SlideShare a Scribd company logo
A Fortress for your Android Application

Jian Wang
Head of Technology, certgate
Business and the Mobile World

Agenda

   About certgate
   Mobile Security Solutions
   Android Security Concept
   certgate Mobile Application Protection Layer
   [Live Demonstration]
   Q&A




                                                   Slide 3
Business and the Mobile World

About certgate

 Mobile IT security innovator
 Founded in 2008, located in Nuremberg, Germany
 certgate is mastering the secure mobile IT device from
  hardware to application level
 Created the first microSD memory card with full
  smartcard capabilities, bringing hardware-based crypto
  functions to smartphones and tablets (Patent
  protected)


                                                     Slide 4
Business and the Mobile World

certgate Smartcard microSD




                                Slide 5
Business and the Mobile World

The Challenge

 Most businesses and administrations today
    • Either deploy smartphones and tablets to their employees
    • Or accept their employees to use their own devices for business
      purposes
 Those who don‘t do either have a reason:
    • They don‘t feel safe doing it
    • They would love to introduce new business models and
      applications like mobile e-D, payment, physical access and
      much, much more if only they COULD feel safe




                                                                   Slide 6
Business and the Mobile World

There Are Solutions on the Market

   Digital signing and encryption of emails with S/MIME
   Certificates stored in a fully-fledged (yet small-in-format) smartcard
   VPN Client requiring digital user authentication
   Banking client requiring digital user authentication and digital signature
   VoIP client creating session keys on the smartcard sitting inside the device




                                                                                   Slide 7
certgate – Use Cases
Secfone – Voice Encryption for Android




                          • Tap-proof worldwide voice communication
                          • Latest Android smartphones supported
                          • End-to-end encryption with hardware
                            protected keys
                          • Authenticates user by a privately or publicly
                            owned server – no data pass through the
                            server
                          • Directly integrates in fixed-line enterprise
                            communication
Slide 9                                                                     Version 11-05
certgate – Use Cases
TouchDown – Exchange Integration for Android




                         • Secure Exchange synchronization for Android
                           smartphones
                         • Consistent PKI integration of mobile devices
                         • Authentication and secure data transfer based
                           on hardware certificates
                         • S/MIME protection for your confidential data:
                           messages, contacts, appointments



Slide 10                                                              Version 11-05
certgate MAPL™ for Android

Here Is A New One




                             Slide 11
certgate MAPL™ for Android

Why Did We Do This In the First Place

   Protect confidential data on the device
   Protect an application against unauthorized users
   Provide security with minimal integration effort
   Qualify the device to fit the BYOD concept
   Enable surplus security functions by the same
    hardware token, e.g. S/MIME encryption and
    secure VoIP



                                                        Slide 12
certgate MAPL™ for Android

Android Security Overview

 The Application Sandbox
   •    Each application is assigned with a UID
   •    Each application is running as a user in a separate process
   •    IPC through Binder, Intents, Services, and Content Provider


 The Android Permission Model
   •    Permissions are GIDs
   •    Declared in the app’s Android manifest
   •    Need to be explicitly confirmed by the user


                                                                Slide 13
certgate MAPL™ for Android

Which Concerns Are Being Addressed?

 Extension of rights by „rooting“ the device:
  Allows free access to all system resources

 Shortcomings in platform specific knowledge:
  Process boundaries can be violated e.g. by Intents

 Limitations in cryptographical comprehension:
  Sub-optimal choice of algorithms and cipher modes and
  less than perfect implementation of same




                                                          Slide 14
certgate MAPL™ for Android

Different Cipher Modes




           Original         Encrypted                Encrypted
                         using CBC mode           using ECB mode

                           Picture: Larry Ewing                    Slide 15
certgate MAPL™ for Android

The Solution

 Mobile Application Protection Layer (MAPL)
  • No app execution without correct user PIN
  • Standard Android API
  • Transparent Encryption of Files and Database
  • Android SharedPreferences encryption
  • Tamper-proof key storage on cgCard™




                                                   Slide 16
certgate MAPL™ for Android

Solution Architecture




                    Application

                                                        Crypto Service
                 certgate MAPLTM         JCE Provider




         Database / File Access


                              Android Framework




                                                                         Slide 17
certgate MAPL™ for Android

Live Demo


 Howto: User Login
 Howto: Encrypt InternalStorage
 Howto: Encrypt SharedPreferences
 Howto: Encrypt Datenbank



                                     Slide 18
certgate MAPL™ for Android

Add MAPL library into your project




                                     Slide 19
certgate MAPL™ for Android

An example Android-Manifest




                              Slide 20
certgate MAPLTM for Android

Modification of your Android manifest file

 Using MAPL applikation class



 Set MAPL activity as your entry activity



 Declare your application entry activity



                                             Slide 21
certgate MAPLTM for Android

A MAPL ready Android manifest




                                Slide 22
certgate MAPL™ for Android

MAPL Effects


    Login:

                   Before:




                   After:




                             Slide 24
certgate MAPL™ for Android

What‘s In It For You?


                         certgate MAPL™ can be integrated
                          into virtually every app
                         Secure hardware element beats
                          every software approach by attack
                          resistance level
                         Powerful tool to really become
                          security policy compliant
                         Enables company-wide BYOD
                          practice



                                                         Slide 25
Thank you

Get MAPL now!




                mapl.certgate.com




                                    Slide 27

More Related Content

What's hot

M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Jan Vekemans
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
Samsung Biz Mobile
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Nok Nok Labs, Inc
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
Block Armour
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
Sarah Thomas
 
38
3838
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier PotonniĂŠe
 
Bkl_12_9_T_0515
Bkl_12_9_T_0515Bkl_12_9_T_0515
Bkl_12_9_T_0515
Bikrama Lenka
 
Kiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_LoiaconoKiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_Loiacono
Anthony Loiacono
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
Cisco Russia
 
NFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDKNFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDK
Salesforce Developers
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
InishTech
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
LeenVerleyen
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Block Armour
 
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup   17 dec 2014 - Bluemix and Watson OverviewParis Bluemix Meetup   17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
IBM France Lab
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Ping Identity
 
Nfc sfdc mobile_sdk
Nfc sfdc mobile_sdkNfc sfdc mobile_sdk
Nfc sfdc mobile_sdk
Cory Cowgill
 

What's hot (20)

M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
38
3838
38
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Bkl_12_9_T_0515
Bkl_12_9_T_0515Bkl_12_9_T_0515
Bkl_12_9_T_0515
 
Kiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_LoiaconoKiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_Loiacono
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
NFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDKNFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDK
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup   17 dec 2014 - Bluemix and Watson OverviewParis Bluemix Meetup   17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Nfc sfdc mobile_sdk
Nfc sfdc mobile_sdkNfc sfdc mobile_sdk
Nfc sfdc mobile_sdk
 

Viewers also liked

Mikrocontroller die qual der wahl
Mikrocontroller die qual der wahlMikrocontroller die qual der wahl
Mikrocontroller die qual der wahl
Conrad
 
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
OM Latam
 
5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)
Emagister
 
সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।
Ilyas Qadri Ziaee
 
Inf b (3)
Inf b (3)Inf b (3)
Inf b (3)
pele13
 
Proyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras EdelnorProyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras Edelnor
guestdbd872
 
Nourish The People
Nourish The PeopleNourish The People
Nourish The People
Pablo Balderrabano
 
Rates_Program_Documentation
Rates_Program_DocumentationRates_Program_Documentation
Rates_Program_Documentation
John Kraus, MS, MBA, CFA, MS
 
Ap 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaoAp 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chao
cc50043
 
JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)
Julius Cabiling
 
Social Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoSocial Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research Demo
Leslie Hammersmith
 
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
Laborum PerĂş
 
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood MasoSmithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
Embajada de EE.UU. en el PerĂş
 
Memoria cientĂ­fica IACS 2010
Memoria cientĂ­fica IACS 2010Memoria cientĂ­fica IACS 2010
Memoria cientĂ­fica IACS 2010
Instituto AragonĂŠs de Ciencias de la Salud - IACS
 
2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad
Ismerai Ochoa Rodriguez
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Dell World
 
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
SCORE Atlanta
 
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Reydick D Balucan
 
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAPMichael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
SAP LatinoamĂŠrica
 

Viewers also liked (20)

Expo joc-6-lexic-escola-1
Expo joc-6-lexic-escola-1Expo joc-6-lexic-escola-1
Expo joc-6-lexic-escola-1
 
Mikrocontroller die qual der wahl
Mikrocontroller die qual der wahlMikrocontroller die qual der wahl
Mikrocontroller die qual der wahl
 
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
 
5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)
 
সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।
 
Inf b (3)
Inf b (3)Inf b (3)
Inf b (3)
 
Proyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras EdelnorProyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras Edelnor
 
Nourish The People
Nourish The PeopleNourish The People
Nourish The People
 
Rates_Program_Documentation
Rates_Program_DocumentationRates_Program_Documentation
Rates_Program_Documentation
 
Ap 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaoAp 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chao
 
JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)
 
Social Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoSocial Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research Demo
 
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
 
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood MasoSmithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
 
Memoria cientĂ­fica IACS 2010
Memoria cientĂ­fica IACS 2010Memoria cientĂ­fica IACS 2010
Memoria cientĂ­fica IACS 2010
 
2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
 
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
 
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAPMichael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
 

Similar to Certgate

VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
Grafic.guru
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
sierradeveloper
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
Satheesh Kumar V
 
Mind the gap
Mind the gapMind the gap
Mind the gap
Pietro F. Maggi
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM France Lab
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
Edge AI and Vision Alliance
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
Droidcon Berlin
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015
Marco Pozzato
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
Dan MĂĽrtensson
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon Berlin
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Droidcon Berlin
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
VASCO Data Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
patmisasi
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 

Similar to Certgate (20)

VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 

More from Droidcon Berlin

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
Droidcon Berlin
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
Droidcon Berlin
 
crashing in style
crashing in stylecrashing in style
crashing in style
Droidcon Berlin
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
Droidcon Berlin
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in ux
Droidcon Berlin
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
Droidcon Berlin
 
droidparts
droidpartsdroidparts
droidparts
Droidcon Berlin
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
Droidcon Berlin
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetization
Droidcon Berlin
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
Droidcon Berlin
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
Droidcon Berlin
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
Droidcon Berlin
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkraussDroidcon Berlin
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
Droidcon Berlin
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
Droidcon Berlin
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
Droidcon Berlin
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
Droidcon Berlin
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
Droidcon Berlin
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
Droidcon Berlin
 

More from Droidcon Berlin (20)

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
 
crashing in style
crashing in stylecrashing in style
crashing in style
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in ux
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
 
droidparts
droidpartsdroidparts
droidparts
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetization
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkrauss
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 

Recently uploaded

High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 

Recently uploaded (20)

High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 

Certgate

  • 1. A Fortress for your Android Application Jian Wang Head of Technology, certgate
  • 2. Business and the Mobile World Agenda  About certgate  Mobile Security Solutions  Android Security Concept  certgate Mobile Application Protection Layer  [Live Demonstration]  Q&A Slide 3
  • 3. Business and the Mobile World About certgate  Mobile IT security innovator  Founded in 2008, located in Nuremberg, Germany  certgate is mastering the secure mobile IT device from hardware to application level  Created the first microSD memory card with full smartcard capabilities, bringing hardware-based crypto functions to smartphones and tablets (Patent protected) Slide 4
  • 4. Business and the Mobile World certgate Smartcard microSD Slide 5
  • 5. Business and the Mobile World The Challenge  Most businesses and administrations today • Either deploy smartphones and tablets to their employees • Or accept their employees to use their own devices for business purposes  Those who don‘t do either have a reason: • They don‘t feel safe doing it • They would love to introduce new business models and applications like mobile e-D, payment, physical access and much, much more if only they COULD feel safe Slide 6
  • 6. Business and the Mobile World There Are Solutions on the Market  Digital signing and encryption of emails with S/MIME  Certificates stored in a fully-fledged (yet small-in-format) smartcard  VPN Client requiring digital user authentication  Banking client requiring digital user authentication and digital signature  VoIP client creating session keys on the smartcard sitting inside the device Slide 7
  • 7. certgate – Use Cases Secfone – Voice Encryption for Android • Tap-proof worldwide voice communication • Latest Android smartphones supported • End-to-end encryption with hardware protected keys • Authenticates user by a privately or publicly owned server – no data pass through the server • Directly integrates in fixed-line enterprise communication Slide 9 Version 11-05
  • 8. certgate – Use Cases TouchDown – Exchange Integration for Android • Secure Exchange synchronization for Android smartphones • Consistent PKI integration of mobile devices • Authentication and secure data transfer based on hardware certificates • S/MIME protection for your confidential data: messages, contacts, appointments Slide 10 Version 11-05
  • 9. certgate MAPL™ for Android Here Is A New One Slide 11
  • 10. certgate MAPL™ for Android Why Did We Do This In the First Place  Protect confidential data on the device  Protect an application against unauthorized users  Provide security with minimal integration effort  Qualify the device to fit the BYOD concept  Enable surplus security functions by the same hardware token, e.g. S/MIME encryption and secure VoIP Slide 12
  • 11. certgate MAPL™ for Android Android Security Overview  The Application Sandbox • Each application is assigned with a UID • Each application is running as a user in a separate process • IPC through Binder, Intents, Services, and Content Provider  The Android Permission Model • Permissions are GIDs • Declared in the app’s Android manifest • Need to be explicitly confirmed by the user Slide 13
  • 12. certgate MAPL™ for Android Which Concerns Are Being Addressed?  Extension of rights by „rooting“ the device: Allows free access to all system resources  Shortcomings in platform specific knowledge: Process boundaries can be violated e.g. by Intents  Limitations in cryptographical comprehension: Sub-optimal choice of algorithms and cipher modes and less than perfect implementation of same Slide 14
  • 13. certgate MAPL™ for Android Different Cipher Modes Original Encrypted Encrypted using CBC mode using ECB mode Picture: Larry Ewing Slide 15
  • 14. certgate MAPL™ for Android The Solution  Mobile Application Protection Layer (MAPL) • No app execution without correct user PIN • Standard Android API • Transparent Encryption of Files and Database • Android SharedPreferences encryption • Tamper-proof key storage on cgCard™ Slide 16
  • 15. certgate MAPL™ for Android Solution Architecture Application Crypto Service certgate MAPLTM JCE Provider Database / File Access Android Framework Slide 17
  • 16. certgate MAPL™ for Android Live Demo  Howto: User Login  Howto: Encrypt InternalStorage  Howto: Encrypt SharedPreferences  Howto: Encrypt Datenbank Slide 18
  • 17. certgate MAPL™ for Android Add MAPL library into your project Slide 19
  • 18. certgate MAPL™ for Android An example Android-Manifest Slide 20
  • 19. certgate MAPLTM for Android Modification of your Android manifest file  Using MAPL applikation class  Set MAPL activity as your entry activity  Declare your application entry activity Slide 21
  • 20. certgate MAPLTM for Android A MAPL ready Android manifest Slide 22
  • 21. certgate MAPL™ for Android MAPL Effects Login: Before: After: Slide 24
  • 22. certgate MAPL™ for Android What‘s In It For You?  certgate MAPL™ can be integrated into virtually every app  Secure hardware element beats every software approach by attack resistance level  Powerful tool to really become security policy compliant  Enables company-wide BYOD practice Slide 25
  • 23. Thank you Get MAPL now! mapl.certgate.com Slide 27