160 research outputs found

    An asynchronous java processor for smart card.

    Get PDF
    Yu Chun-Pong.Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.Includes bibliographical references (leaves 60-61).Abstracts in English and Chinese.Abstract of this thesis entitled: --- p.i摘要 --- p.iiiAcknowledgements --- p.ivTable of contents --- p.vList of Tables --- p.viList of Figures --- p.viiChapter Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Asynchronous design --- p.1Chapter 1.2 --- Java processor for contactless smart card [3] --- p.2Chapter 1.3 --- Motivation --- p.3Chapter Chapter 2 --- Asynchronous circuit design techniques --- p.5Chapter 2.1 --- Overview --- p.5Chapter 2.2 --- Handshake protocol --- p.5Chapter 2.3 --- Asynchronous pipeline --- p.7Chapter 2.4 --- Asynchronous control elements --- p.9Chapter Chapter 3 --- Asynchronous Java Processor --- p.15Chapter 3.1 --- Instruction Set --- p.15Chapter 3.2 --- Architecture of the java processor --- p.17Chapter 3.3 --- Basic building blocks of the java processor --- p.22Chapter 3.4 --- Token flow --- p.32Chapter Chapter 4 --- Results and Discussion --- p.37Chapter 4.1 --- Simulation Results of test programs --- p.37Chapter 4.2 --- Experimental result --- p.41Chapter 4.3 --- Future work --- p.42Chapter Chapter 5 --- Conclusion --- p.45Appendix --- p.47Chip micrograph for the java processor core --- p.47Pin assignment of the java processor --- p.48Schematic of the java processor --- p.52Schematic of the decoder --- p.54Schematic of the Stage2 of the java processor --- p.55Schematic of the stack --- p.56Schematic of the block of the local variables --- p.57Schematic of the 16-bit self-timed adder --- p.58The schematic and the layout of the memory cell --- p.59Reference --- p.6

    TechNews digests: Jan - Nov 2009

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month

    Payment Terminal Emulator

    Get PDF
    Atualmente, os pagamentos em dinheiro estão a tornar-se menos populares. No entanto, poucas pessoas conhecem a complexidade que se encontra por detrás da inserção do cartão no terminal PoS (ponto de venda), introdução do PIN e recolha do recibo). Esse processo de pagamento é implementado pelas empresas FinTech, que fornecem aos bancos e comerciantes terminais PoS prontos para uso. A fase mais cara e demorada da integração da solução de pagamento é a certificação do software do terminal. Neste trabalho, consideramos o protocolo de comunicação entre um cartão inteligente e um terminal PoS baseado nas especificações internacional EMV (Europay Mastercard Visa), juntamente com suas vulnerabilidades conhecidas. Para melhorar o processo de certificação numa empresa FinTech em Portugal, um software independente foi sugerido para emulação do fluxo de pagamento de EMV completo. Neste trabalho, apresentamos os detalhes sobre a implementação da aplicação 3C Emulator.Nowadays, cash payments are becoming less popular and few understand, what a complicated process stands behind the habitual inserting the card into PoS (Point-of-Sale) terminal. This payment process are implemented by FinTech companies, that provide banks and merchants with ready-to-use PoS terminals. And the most expensive and time-consuming phase of payment solution integration is is the certification of terminal software. In this work we consider communication protocol between a smart card and a PoS terminal based on EMV (Europay Mastercard Visa) international standard, together with its known vulnerabilities. In order to improve the certification process in one Portuguese FinTech company, standalone software for emulation of full EMV transaction workflow is suggested. We present details about implementation of 3C Emulator application

    Java based smart cards

    Get PDF
    Toimikortti muodostaa tärkeän elementin GSM- matkapuhelimessa. Perinteisesti sitä on käytetty vain sähköiseen tunnistamiseen ja käyttäjäkohtaisten tietojen säilyttämiseen. Toimikortti sisältää kuitenkin täysin toimivan prosessorin ia toimikortin muistin määrän lisääntyminen on mahdollistanut prosessorin käytön ohjelmien ajamiseen. Eri korttivalmistajat ovat tuoneet markkinoille omia keskenään yhteensopimattomia ratkaisuja ja ohjelmointikieliä toimikorttiympäristöön. Toimikorttisovellusten laaja käyttöalue on synnyttänyt tarpeen kehittää yhteisesti hyväksytty ratkaisu, jonka avulla sovellusten kehittäjät voisivat tehdä kaikkien valmistajien korttien kanssa yhteensopivia sovelluksia. Java-kortti, jonka määrittelemiseen ovat voineet osallistua kaikki alalla toimivat osapuolet, on suunniteltu tähän tarkoitukseen. SIM application toolkit (SAT) tarjoaa mahdollisuuden tehdä GSM kortilla ajettaville sovelluksille valikkopohjaisen käyttöliittymän puhelimeen. Myös SAT:lle on kaivattu standardia ohjelmointirajapintaa ja kieltä. Ratkaisuksi Euroopan telealan standardisointijärjestö (ETSI) on määritellyt SAT:lle Java-rajapinnan, Java SIM API:n. Diplomityössä käsitellään Java-korttia, Java SIM API:a, sekä joitakin näihin läheisesti liittyviä standardeja ja arvioidaan niiden vahvuuksia ja heikkouksia. Työssä pohditaan myös toimikorttisovellusten tulevaisuudennäkymiä

    Circuiti asincroni: dai principi fondamentali all'implementazione

    Get PDF
    La maggioranza dei circuiti commercializzati al giorno d'oggi è di tipo sincrono. Negli ultimi anni però, questa tecnologia si è trovata a dover affrontare notevoli problemi legati al consumo di potenza e alle crescenti difficoltà di gestione del clock, in circuiti sempre più piccoli e densi. Per ovviare a queste problematiche, che richiedono soluzioni tecnicamente complesse e dispendiose, i costruttori stanno portando l'attenzione sull'approccio asincrono che, privo di clock, promette di ridurre i consumi e velocizzare i circuiti. La mancanza di esperienza, strumenti e motivazioni adeguate rende però molto difficile una migrazione totale da un paradigma all'altro. La tecnologia che sembra destinata a prendere piede in questo contesto è quindi l'approccio ibrido Globally Asynchronous, Locally Synchronous. Importanti produttori sono impegnati nella ricerca in questo settore, che è ancora in piena fase evolutiva. Il presente lavoro è diviso in due parti: nella prima offriremo un quadro generale sui fondamenti della tecnologia asincrona e, nella seconda, vedremo esempi di design che rappresentano l'attuale stato dell'arteope

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    Analysing the behaviour of a smart card based model for secure communication with remote computers over the internet

    Get PDF
    This dissertation presents the findings of a generic model aimed at providing secure communication with remote computers via the Internet, based on smart cards. The results and findings are analysed and presented in great detail, in particular the behaviour and performance of smart cards when used to provide the cryptographic functionality. Two implemented models are presented. The first model uses SSL to secure the communication channel over the Internet while using smart cards for user authentication and storage of cryptographic keys. The second model presents the SSH for channel security and smart cards for user authentication, key storage and actual encryption and decryption of data. The model presented is modular and generic by nature, meaning that it can easily be modified to accept the newer protocol by simply including the protocols in a library and with a minor or no modification to both server and client application software. For example, any new algorithm for encryption, key exchange, signature, or message digest, can be easily accommodated into the system, which proves that the model is generic and can easily be integrated into newer technologies. Similarly, smart cards are used for cryptography. Two options are presented: first the smart cards only store the algorithm keys and user authentication, and secondly, smart cards are used for storing the algorithm keys, user authentication, and actual data encryption or decryption, as the requirement may dictate. This is very useful, for example, if data to be transferred is limited to a few bytes, then actual data encryption and decryption is performed using smart cards. On the other hand, if a great deal of data is to be transferred, then only authentication and key storage are performed with smart cards. The model currently uses 3DES with smart card encryption and decryption, because this is faster and consumes fewer resources when compared to RSA. Once again, the model design is flexible to accommodate new algorithms such as AES or IDEA. Important aspects of the dissertation are the study and analysis of the security attacks on smart card use. Several smart card attack scenarios are presented in CHAPTER 3, and their possible prevention is also discussed in detail. AFRIKAANS : Hierdie verhandeling bied die bevindinge van 'n generiese model wat daarop gemik is om veilige kommunikasie te voorsien met 'n afstandsrekenaar via die Internet en op slimkaarte gebaseer. Die resultate en bevindings word ontleed en breedvoerig aangebied, veral die gedrag en werkverrigting van slimkaarte wanneer hulle gebruik word om die kriptografiese funksionaliteit te voorsien. Daar word twee geïmplementeerde modelle aangebied. Die eerste model gebruik SSL om die kommunikasiekanaal oor die Internet te beveilig terwyl slimkaarte vir gebruikerbekragtiging en stoor van kriptografiese sleutels gebruik word. Die tweede model bied die SSH vir kanaalsekuriteit en slimkaarte vir gebruikergeldigheidvasstelling, sleutelstoor en werklike kodering en dekodering van data. Die model wat aangebied word, is modulêr en generies van aard, wat beteken dat dit maklik gewysig kan word om die jongste protokolle te aanvaar deur bloot die protokolle by 'n programbiblioteek met geringe of geen wysiging van beide die bediener- en kliënttoepassingsagteware in te sluit. Byvoorbeeld, enige nuwe algoritme vir kodering, sleuteluitruiling, handtekening of boodskapbondeling kan maklik in die stelsel gehuisves word, wat bewys dat die model generies is en maklik in jonger tegnologieë geïntegreer kan word. Slimkaarte word op soortgelyke wyse vir kriptografie gebruik. Daar word twee keuses aangebied: eerstens stoor die slimkaarte slegs die algoritmesleutels en gebruikergeldigheidvasstelling en tweedens word slimkaarte gebruik om die algoritmesleutels, gebruikergeldigheidvasstelling en werklike datakodering en –dekodering te stoor na gelang van wat vereis word. Dit is baie nuttig, byvoorbeeld, wanneer data wat oorgedra moet word, tot 'n paar grepe beperk is, word die eintlike datakodering en – dekodering uitgevoer deur slimkaarte te gebruik. Andersyds, indien 'n groot hoeveelheid data oorgedra moet word, word slegs geldigheidvasstelling en stoor met slimkaarte uitgevoer. Die model gebruik tans 3DES met slimkaartkodering en –dekodering omdat dit vinniger is en minder hulpbronne gebruik vergeleke met RSA. Die modelontwerp is weer eens buigsaam om nuwe algoritmes soos AES of IDEA te huisves. Nog 'n belangrike aspek van die verhandeling is om die sekuriteitaanvalle op slimkaartgebruik te ondersoek en te ontleed. Verskeie slimkaartaanvalscenario's word in Hoofstuk 3 aangebied en die moontlike voorkoming daarvan word ook breedvoerig bespreek.Dissertation (MEng)--University of Pretoria, 2011.Electrical, Electronic and Computer Engineeringunrestricte

    FINE-GRAINED ACCESS CONTROL ON ANDROID COMPONENT

    Get PDF
    The pervasiveness of Android devices in today’s interconnected world emphasizes the importance of mobile security in protecting user privacy and digital assets. Android’s current security model primarily enforces application-level mechanisms, which fail to address component-level (e.g., Activity, Service, and Content Provider) security concerns. Consequently, third-party code may exploit an application’s permissions, and security features like MDM or BYOD face limitations in their implementation. To address these concerns, we propose a novel Android component context-aware access control mechanism that enforces layered security at multiple Exception Levels (ELs), including EL0, EL1, and EL3. This approach effectively restricts component privileges and controls resource access as needed. Our solution comprises Flasa at EL0, extending SELinux policies for inter-component interactions and SQLite content control; Compac, spanning EL0 and EL1, which enforces component-level permission controls through Android runtime and kernel modifications; and TzNfc, leveraging TrustZone technologies to secure third-party services and limit system privileges via Trusted Execution Environment (TEE). Our evaluations demonstrate the effectiveness of our proposed solution in containing component privileges, controlling inter-component interactions and protecting component level resource access. This enhanced solution, complementing Android’s existing security architecture, provides a more comprehensive approach to Android security, benefiting users, developers, and the broader mobile ecosystem
    corecore