD-IC2K37-50 Data Sheet
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
Feasibility of Security in Micro-Controllers
Feasibility of Security in Micro-ControllersFeasibility of Security in Micro-Controllers
Feasibility of Security in Micro-Controllers
 
Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server SpecificationsBloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
Bloombase Spitfire KeyCastle Key Lifecycle Management Server Specifications
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 
S32KBRA4.pdf
S32KBRA4.pdfS32KBRA4.pdf
S32KBRA4.pdf
 
Light Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptxLight Weight Cryptography for IOT.pptx
Light Weight Cryptography for IOT.pptx
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
 
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
Oberthur's 2009 CTST presentation on Generic ID-Card Command Set (GICS)
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
 
Creating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache PulsarCreating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache Pulsar
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

ACOS5 product presentation by Advanced Card Systems Ltd.

  • 2. 1. Product Overview 2. Product Feature 3. Product Value 4. Comparison Chart 5. Product Application 6. Product Roadmap 7. Q&A 2
  • 3. 3
  • 4. ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module Full-Sized Card SIM-Sized Card CryptoMate USB Token 4
  • 5. 5
  • 6. High User Memory – 32KB ! ISO-7816 8 - contact module Strong Cryptographic Capabilities: International Standard Compliance DES + 3DES + MAC + AES-128bits + —ISO 7816-1/2/3/4/8/9 RSA-512,1024,2048 bits + Secure Messaging Protocol T=0 Fast communication speed: 9,600 – 115,200 bps (switchable) File Structure: Supports Linear fixed record + Linear variable Configurable ATR + record + Cyclic file + Transparent file Mutual Authentication w/ Session Key Generation 6
  • 7. 7
  • 8. Time-to-market Ease of integration Mask chip: shortens development & lead Can be quickly used with PKCS-& CSP- time compliant software like Netscape, Mozilla, Internet Explorer and Outlook Express Unrivaled Security Complies with ISO standards High-speed card 1.) Baud rate up to 115K bps Perfect medium for PKI applications 2.) Cryptographic processor safeguarding your Certificate private & public keys. Meet the growing need for high security smart card application High Portability Strong Performance Can be used on different machines 1.) RSA-512 signature: without compromising your security. 62.5 ms (w/ CRT), 123.4 ms (w/o CRT) 2.) RSA-1024 signature: 193.9ms sec (w/CRT), 604.8ms (w/o CRT) 3.) RSA-2048 signature: 1081.2 ms (w/CRT) 8
  • 9. 9
  • 10. Category ACOS3 ACOS6-SAM ACOS5 Product Code ACOS3-16 ACOS3-24/64 ACOS6-16 ACOS5-32 Modules ISO 7816 compliant 6-contact module ISO 7816 compliant 8-contact module Communication Speed 9,600 bps (default) 14,400 bps 28,800 bps 115,200 bps 223,200 bps 10
  • 11. Category ACOS3 ACOS6-SAM ACOS5 Product Code ACOS3-16 ACOS3-24/64 ACOS6-16 ACOS5-32 EEPROM User Memory (byte) 16K 24K/64K 16K 32K Configuration Configurable ATR Configurable Baud Rate Protocol T=0 Standard ISO 7816 - 1/2/3 ISO 7816 - 4 ISO 7816 – 8/9 11
  • 12. Category ACOS3 ACOS6-SAM ACOS5 Product Code ACOS3-16 ACOS3-24/64 ACOS6-16 ACOS5-32 File Systems Directory File Transparent (Binary) File Linear Fixed Record Linear variable Record Cyclic File Security Keys User, Admin & Application Specified PIN Support DES/3DES key x2 Customizable PIN & Key Codes 12
  • 13. Category ACOS3 ACOS6-SAM ACOS5 Product Code ACOS3-16 ACOS3-24/64 ACOS6-16 ACOS5-32 Cryptographic Capabilities DES 3DES MAC AES-128 bits RSA-512, 1024, 2048 bits Secure Messaging EEPROM Endurance 100,000 write/erase cycles 500,000 write/erase cycles Data Retention 10 years 13
  • 14. Category ACOS3 ACOS6-SAM ACOS5 Product Code ACOS3-16 ACOS3-24/64 ACOS6-16 ACOS5-32 Applications Customer Loyalty Payment System E-Purse Network Security Corporate Identity Microsoft Windows Logon Custom Custom PKI Application Cryptographic Middleware Layers CSP & PKCS#11 Security Access Module (SAM) 14
  • 15. 15
  • 16. PKI Application Corporate Security/ Identification Network Security Payment system / e-Purse Secure Email Windows Logon Physical Access (Custom) Control 16
  • 17. 17
  • 18. for End Customers For Developers (Enterprise Use) CryptoMate Client Kit ACOS5 SDK 18
  • 19. 19
  • 20. 20
  • 21. Apr 06 Jun 06 Sep 06 Jan 08 Jun 08 ACOS3- ACOS5- ACOS5 ACOS3- ACOS3- 16 32 SDK 24 64 2006 2007 2008 2009 ACOS5-USB ACOS5- ACOS5-CTM Token 64 EVK (CryptoMate) Q2 09 Mar 07 21
  • 22. 22
  • 23. Products Description ACOS5-32-GP ACOS 32K bytes cryptographic card (glossy PVC) ACOS5-32-SIM-GP ACOS 32K bytes cryptographic SIM card (glossy PVC) SDK-ACOS5 ACOS5 Software Development Kit ACOS5-CTM-R CryptoMate USB Token, RoHS -compliant EVK-ACOS5-CTM CryptoMate Client Kit 23
  • 24. 24