SlideShare ist ein Scribd-Unternehmen logo
1 von 16
OKsystem – brief introduction
Motto: software with a greater intelligence
    Since 1990, 4 co-owners 200+ employees
    Headquarters in Prague, offices in Brno, NYC
    25+ mil. USD annualy
    Top 100 Czech, Stability Award AAA
OKsystem in Prague
Security from one source
We have all components for instant strong cryptography and smart card
deployment from one source:
•   BABEL – mobile application for transparent encryption of text messages
• OKsmart – software for easy and transparent smart card usage
     – Smart card applets
     – Smart card middleware
     – Personal web based Card Manager
• OKbase - enterprise java system with plug-in management modules:
     – Card management system
     – Key management system
     – Certificate management
• Software development – from mobile to enterprise systems with strong
  security concept based on integration of strong cryptography to
  applications
• Smart cards – contact, contactless, combined (hybrid or dual chip)
BABEL – it's new and unique
Babel is an iPhone messaging app which allows
you to use your cell phone to exchange
encrypted text messages and iMessages.
Cryptography makes difference
How it works
BABEL uses proven and standard algorithms for strong
cryptography - AES for message encryption
 and Diffie-Hellman for cryptographic keys agreement.
Messages are encrypted not only during transmission but
also in the phone memory. All communication, including
key agreement, can be intercepted without any fear or
risk of potential decryption.
Users do not have to remember any new passwords or
keys, or buy and use digital certificates. Application is
simple, intuitive and uses a standard iOS service for
Contacts and Messages.
Android version is being finalized.
Strong cryptography
Strong cryptography exploits encryption algorithms that are highly resistant
to cryptoanalysis and systematic attacks in theory and practice. Well known
and widely used algorithms (RSA, ECC, AES…) are public and proven for years,
and do not contains any hidden secret or backdoors.
• All secrets are concentrated in secret/private keys.
• Without key nobody (younger sister, NSA, Mossad, FSB, …) will decrypt
    cyphertext
Every secret forms a weak point, because there is always the risk of being
compromised or lost. Cryptography keys are fundamental and irremovable
weak point of strong cryptography and thus require very special handling.

Keys must be securely generated, stored and used – smart cards should be
used here - your smartphone is not a security device!
Keys must be securely archived in appropriate Key Management System -
there is no other recovery when secret key is corrupt or lost!
Smart cards
Smart card is cheap and secure crypto-computer in your pocket.
Smart chip is designed and certified for high security and resistant
against many types of attack. Smart chip can be embedded in various
form factors -credit card size, SIM card size, USB dongle. Smart card
can communicate optionally with contact or contactless
reader, including NFC.
It can deliver security services to master system:
      True Random Number Generator for Key generation
      Cryptography with secret key –3DES, AES
      Asymmetric (public) key cryptography
      File system with access control
      PIN and admin key authentication
Smart card services are provided by downloadable applets.
Smart card security Framework
Smart card is access token to information and communication
system. Smart card can easily bring high security to everyday IT
tasks.
      Logical access and authentication
        •   802.1x LAN port authentication
        •   802.1x wifi authentication
        •   Smart card logon
        •   Terminal server authentication
        •   Web SSL/TLS client authentication
        •   Legacy password based authentication (smart card & PIN)
      Encryption for privacy
        •   S/Mime e-mail encryption
        •   File/folder encryption
        •   Disk encryption
      Digital signature and integrity check
        •   S/Mime e-mail signature
        •   MS Office suite
        •   Adobe Acrobat/Reader
Complete Smart Card Solution
OKsmart
Smart card middleware
Middleware is system software, that allows host OS
and applications to communicate with cards and
use card services.
OKsmart middleware connects smart cards
powered by OKsmart applets to most popular OS-
MS Windows and MAC OS-X.
Operating system and applications together with
OKsmart seamlessly uses smart card for secure
cryptographic operations – authentication,
encryption and digital signature.
OKbase card Management System
OKbase CMS is software for complete smart card life cycle
management. Card deployment for company or its customers
never has been so easy and affordable. Personalization profiles
and ready-made scripts manage all complex tasks for operator.
OKbase CMS performs all card issuance services:
      Applet loading (= on card software installation)
      Card personalization
        • Card body print
        • Contact chip
        • Contactless chip
OKbase CMS provides daily card life cycle support:
      Card activation, deactivation, reactivation, revocation, termination
      PIN management
OKbase Key Management System
OKbase KMS is software for cryptographic key generation and
life cycle management. KMS is essential when any encryption
take place with or without smart cards.
Basic OKbase KMS functions include:
      Cryptography grade random key generation
      Secure key archiving for generated or imported keys
      Key restore when two or more security officers puts together
      restore key
      Key activation, deactivation, destruction
      OKbaseKMS exploits secure HSM or smart card for key
      encryption. Encrypted keys are securely stored in SQL database.
OKbase Certificate Management
Digital certificates are core components of PKI systems. A
certificate provides your digital identity to digital documents
and electronic services on the Internet. Companies should
manage certificates for their employees.

OKbase Certificate Management takes care for
complete certificate life cycle, namely:
   Certificate requests
   Certificate enrolment
   Certificate revocation
   Certificate archiving
Use software with strong cryptography.

Be secure. Remain private. Keep them confused.


                Ivo Rosol
                Software Development Director
                www.oksystem.com

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smartcard
SmartcardSmartcard
Smartcard
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Smart card
Smart cardSmart card
Smart card
 
Spelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySpelunking Credit Cards with Ruby
Spelunking Credit Cards with Ruby
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
Contact less Smart Card
Contact less Smart CardContact less Smart Card
Contact less Smart Card
 

Ähnlich wie Smart Card and Strong Cryptography for instant security

Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aTony Pearson
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Tony Pearson
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cTony Pearson
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustZeev Shetach
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTWD Industries AG
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 
Digital Factors_Solutions_Presentation
Digital Factors_Solutions_PresentationDigital Factors_Solutions_Presentation
Digital Factors_Solutions_PresentationShagufeh Farsan
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor AuthenticationKalyana Sundaram
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overviewMark Thacker
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecurecnnetwork
 

Ähnlich wie Smart Card and Strong Cryptography for instant security (20)

Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Digital Factors_Solutions_Presentation
Digital Factors_Solutions_PresentationDigital Factors_Solutions_Presentation
Digital Factors_Solutions_Presentation
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overview
 
Cyber tooth
Cyber toothCyber tooth
Cyber tooth
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 

Mehr von OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslyOKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesOKsystem
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultOKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelOKsystem
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíOKsystem
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupOKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesOKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesOKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové kartyOKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorOKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportuOKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOKsystem
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?OKsystem
 

Mehr von OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

Smart Card and Strong Cryptography for instant security

  • 1.
  • 2. OKsystem – brief introduction Motto: software with a greater intelligence Since 1990, 4 co-owners 200+ employees Headquarters in Prague, offices in Brno, NYC 25+ mil. USD annualy Top 100 Czech, Stability Award AAA
  • 4. Security from one source We have all components for instant strong cryptography and smart card deployment from one source: • BABEL – mobile application for transparent encryption of text messages • OKsmart – software for easy and transparent smart card usage – Smart card applets – Smart card middleware – Personal web based Card Manager • OKbase - enterprise java system with plug-in management modules: – Card management system – Key management system – Certificate management • Software development – from mobile to enterprise systems with strong security concept based on integration of strong cryptography to applications • Smart cards – contact, contactless, combined (hybrid or dual chip)
  • 5. BABEL – it's new and unique Babel is an iPhone messaging app which allows you to use your cell phone to exchange encrypted text messages and iMessages.
  • 7. How it works BABEL uses proven and standard algorithms for strong cryptography - AES for message encryption and Diffie-Hellman for cryptographic keys agreement. Messages are encrypted not only during transmission but also in the phone memory. All communication, including key agreement, can be intercepted without any fear or risk of potential decryption. Users do not have to remember any new passwords or keys, or buy and use digital certificates. Application is simple, intuitive and uses a standard iOS service for Contacts and Messages. Android version is being finalized.
  • 8. Strong cryptography Strong cryptography exploits encryption algorithms that are highly resistant to cryptoanalysis and systematic attacks in theory and practice. Well known and widely used algorithms (RSA, ECC, AES…) are public and proven for years, and do not contains any hidden secret or backdoors. • All secrets are concentrated in secret/private keys. • Without key nobody (younger sister, NSA, Mossad, FSB, …) will decrypt cyphertext Every secret forms a weak point, because there is always the risk of being compromised or lost. Cryptography keys are fundamental and irremovable weak point of strong cryptography and thus require very special handling. Keys must be securely generated, stored and used – smart cards should be used here - your smartphone is not a security device! Keys must be securely archived in appropriate Key Management System - there is no other recovery when secret key is corrupt or lost!
  • 9. Smart cards Smart card is cheap and secure crypto-computer in your pocket. Smart chip is designed and certified for high security and resistant against many types of attack. Smart chip can be embedded in various form factors -credit card size, SIM card size, USB dongle. Smart card can communicate optionally with contact or contactless reader, including NFC. It can deliver security services to master system: True Random Number Generator for Key generation Cryptography with secret key –3DES, AES Asymmetric (public) key cryptography File system with access control PIN and admin key authentication Smart card services are provided by downloadable applets.
  • 10. Smart card security Framework Smart card is access token to information and communication system. Smart card can easily bring high security to everyday IT tasks. Logical access and authentication • 802.1x LAN port authentication • 802.1x wifi authentication • Smart card logon • Terminal server authentication • Web SSL/TLS client authentication • Legacy password based authentication (smart card & PIN) Encryption for privacy • S/Mime e-mail encryption • File/folder encryption • Disk encryption Digital signature and integrity check • S/Mime e-mail signature • MS Office suite • Adobe Acrobat/Reader
  • 12. OKsmart Smart card middleware Middleware is system software, that allows host OS and applications to communicate with cards and use card services. OKsmart middleware connects smart cards powered by OKsmart applets to most popular OS- MS Windows and MAC OS-X. Operating system and applications together with OKsmart seamlessly uses smart card for secure cryptographic operations – authentication, encryption and digital signature.
  • 13. OKbase card Management System OKbase CMS is software for complete smart card life cycle management. Card deployment for company or its customers never has been so easy and affordable. Personalization profiles and ready-made scripts manage all complex tasks for operator. OKbase CMS performs all card issuance services: Applet loading (= on card software installation) Card personalization • Card body print • Contact chip • Contactless chip OKbase CMS provides daily card life cycle support: Card activation, deactivation, reactivation, revocation, termination PIN management
  • 14. OKbase Key Management System OKbase KMS is software for cryptographic key generation and life cycle management. KMS is essential when any encryption take place with or without smart cards. Basic OKbase KMS functions include: Cryptography grade random key generation Secure key archiving for generated or imported keys Key restore when two or more security officers puts together restore key Key activation, deactivation, destruction OKbaseKMS exploits secure HSM or smart card for key encryption. Encrypted keys are securely stored in SQL database.
  • 15. OKbase Certificate Management Digital certificates are core components of PKI systems. A certificate provides your digital identity to digital documents and electronic services on the Internet. Companies should manage certificates for their employees. OKbase Certificate Management takes care for complete certificate life cycle, namely: Certificate requests Certificate enrolment Certificate revocation Certificate archiving
  • 16. Use software with strong cryptography. Be secure. Remain private. Keep them confused. Ivo Rosol Software Development Director www.oksystem.com