SlideShare a Scribd company logo
OKsystem – brief introduction
Motto: software with a greater intelligence
    Since 1990, 4 co-owners 200+ employees
    Headquarters in Prague, offices in Brno, NYC
    25+ mil. USD annualy
    Top 100 Czech, Stability Award AAA
OKsystem in Prague
Security from one source
We have all components for instant strong cryptography and smart card
deployment from one source:
•   BABEL – mobile application for transparent encryption of text messages
• OKsmart – software for easy and transparent smart card usage
     – Smart card applets
     – Smart card middleware
     – Personal web based Card Manager
• OKbase - enterprise java system with plug-in management modules:
     – Card management system
     – Key management system
     – Certificate management
• Software development – from mobile to enterprise systems with strong
  security concept based on integration of strong cryptography to
  applications
• Smart cards – contact, contactless, combined (hybrid or dual chip)
BABEL – it's new and unique
Babel is an iPhone messaging app which allows
you to use your cell phone to exchange
encrypted text messages and iMessages.
Cryptography makes difference
How it works
BABEL uses proven and standard algorithms for strong
cryptography - AES for message encryption
 and Diffie-Hellman for cryptographic keys agreement.
Messages are encrypted not only during transmission but
also in the phone memory. All communication, including
key agreement, can be intercepted without any fear or
risk of potential decryption.
Users do not have to remember any new passwords or
keys, or buy and use digital certificates. Application is
simple, intuitive and uses a standard iOS service for
Contacts and Messages.
Android version is being finalized.
Strong cryptography
Strong cryptography exploits encryption algorithms that are highly resistant
to cryptoanalysis and systematic attacks in theory and practice. Well known
and widely used algorithms (RSA, ECC, AES…) are public and proven for years,
and do not contains any hidden secret or backdoors.
• All secrets are concentrated in secret/private keys.
• Without key nobody (younger sister, NSA, Mossad, FSB, …) will decrypt
    cyphertext
Every secret forms a weak point, because there is always the risk of being
compromised or lost. Cryptography keys are fundamental and irremovable
weak point of strong cryptography and thus require very special handling.

Keys must be securely generated, stored and used – smart cards should be
used here - your smartphone is not a security device!
Keys must be securely archived in appropriate Key Management System -
there is no other recovery when secret key is corrupt or lost!
Smart cards
Smart card is cheap and secure crypto-computer in your pocket.
Smart chip is designed and certified for high security and resistant
against many types of attack. Smart chip can be embedded in various
form factors -credit card size, SIM card size, USB dongle. Smart card
can communicate optionally with contact or contactless
reader, including NFC.
It can deliver security services to master system:
      True Random Number Generator for Key generation
      Cryptography with secret key –3DES, AES
      Asymmetric (public) key cryptography
      File system with access control
      PIN and admin key authentication
Smart card services are provided by downloadable applets.
Smart card security Framework
Smart card is access token to information and communication
system. Smart card can easily bring high security to everyday IT
tasks.
      Logical access and authentication
        •   802.1x LAN port authentication
        •   802.1x wifi authentication
        •   Smart card logon
        •   Terminal server authentication
        •   Web SSL/TLS client authentication
        •   Legacy password based authentication (smart card & PIN)
      Encryption for privacy
        •   S/Mime e-mail encryption
        •   File/folder encryption
        •   Disk encryption
      Digital signature and integrity check
        •   S/Mime e-mail signature
        •   MS Office suite
        •   Adobe Acrobat/Reader
Complete Smart Card Solution
OKsmart
Smart card middleware
Middleware is system software, that allows host OS
and applications to communicate with cards and
use card services.
OKsmart middleware connects smart cards
powered by OKsmart applets to most popular OS-
MS Windows and MAC OS-X.
Operating system and applications together with
OKsmart seamlessly uses smart card for secure
cryptographic operations – authentication,
encryption and digital signature.
OKbase card Management System
OKbase CMS is software for complete smart card life cycle
management. Card deployment for company or its customers
never has been so easy and affordable. Personalization profiles
and ready-made scripts manage all complex tasks for operator.
OKbase CMS performs all card issuance services:
      Applet loading (= on card software installation)
      Card personalization
        • Card body print
        • Contact chip
        • Contactless chip
OKbase CMS provides daily card life cycle support:
      Card activation, deactivation, reactivation, revocation, termination
      PIN management
OKbase Key Management System
OKbase KMS is software for cryptographic key generation and
life cycle management. KMS is essential when any encryption
take place with or without smart cards.
Basic OKbase KMS functions include:
      Cryptography grade random key generation
      Secure key archiving for generated or imported keys
      Key restore when two or more security officers puts together
      restore key
      Key activation, deactivation, destruction
      OKbaseKMS exploits secure HSM or smart card for key
      encryption. Encrypted keys are securely stored in SQL database.
OKbase Certificate Management
Digital certificates are core components of PKI systems. A
certificate provides your digital identity to digital documents
and electronic services on the Internet. Companies should
manage certificates for their employees.

OKbase Certificate Management takes care for
complete certificate life cycle, namely:
   Certificate requests
   Certificate enrolment
   Certificate revocation
   Certificate archiving
Use software with strong cryptography.

Be secure. Remain private. Keep them confused.


                Ivo Rosol
                Software Development Director
                www.oksystem.com

More Related Content

What's hot

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Prav_Kalyan
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
puneet bhatia
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Pushkar Dutt
 
Smart card
Smart cardSmart card
Smart card
ram212213
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
Amit Gaur
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Deepak Raj
 
Smart card
Smart cardSmart card
Smart card
Santosh Khadsare
 
Smart card
Smart cardSmart card
Smart Cards
Smart CardsSmart Cards
Smart Cards
Varun Arora
 
Smart card
Smart cardSmart card
Smart card
Vaibhaw Mishra
 
Spelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySpelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySau Sheong Chang
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
崇倍 洪
 
Contact less Smart Card
Contact less Smart CardContact less Smart Card
Contact less Smart Card
KHALID C
 

What's hot (20)

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Smart card
Smart cardSmart card
Smart card
 
Spelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySpelunking Credit Cards with Ruby
Spelunking Credit Cards with Ruby
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
Contact less Smart Card
Contact less Smart CardContact less Smart Card
Contact less Smart Card
 

Similar to Smart Card and Strong Cryptography for instant security

Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
Tony Pearson
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Tony Pearson
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
Tony Pearson
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
Richard Blech
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
2FA, Inc.
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
Zeev Shetach
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
muthulx
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TWD Industries AG
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
Luigi Perrone
 
Digital Factors_Solutions_Presentation
Digital Factors_Solutions_PresentationDigital Factors_Solutions_Presentation
Digital Factors_Solutions_PresentationShagufeh Farsan
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
Kalyana Sundaram
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overviewMark Thacker
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
Andrew Sispoidis
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
cnnetwork
 

Similar to Smart Card and Strong Cryptography for instant security (20)

Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Digital Factors_Solutions_Presentation
Digital Factors_Solutions_PresentationDigital Factors_Solutions_Presentation
Digital Factors_Solutions_Presentation
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overview
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 

More from OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslyOKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesOKsystem
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultOKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelOKsystem
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíOKsystem
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupOKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesOKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesOKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové kartyOKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorOKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportuOKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOKsystem
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?OKsystem
 

More from OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Smart Card and Strong Cryptography for instant security

  • 1.
  • 2. OKsystem – brief introduction Motto: software with a greater intelligence Since 1990, 4 co-owners 200+ employees Headquarters in Prague, offices in Brno, NYC 25+ mil. USD annualy Top 100 Czech, Stability Award AAA
  • 4. Security from one source We have all components for instant strong cryptography and smart card deployment from one source: • BABEL – mobile application for transparent encryption of text messages • OKsmart – software for easy and transparent smart card usage – Smart card applets – Smart card middleware – Personal web based Card Manager • OKbase - enterprise java system with plug-in management modules: – Card management system – Key management system – Certificate management • Software development – from mobile to enterprise systems with strong security concept based on integration of strong cryptography to applications • Smart cards – contact, contactless, combined (hybrid or dual chip)
  • 5. BABEL – it's new and unique Babel is an iPhone messaging app which allows you to use your cell phone to exchange encrypted text messages and iMessages.
  • 7. How it works BABEL uses proven and standard algorithms for strong cryptography - AES for message encryption and Diffie-Hellman for cryptographic keys agreement. Messages are encrypted not only during transmission but also in the phone memory. All communication, including key agreement, can be intercepted without any fear or risk of potential decryption. Users do not have to remember any new passwords or keys, or buy and use digital certificates. Application is simple, intuitive and uses a standard iOS service for Contacts and Messages. Android version is being finalized.
  • 8. Strong cryptography Strong cryptography exploits encryption algorithms that are highly resistant to cryptoanalysis and systematic attacks in theory and practice. Well known and widely used algorithms (RSA, ECC, AES…) are public and proven for years, and do not contains any hidden secret or backdoors. • All secrets are concentrated in secret/private keys. • Without key nobody (younger sister, NSA, Mossad, FSB, …) will decrypt cyphertext Every secret forms a weak point, because there is always the risk of being compromised or lost. Cryptography keys are fundamental and irremovable weak point of strong cryptography and thus require very special handling. Keys must be securely generated, stored and used – smart cards should be used here - your smartphone is not a security device! Keys must be securely archived in appropriate Key Management System - there is no other recovery when secret key is corrupt or lost!
  • 9. Smart cards Smart card is cheap and secure crypto-computer in your pocket. Smart chip is designed and certified for high security and resistant against many types of attack. Smart chip can be embedded in various form factors -credit card size, SIM card size, USB dongle. Smart card can communicate optionally with contact or contactless reader, including NFC. It can deliver security services to master system: True Random Number Generator for Key generation Cryptography with secret key –3DES, AES Asymmetric (public) key cryptography File system with access control PIN and admin key authentication Smart card services are provided by downloadable applets.
  • 10. Smart card security Framework Smart card is access token to information and communication system. Smart card can easily bring high security to everyday IT tasks. Logical access and authentication • 802.1x LAN port authentication • 802.1x wifi authentication • Smart card logon • Terminal server authentication • Web SSL/TLS client authentication • Legacy password based authentication (smart card & PIN) Encryption for privacy • S/Mime e-mail encryption • File/folder encryption • Disk encryption Digital signature and integrity check • S/Mime e-mail signature • MS Office suite • Adobe Acrobat/Reader
  • 12. OKsmart Smart card middleware Middleware is system software, that allows host OS and applications to communicate with cards and use card services. OKsmart middleware connects smart cards powered by OKsmart applets to most popular OS- MS Windows and MAC OS-X. Operating system and applications together with OKsmart seamlessly uses smart card for secure cryptographic operations – authentication, encryption and digital signature.
  • 13. OKbase card Management System OKbase CMS is software for complete smart card life cycle management. Card deployment for company or its customers never has been so easy and affordable. Personalization profiles and ready-made scripts manage all complex tasks for operator. OKbase CMS performs all card issuance services: Applet loading (= on card software installation) Card personalization • Card body print • Contact chip • Contactless chip OKbase CMS provides daily card life cycle support: Card activation, deactivation, reactivation, revocation, termination PIN management
  • 14. OKbase Key Management System OKbase KMS is software for cryptographic key generation and life cycle management. KMS is essential when any encryption take place with or without smart cards. Basic OKbase KMS functions include: Cryptography grade random key generation Secure key archiving for generated or imported keys Key restore when two or more security officers puts together restore key Key activation, deactivation, destruction OKbaseKMS exploits secure HSM or smart card for key encryption. Encrypted keys are securely stored in SQL database.
  • 15. OKbase Certificate Management Digital certificates are core components of PKI systems. A certificate provides your digital identity to digital documents and electronic services on the Internet. Companies should manage certificates for their employees. OKbase Certificate Management takes care for complete certificate life cycle, namely: Certificate requests Certificate enrolment Certificate revocation Certificate archiving
  • 16. Use software with strong cryptography. Be secure. Remain private. Keep them confused. Ivo Rosol Software Development Director www.oksystem.com