JAVA CARD

Prepared by : Jakasaniya Ravi
Roll no : MCA13
CONTENTS










Introduction
History
What is Java Card
Architecture
Working
Applications
Challenges
Conclusion
INTRODUCTION


Java Card refers to a technology that allows javabased applications(applets)to be run securely on
smart cards and similar small memory footprint
devices.



Java Card gives the user ability to program the
device and make them application specific.



The Java Card is an extremely secure Javapowered electronic token.



Java Card could have a number of real-world
applications.
HISTORY
YEAR

VERSION

1996

FUNCTIONALITY
Introduction of Java Card technology

1997

Java Card 2.0

Technology Foundations

1999

Java Card 2.1

Interoperable File Format

2000

Java Card
2.1.1

Additional Crypto APIs

2002

Java Card 2.2

Next gen crypto ,memory management

2003

Java Card
2.2.1

Enhancements for USIM

2006

Java Card
2.2.2

Contactless

2008

Java Card 3.0

“Classic ” and “Connected”
WHAT IS JAVA CARD?
A

programmable smart card

 A multi-application

 An

smart card

interoperable smart card

 A smart

card for secure application loading
ARCHITECTURE
JAVA CARD ARCHITECTURE
- HARDWARE


64 KB ROM



32 KB EEPROM



28 KB available for the customer



2 KB RAM



Slow and simple microprocessor(8-bit)
WORKING
APPLICATION AREAS

Financial
• Smart Credit / Debit
• E-Purses
• Loyalty Programs

Mobile Communication
• Infotainment
• Business Support
• Network Optimizers
CHALLENGES


Java cards have very restricted resources
1.Limited Memory
2.Limited Computing Power
 Java Card doesn’t support some of java features
1.Large primitive data types : long, double,
float
2.char,string
3.Multidimensional array
4.Dynamic class loading
5.Garbage collection
6.Multithreading
7.Object Cloning
CONCLUSION


The java card adds a new platform to the world of
java.
 Java card is a significant step forward.
 Realistic threats exist also for java card.
 Off-card verification is more risky than it seems.
 Java card issuers to counter act the threats.
 Java card security is attainable.
THANK YOU

Java card

  • 1.
    JAVA CARD Prepared by: Jakasaniya Ravi Roll no : MCA13
  • 2.
    CONTENTS         Introduction History What is JavaCard Architecture Working Applications Challenges Conclusion
  • 3.
    INTRODUCTION  Java Card refersto a technology that allows javabased applications(applets)to be run securely on smart cards and similar small memory footprint devices.  Java Card gives the user ability to program the device and make them application specific.  The Java Card is an extremely secure Javapowered electronic token.  Java Card could have a number of real-world applications.
  • 4.
    HISTORY YEAR VERSION 1996 FUNCTIONALITY Introduction of JavaCard technology 1997 Java Card 2.0 Technology Foundations 1999 Java Card 2.1 Interoperable File Format 2000 Java Card 2.1.1 Additional Crypto APIs 2002 Java Card 2.2 Next gen crypto ,memory management 2003 Java Card 2.2.1 Enhancements for USIM 2006 Java Card 2.2.2 Contactless 2008 Java Card 3.0 “Classic ” and “Connected”
  • 5.
    WHAT IS JAVACARD? A programmable smart card  A multi-application  An smart card interoperable smart card  A smart card for secure application loading
  • 6.
  • 7.
    JAVA CARD ARCHITECTURE -HARDWARE  64 KB ROM  32 KB EEPROM  28 KB available for the customer  2 KB RAM  Slow and simple microprocessor(8-bit)
  • 8.
  • 9.
    APPLICATION AREAS Financial • SmartCredit / Debit • E-Purses • Loyalty Programs Mobile Communication • Infotainment • Business Support • Network Optimizers
  • 10.
    CHALLENGES  Java cards havevery restricted resources 1.Limited Memory 2.Limited Computing Power  Java Card doesn’t support some of java features 1.Large primitive data types : long, double, float 2.char,string 3.Multidimensional array 4.Dynamic class loading 5.Garbage collection 6.Multithreading 7.Object Cloning
  • 11.
    CONCLUSION  The java cardadds a new platform to the world of java.  Java card is a significant step forward.  Realistic threats exist also for java card.  Off-card verification is more risky than it seems.  Java card issuers to counter act the threats.  Java card security is attainable.
  • 12.