SlideShare a Scribd company logo
1 of 18
Presented by:
SAMIKSHA SHRUTI
CS 3rd year ‘a’
1241610086
CONTENTS
 Introduction
 History of Java Card
 What is Java Card
 Architecture of Java Card
 Working of Java Card
 Applications of Java Card
 Challenges in Java Card
 Conclusion
INTRODUCTION
 Java Card refers to a technology that allows java-based
applications(applets)to be run securely on smart cards and similar
small memory footprint devices.
 Java Card gives the user ability to program the device and make them
application specific.
 The Java Card is an extremely secure Java-powered electronic token.
 Java Card could have a number of real-world applications.
YEAR VERSION FUNCTIONALITY
1996 Introduction of Java Card technology
1997 Java Card 2.0 Technology Foundations
1999 Java Card 2.1 Interoperable File Format
2000 Java Card
2.1.1
Additional Crypto APIs
2002 Java Card 2.2 Next gen crypto ,memory management
2003 Java Card
2.2.1
Enhancements for USIM
2006 Java Card
2.2.2
Contactless
2008 Java Card 3.0 “Classic ” and “Connected”
HISTORY OF JAVA CARD
JAVA CARD
What is a Java Card?
Simple Answer:
A programmable smart card
A multi-application smart card
A smart card for secure application loading
Java+Card=Java card
Adoption of Java platform for usage on Smart cards.
Java Cards are Smart!
How??
 They store and process Information
 Smart Cards can be used to add
authentication and secure access to
information systems that require a high
level of security
ARCHITECTURE
8
Elements of Java Card Application:
A complete Java Card application consists of :
a back-end application
a host (off-card) application
an interface device (card reader )
the on-card applet
user credentials
and supporting software
WORKING
10
The Back-End Application and Systems
Provide connectivity to security systems
Example:
In an electronic payment system, the back-end
application could provide access to credit card
and other payment information
11
The Reader-Side
Consists of two parts:
Host Application
Card Acceptance Device
Think of a bank machine:
Host Application as the Computer that provides
interaction with the system
Card Acceptance Device being where you put your debit
card in
12
The Card-Side
Elements:
One or more Java Applets
Card’s operating System
Java Card Runtime
Environment(JCRE)
◦ Java Card Virtual Machine
◦ Java Card Framework and APIs
DEVELOPING A JAVA CARD APPLET
1.Write the Java source
2.Compile your source
3.Convert the class files into a
Converted Applet (CAP)
file(Binary representation of
Classes & interfaces)
4.Verify that the CAP is valid
5.Install the CAP file
APPLICATION AREAS
Financial
• Smart Credit / Debit
• E-Purses
• Loyalty Programs
Mobile Communication
• Infotainment
• Business Support
• Network Optimizers
Advantages
•Interoperable
•Secure
•Multi-Application capable
•Dynamic
•Compatible with existing standards
•Hardware Independence
CHALLENGES
Java cards have very restricted resources
1.Limited Memory
2.Limited Computing Power
Java Card doesn’t support some of java features
1.Large primitive data types : long, double, float
2.char,string
3.Multidimensional array
4.Dynamic class loading
5.Garbage collection
6.Multithreading
7.Object Cloning
CONCLUSION
•Java Card and other flavors of Java will open new markets
•Java Card Technology defines a run time environment that
supports the smart card memory, communication, security and
application execution model.
•Java Card Technology fits java system software in a smart card
while conserving enough space for applications.
•Java Card mitigates some risks associated with Java such as
dynamic class loading
THANK YOU

More Related Content

What's hot

Arduino based health monitoring system
Arduino based health monitoring systemArduino based health monitoring system
Arduino based health monitoring systemYousuf Shaikh
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking SystemMd Kafiul Islam
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Robert Grossman
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Student information chatbot final report
Student information chatbot  final report Student information chatbot  final report
Student information chatbot final report jaysavani5
 
Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Silverlight
SilverlightSilverlight
SilverlightBiTWiSE
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 

What's hot (20)

IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Arduino based health monitoring system
Arduino based health monitoring systemArduino based health monitoring system
Arduino based health monitoring system
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Presentation slides on Child Tracking System
Presentation slides on Child Tracking SystemPresentation slides on Child Tracking System
Presentation slides on Child Tracking System
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Student information chatbot final report
Student information chatbot  final report Student information chatbot  final report
Student information chatbot final report
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Women security application
Women security applicationWomen security application
Women security application
 
Iot lab manual new
Iot lab manual newIot lab manual new
Iot lab manual new
 
Silverlight
SilverlightSilverlight
Silverlight
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Seminar on isphere
Seminar on isphereSeminar on isphere
Seminar on isphere
 

Viewers also liked

Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java CardAnshuman Sinha
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element SolutionsUgo Chirico
 
Eric java card-basics-140314
Eric java card-basics-140314Eric java card-basics-140314
Eric java card-basics-140314Eric Vétillard
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java CardJulien SIMON
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web ApplicationsOlivier Potonniée
 
IoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutionsIoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutionsEric Larcheveque
 
Session 06 – particle materials
Session 06 – particle materialsSession 06 – particle materials
Session 06 – particle materialsTrí Bằng
 

Viewers also liked (20)

Java card technology
Java card technologyJava card technology
Java card technology
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java Card
 
Java card
Java cardJava card
Java card
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Secure Element Solutions
Secure Element SolutionsSecure Element Solutions
Secure Element Solutions
 
Eric java card-basics-140314
Eric java card-basics-140314Eric java card-basics-140314
Eric java card-basics-140314
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java Card
 
FIPS 201 / PIV
FIPS 201 / PIVFIPS 201 / PIV
FIPS 201 / PIV
 
Javacardtech
JavacardtechJavacardtech
Javacardtech
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
 
Smart Cards Evolution
Smart Cards EvolutionSmart Cards Evolution
Smart Cards Evolution
 
IoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutionsIoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutions
 
Fogscreen
FogscreenFogscreen
Fogscreen
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Session 06 – particle materials
Session 06 – particle materialsSession 06 – particle materials
Session 06 – particle materials
 
cv shahil
cv shahilcv shahil
cv shahil
 
MUSIK
MUSIKMUSIK
MUSIK
 

Similar to Javacard

JAVA CARD BY SAIKIRAN PANJALA
JAVA CARD BY SAIKIRAN PANJALAJAVA CARD BY SAIKIRAN PANJALA
JAVA CARD BY SAIKIRAN PANJALASaikiran Panjala
 
Study of Java Card and its Application
Study of Java Card and its ApplicationStudy of Java Card and its Application
Study of Java Card and its Applicationeditor1knowledgecuddle
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Julien SIMON
 
Java Card Security
Java Card SecurityJava Card Security
Java Card SecurityRiscure
 
jCardSim – Java Card is simple!
jCardSim – Java Card is simple!jCardSim – Java Card is simple!
jCardSim – Java Card is simple!Mikhail Dudarev
 
Java Card Technology: The Foundations of NFC
Java Card Technology: The Foundations of NFCJava Card Technology: The Foundations of NFC
Java Card Technology: The Foundations of NFCEric Vétillard
 
PlaySIM Project Java One 2009
PlaySIM Project Java One 2009PlaySIM Project Java One 2009
PlaySIM Project Java One 2009Sebastian Hans
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future KingKapil Sachdeva
 
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment systemParag Tamhane
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam崇倍 洪
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitiesYiannis Hatzopoulos
 
Blackberry Development Environment
Blackberry Development EnvironmentBlackberry Development Environment
Blackberry Development EnvironmentPredhin Sapru
 
Utsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiy
Utsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiyUtsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiy
Utsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiyUtsab Sarkar
 

Similar to Javacard (20)

JAVA CARD BY SAIKIRAN PANJALA
JAVA CARD BY SAIKIRAN PANJALAJAVA CARD BY SAIKIRAN PANJALA
JAVA CARD BY SAIKIRAN PANJALA
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Study of Java Card and its Application
Study of Java Card and its ApplicationStudy of Java Card and its Application
Study of Java Card and its Application
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)
 
Java card
Java card Java card
Java card
 
java Ring
java Ringjava Ring
java Ring
 
java-ring
 java-ring java-ring
java-ring
 
Java Card Security
Java Card SecurityJava Card Security
Java Card Security
 
jCardSim – Java Card is simple!
jCardSim – Java Card is simple!jCardSim – Java Card is simple!
jCardSim – Java Card is simple!
 
Java Card Technology: The Foundations of NFC
Java Card Technology: The Foundations of NFCJava Card Technology: The Foundations of NFC
Java Card Technology: The Foundations of NFC
 
PlaySIM Project Java One 2009
PlaySIM Project Java One 2009PlaySIM Project Java One 2009
PlaySIM Project Java One 2009
 
New Ring
New RingNew Ring
New Ring
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future King
 
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment system
 
Internet banking
Internet bankingInternet banking
Internet banking
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
 
JavaAndNetBeans.pdf
JavaAndNetBeans.pdfJavaAndNetBeans.pdf
JavaAndNetBeans.pdf
 
Blackberry Development Environment
Blackberry Development EnvironmentBlackberry Development Environment
Blackberry Development Environment
 
Utsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiy
Utsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiyUtsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiy
Utsab sarkar - CSSA certified PEGA developer looking for better oppurtunitiy
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Javacard

  • 1. Presented by: SAMIKSHA SHRUTI CS 3rd year ‘a’ 1241610086
  • 2. CONTENTS  Introduction  History of Java Card  What is Java Card  Architecture of Java Card  Working of Java Card  Applications of Java Card  Challenges in Java Card  Conclusion
  • 3. INTRODUCTION  Java Card refers to a technology that allows java-based applications(applets)to be run securely on smart cards and similar small memory footprint devices.  Java Card gives the user ability to program the device and make them application specific.  The Java Card is an extremely secure Java-powered electronic token.  Java Card could have a number of real-world applications.
  • 4. YEAR VERSION FUNCTIONALITY 1996 Introduction of Java Card technology 1997 Java Card 2.0 Technology Foundations 1999 Java Card 2.1 Interoperable File Format 2000 Java Card 2.1.1 Additional Crypto APIs 2002 Java Card 2.2 Next gen crypto ,memory management 2003 Java Card 2.2.1 Enhancements for USIM 2006 Java Card 2.2.2 Contactless 2008 Java Card 3.0 “Classic ” and “Connected” HISTORY OF JAVA CARD
  • 5. JAVA CARD What is a Java Card? Simple Answer: A programmable smart card A multi-application smart card A smart card for secure application loading Java+Card=Java card Adoption of Java platform for usage on Smart cards.
  • 6. Java Cards are Smart! How??  They store and process Information  Smart Cards can be used to add authentication and secure access to information systems that require a high level of security
  • 8. 8 Elements of Java Card Application: A complete Java Card application consists of : a back-end application a host (off-card) application an interface device (card reader ) the on-card applet user credentials and supporting software
  • 10. 10 The Back-End Application and Systems Provide connectivity to security systems Example: In an electronic payment system, the back-end application could provide access to credit card and other payment information
  • 11. 11 The Reader-Side Consists of two parts: Host Application Card Acceptance Device Think of a bank machine: Host Application as the Computer that provides interaction with the system Card Acceptance Device being where you put your debit card in
  • 12. 12 The Card-Side Elements: One or more Java Applets Card’s operating System Java Card Runtime Environment(JCRE) ◦ Java Card Virtual Machine ◦ Java Card Framework and APIs
  • 13. DEVELOPING A JAVA CARD APPLET 1.Write the Java source 2.Compile your source 3.Convert the class files into a Converted Applet (CAP) file(Binary representation of Classes & interfaces) 4.Verify that the CAP is valid 5.Install the CAP file
  • 14. APPLICATION AREAS Financial • Smart Credit / Debit • E-Purses • Loyalty Programs Mobile Communication • Infotainment • Business Support • Network Optimizers
  • 16. CHALLENGES Java cards have very restricted resources 1.Limited Memory 2.Limited Computing Power Java Card doesn’t support some of java features 1.Large primitive data types : long, double, float 2.char,string 3.Multidimensional array 4.Dynamic class loading 5.Garbage collection 6.Multithreading 7.Object Cloning
  • 17. CONCLUSION •Java Card and other flavors of Java will open new markets •Java Card Technology defines a run time environment that supports the smart card memory, communication, security and application execution model. •Java Card Technology fits java system software in a smart card while conserving enough space for applications. •Java Card mitigates some risks associated with Java such as dynamic class loading