SlideShare a Scribd company logo
Secure Element
The component in a mobile phone providing the security and
confidentiality required to support various business models (m-gov, mpayment, m-commerce, m-security, etc.) in this environment, is referred
to as a Secure Element (SE).
The Secure Element is isolated in
the phone’s operating system and
hardware and can only be
accessed by authorized programs.
Another layer of security is
provided by requiring you to enter
a PIN before accessing the Secure
Element
to
transmit
your
m-credentials during transactions.
Motivation for Secure Elements
Necessary for several Applications:
- Payment
- Ticketing
- Government
- Secure Authentication
- ….
Because it is considered:
- Trusted
- Secure
Current Secure Element Implementations
– Embedded in Mobile Phone
– SIM Based
– Removeable Secure Element (SD Card)
Architecture
HTTPS
SMS (encrypted)
Secure Element Protocols
- NFC
- HTTP
- SMS
- Bluetooth
Security Algorithms
- Public Key Infrastructure
- RSA
- Elliptic Curve Cryptography
- Encrypted SMS
- Encrypted Instant Messaging
- HTTPS (SSL)
Our Solution
Secure Element in:
1) Phone ‘s memory with a specialized
App for
iOS, Android, BlackBerry, Windows
Phone
2) SIM card as JavaCard, SIM Application
Toolkit Applet for all mobile phones.
3) External, removeable, SD card with a
specialized App for
Android, BlackBerry, Windows Phone.
Transactions over
- NFC
- SMS (encrypted),
- HTTP, HTTPS
Secure Element in the SIM
- JavaCard (SIM Application Toolkit ) applet in the SIM
- User Interface as:
- SIM Toolkit Menu
or
- Smart Card Web Server (SCWS)
- Transaction based upon
- Encrypted SMS (ETSI 03.48)
- BIP (HTTP)
Secure Element in Phone’s Memory/SD
- App installed in the phone
(android, iOS, BlackBerry, Windows Phone, etc)

- User Interface in the App
- Transaction (based upon the phone’s features) via:
- Encrypted SMS
- HTTPS
- NFC
http://www.cryptware.com

More Related Content

What's hot

Vxworks
VxworksVxworks
Smart card technology
Smart card technologySmart card technology
Smart card technology
Deepak Raj
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
vishnu murthy
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
kajal
 
What is Universal Flash Storage (UFS)?
What is Universal Flash Storage (UFS)?What is Universal Flash Storage (UFS)?
What is Universal Flash Storage (UFS)?
UniversalFlash
 
Uefi and bios
Uefi and biosUefi and bios
Uefi and bios
Shubham Pendharkar
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
thinkahead.net
 
RTOS Basic Concepts
RTOS Basic ConceptsRTOS Basic Concepts
RTOS Basic Concepts
Pantech ProLabs India Pvt Ltd
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
rabeena tasleem
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
Amit Gaur
 
Intel Processors
Intel ProcessorsIntel Processors
Intel Processors
home
 
synchonization PTP
synchonization PTP synchonization PTP
STM32 L4 presentation
STM32 L4 presentation STM32 L4 presentation
STM32 L4 presentation
Sylvie Boube-Politano
 
GRAPHIC CARD
GRAPHIC CARDGRAPHIC CARD
GRAPHIC CARD
VPKV
 
OMI - The Missing Piece of a Modular, Flexible and Composable Computing World
OMI - The Missing Piece of a Modular, Flexible and Composable Computing WorldOMI - The Missing Piece of a Modular, Flexible and Composable Computing World
OMI - The Missing Piece of a Modular, Flexible and Composable Computing World
Allan Cantle
 
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112GDesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
Leah Wilkinson
 
DDR2 SDRAM
DDR2 SDRAMDDR2 SDRAM
DDR2 SDRAM
Subash John
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
Amber Bhaumik
 
If AMD Adopted OMI in their EPYC Architecture
If AMD Adopted OMI in their EPYC ArchitectureIf AMD Adopted OMI in their EPYC Architecture
If AMD Adopted OMI in their EPYC Architecture
Allan Cantle
 
Universal flash storage
Universal flash storageUniversal flash storage
Universal flash storage
Dooyong Lee
 

What's hot (20)

Vxworks
VxworksVxworks
Vxworks
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Abstract Smart Card Technology
Abstract  Smart Card TechnologyAbstract  Smart Card Technology
Abstract Smart Card Technology
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
What is Universal Flash Storage (UFS)?
What is Universal Flash Storage (UFS)?What is Universal Flash Storage (UFS)?
What is Universal Flash Storage (UFS)?
 
Uefi and bios
Uefi and biosUefi and bios
Uefi and bios
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
RTOS Basic Concepts
RTOS Basic ConceptsRTOS Basic Concepts
RTOS Basic Concepts
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Intel Processors
Intel ProcessorsIntel Processors
Intel Processors
 
synchonization PTP
synchonization PTP synchonization PTP
synchonization PTP
 
STM32 L4 presentation
STM32 L4 presentation STM32 L4 presentation
STM32 L4 presentation
 
GRAPHIC CARD
GRAPHIC CARDGRAPHIC CARD
GRAPHIC CARD
 
OMI - The Missing Piece of a Modular, Flexible and Composable Computing World
OMI - The Missing Piece of a Modular, Flexible and Composable Computing WorldOMI - The Missing Piece of a Modular, Flexible and Composable Computing World
OMI - The Missing Piece of a Modular, Flexible and Composable Computing World
 
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112GDesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
DesignCon 2019 112-Gbps Electrical Interfaces: An OIF Update on CEI-112G
 
DDR2 SDRAM
DDR2 SDRAMDDR2 SDRAM
DDR2 SDRAM
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
If AMD Adopted OMI in their EPYC Architecture
If AMD Adopted OMI in their EPYC ArchitectureIf AMD Adopted OMI in their EPYC Architecture
If AMD Adopted OMI in their EPYC Architecture
 
Universal flash storage
Universal flash storageUniversal flash storage
Universal flash storage
 

Viewers also liked

What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
ForgeRock
 
Eric java card-basics-140314
Eric java card-basics-140314Eric java card-basics-140314
Eric java card-basics-140314
Eric Vétillard
 
FIPS 201 / PIV
FIPS 201 / PIVFIPS 201 / PIV
FIPS 201 / PIV
Anshuman Sinha
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java Card
Anshuman Sinha
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
Leonardo De Moura Rocha Lima
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
Olivier Potonniée
 
IoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutionsIoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutions
Eric Larcheveque
 
Javacard
Javacard Javacard
Javacard
Samiksha90
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
Ade Okuboyejo
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
Stefano Maria De' Rossi
 

Viewers also liked (10)

What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Eric java card-basics-140314
Eric java card-basics-140314Eric java card-basics-140314
Eric java card-basics-140314
 
FIPS 201 / PIV
FIPS 201 / PIVFIPS 201 / PIV
FIPS 201 / PIV
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java Card
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
 
IoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutionsIoT summit - Building flexible & secure IoT solutions
IoT summit - Building flexible & secure IoT solutions
 
Javacard
Javacard Javacard
Javacard
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 

Similar to Secure Element Solutions

Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2ShareAccess Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Faheem Nadeem
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
lfilliat
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
Vladimir Jirasek
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
Nehul Gupta
 
M Commerce
M CommerceM Commerce
M Commerce
Ram Dutt Shukla
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
lfilliat
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Jan Vekemans
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Knowledge Group
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
Alan Quayle
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and Adoption
CSCJournals
 
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control PanelsmartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smart-i Electronics Systems Pvt Ltd.
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)
Andrea Colombetti
 
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraConnected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Tyfone, Inc.
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
Salesforce Developers
 
What is a Trusted Service Manager?
What is a Trusted Service Manager?What is a Trusted Service Manager?
What is a Trusted Service Manager?
Rambus Inc
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Madhur Gupta
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
Matthew Shin
 
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONSAgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
Ed Pimentel
 

Similar to Secure Element Solutions (20)

Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2ShareAccess Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
M Commerce
M CommerceM Commerce
M Commerce
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and Adoption
 
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control PanelsmartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)
 
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraConnected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
What is a Trusted Service Manager?
What is a Trusted Service Manager?What is a Trusted Service Manager?
What is a Trusted Service Manager?
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONSAgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
AgileCO PDIOO - SmartCITY - IOT - IIOT - FINTECH SOLUTIONS
 

Recently uploaded

9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 

Recently uploaded (20)

9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 

Secure Element Solutions

  • 1. Secure Element The component in a mobile phone providing the security and confidentiality required to support various business models (m-gov, mpayment, m-commerce, m-security, etc.) in this environment, is referred to as a Secure Element (SE). The Secure Element is isolated in the phone’s operating system and hardware and can only be accessed by authorized programs. Another layer of security is provided by requiring you to enter a PIN before accessing the Secure Element to transmit your m-credentials during transactions.
  • 2. Motivation for Secure Elements Necessary for several Applications: - Payment - Ticketing - Government - Secure Authentication - …. Because it is considered: - Trusted - Secure
  • 3. Current Secure Element Implementations – Embedded in Mobile Phone – SIM Based – Removeable Secure Element (SD Card)
  • 5. Secure Element Protocols - NFC - HTTP - SMS - Bluetooth
  • 6. Security Algorithms - Public Key Infrastructure - RSA - Elliptic Curve Cryptography - Encrypted SMS - Encrypted Instant Messaging - HTTPS (SSL)
  • 7. Our Solution Secure Element in: 1) Phone ‘s memory with a specialized App for iOS, Android, BlackBerry, Windows Phone 2) SIM card as JavaCard, SIM Application Toolkit Applet for all mobile phones. 3) External, removeable, SD card with a specialized App for Android, BlackBerry, Windows Phone. Transactions over - NFC - SMS (encrypted), - HTTP, HTTPS
  • 8. Secure Element in the SIM - JavaCard (SIM Application Toolkit ) applet in the SIM - User Interface as: - SIM Toolkit Menu or - Smart Card Web Server (SCWS) - Transaction based upon - Encrypted SMS (ETSI 03.48) - BIP (HTTP)
  • 9. Secure Element in Phone’s Memory/SD - App installed in the phone (android, iOS, BlackBerry, Windows Phone, etc) - User Interface in the App - Transaction (based upon the phone’s features) via: - Encrypted SMS - HTTPS - NFC