SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
A Fortress for your Android Application

Jian Wang
Head of Technology, certgate
Business and the Mobile World

Agenda

   About certgate
   Mobile Security Solutions
   Android Security Concept
   certgate Mobile Application Protection Layer
   [Live Demonstration]
   Q&A




                                                   Slide 3
Business and the Mobile World

About certgate

 Mobile IT security innovator
 Founded in 2008, located in Nuremberg, Germany
 certgate is mastering the secure mobile IT device from
  hardware to application level
 Created the first microSD memory card with full
  smartcard capabilities, bringing hardware-based crypto
  functions to smartphones and tablets (Patent
  protected)


                                                     Slide 4
Business and the Mobile World

certgate Smartcard microSD




                                Slide 5
Business and the Mobile World

The Challenge

 Most businesses and administrations today
    • Either deploy smartphones and tablets to their employees
    • Or accept their employees to use their own devices for business
      purposes
 Those who don‘t do either have a reason:
    • They don‘t feel safe doing it
    • They would love to introduce new business models and
      applications like mobile e-D, payment, physical access and
      much, much more if only they COULD feel safe




                                                                   Slide 6
Business and the Mobile World

There Are Solutions on the Market

   Digital signing and encryption of emails with S/MIME
   Certificates stored in a fully-fledged (yet small-in-format) smartcard
   VPN Client requiring digital user authentication
   Banking client requiring digital user authentication and digital signature
   VoIP client creating session keys on the smartcard sitting inside the device




                                                                                   Slide 7
certgate – Use Cases
Secfone – Voice Encryption for Android




                          • Tap-proof worldwide voice communication
                          • Latest Android smartphones supported
                          • End-to-end encryption with hardware
                            protected keys
                          • Authenticates user by a privately or publicly
                            owned server – no data pass through the
                            server
                          • Directly integrates in fixed-line enterprise
                            communication
Slide 9                                                                     Version 11-05
certgate – Use Cases
TouchDown – Exchange Integration for Android




                         • Secure Exchange synchronization for Android
                           smartphones
                         • Consistent PKI integration of mobile devices
                         • Authentication and secure data transfer based
                           on hardware certificates
                         • S/MIME protection for your confidential data:
                           messages, contacts, appointments



Slide 10                                                              Version 11-05
certgate MAPL™ for Android

Here Is A New One




                             Slide 11
certgate MAPL™ for Android

Why Did We Do This In the First Place

   Protect confidential data on the device
   Protect an application against unauthorized users
   Provide security with minimal integration effort
   Qualify the device to fit the BYOD concept
   Enable surplus security functions by the same
    hardware token, e.g. S/MIME encryption and
    secure VoIP



                                                        Slide 12
certgate MAPL™ for Android

Android Security Overview

 The Application Sandbox
   •    Each application is assigned with a UID
   •    Each application is running as a user in a separate process
   •    IPC through Binder, Intents, Services, and Content Provider


 The Android Permission Model
   •    Permissions are GIDs
   •    Declared in the app’s Android manifest
   •    Need to be explicitly confirmed by the user


                                                                Slide 13
certgate MAPL™ for Android

Which Concerns Are Being Addressed?

 Extension of rights by „rooting“ the device:
  Allows free access to all system resources

 Shortcomings in platform specific knowledge:
  Process boundaries can be violated e.g. by Intents

 Limitations in cryptographical comprehension:
  Sub-optimal choice of algorithms and cipher modes and
  less than perfect implementation of same




                                                          Slide 14
certgate MAPL™ for Android

Different Cipher Modes




           Original         Encrypted                Encrypted
                         using CBC mode           using ECB mode

                           Picture: Larry Ewing                    Slide 15
certgate MAPL™ for Android

The Solution

 Mobile Application Protection Layer (MAPL)
  • No app execution without correct user PIN
  • Standard Android API
  • Transparent Encryption of Files and Database
  • Android SharedPreferences encryption
  • Tamper-proof key storage on cgCard™




                                                   Slide 16
certgate MAPL™ for Android

Solution Architecture




                    Application

                                                        Crypto Service
                 certgate MAPLTM         JCE Provider




         Database / File Access


                              Android Framework




                                                                         Slide 17
certgate MAPL™ for Android

Live Demo


 Howto: User Login
 Howto: Encrypt InternalStorage
 Howto: Encrypt SharedPreferences
 Howto: Encrypt Datenbank



                                     Slide 18
certgate MAPL™ for Android

Add MAPL library into your project




                                     Slide 19
certgate MAPL™ for Android

An example Android-Manifest




                              Slide 20
certgate MAPLTM for Android

Modification of your Android manifest file

 Using MAPL applikation class



 Set MAPL activity as your entry activity



 Declare your application entry activity



                                             Slide 21
certgate MAPLTM for Android

A MAPL ready Android manifest




                                Slide 22
certgate MAPL™ for Android

MAPL Effects


    Login:

                   Before:




                   After:




                             Slide 24
certgate MAPL™ for Android

What‘s In It For You?


                         certgate MAPL™ can be integrated
                          into virtually every app
                         Secure hardware element beats
                          every software approach by attack
                          resistance level
                         Powerful tool to really become
                          security policy compliant
                         Enables company-wide BYOD
                          practice



                                                         Slide 25
Thank you

Get MAPL now!




                mapl.certgate.com




                                    Slide 27

Weitere ähnliche Inhalte

Was ist angesagt?

M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsNok Nok Labs, Inc
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 ExternalSarah Thomas
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsOlivier PotonniĂŠe
 
Bkl_12_9_T_0515
Bkl_12_9_T_0515Bkl_12_9_T_0515
Bkl_12_9_T_0515Bikrama Lenka
 
Kiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_LoiaconoKiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_LoiaconoAnthony Loiacono
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
NFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDKNFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDKSalesforce Developers
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector InishTech
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen VascoLeenVerleyen
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup   17 dec 2014 - Bluemix and Watson OverviewParis Bluemix Meetup   17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson OverviewIBM France Lab
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Nfc sfdc mobile_sdk
Nfc sfdc mobile_sdkNfc sfdc mobile_sdk
Nfc sfdc mobile_sdkCory Cowgill
 

Was ist angesagt? (20)

M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
38
3838
38
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Bkl_12_9_T_0515
Bkl_12_9_T_0515Bkl_12_9_T_0515
Bkl_12_9_T_0515
 
Kiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_LoiaconoKiosk White Paper_Ron_Tony_Loiacono
Kiosk White Paper_Ron_Tony_Loiacono
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
NFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDKNFC and the Salesforce Mobile SDK
NFC and the Salesforce Mobile SDK
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup   17 dec 2014 - Bluemix and Watson OverviewParis Bluemix Meetup   17 dec 2014 - Bluemix and Watson Overview
Paris Bluemix Meetup 17 dec 2014 - Bluemix and Watson Overview
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Nfc sfdc mobile_sdk
Nfc sfdc mobile_sdkNfc sfdc mobile_sdk
Nfc sfdc mobile_sdk
 

Andere mochten auch

Mikrocontroller die qual der wahl
Mikrocontroller die qual der wahlMikrocontroller die qual der wahl
Mikrocontroller die qual der wahlConrad
 
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...OM Latam
 
5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)Emagister
 
সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।Ilyas Qadri Ziaee
 
Inf b (3)
Inf b (3)Inf b (3)
Inf b (3)pele13
 
Proyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras EdelnorProyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras Edelnorguestdbd872
 
Ap 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaoAp 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaocc50043
 
JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)Julius Cabiling
 
Social Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoSocial Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoLeslie Hammersmith
 
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015Laborum PerĂş
 
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood MasoSmithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood MasoEmbajada de EE.UU. en el PerĂş
 
2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertadIsmerai Ochoa Rodriguez
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Dell World
 
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...SCORE Atlanta
 
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...Reydick D Balucan
 
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAPMichael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAPSAP LatinoamĂŠrica
 

Andere mochten auch (20)

Expo joc-6-lexic-escola-1
Expo joc-6-lexic-escola-1Expo joc-6-lexic-escola-1
Expo joc-6-lexic-escola-1
 
Mikrocontroller die qual der wahl
Mikrocontroller die qual der wahlMikrocontroller die qual der wahl
Mikrocontroller die qual der wahl
 
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
[WEBINARIO amdia OM Latam] Activar y retener clientes mediante estrategias de...
 
5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)5. instalaciĂłn (parte 1)
5. instalaciĂłn (parte 1)
 
সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।সাওয়াব বৃদ্ধি করার উপায়।
সাওয়াব বৃদ্ধি করার উপায়।
 
Inf b (3)
Inf b (3)Inf b (3)
Inf b (3)
 
Proyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras EdelnorProyecto Bussines Intelligence Obras Edelnor
Proyecto Bussines Intelligence Obras Edelnor
 
Nourish The People
Nourish The PeopleNourish The People
Nourish The People
 
Rates_Program_Documentation
Rates_Program_DocumentationRates_Program_Documentation
Rates_Program_Documentation
 
Ap 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaoAp 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chao
 
JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)JULIUS RAMIREZ CABILING NEW (Resume)
JULIUS RAMIREZ CABILING NEW (Resume)
 
Social Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research DemoSocial Media Basics for Clinical Research Demo
Social Media Basics for Clinical Research Demo
 
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
HĂĄbitos en la bĂşsqueda de trabajo del talento peruano 2015
 
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood MasoSmithsonian & Floklife Festival por Dr. Michael Atwood Maso
Smithsonian & Floklife Festival por Dr. Michael Atwood Maso
 
Memoria cientĂ­fica IACS 2010
Memoria cientĂ­fica IACS 2010Memoria cientĂ­fica IACS 2010
Memoria cientĂ­fica IACS 2010
 
2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad2 control de lectura-filos-polĂ­t-educ-sobre libertad
2 control de lectura-filos-polĂ­t-educ-sobre libertad
 
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
 
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
Shameless Self Promotion: Do-It-Yourself PR - Presented by Peggy Duncan, Pers...
 
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
Balucan et al_2013_Thermal Activation of Antigorite for Mineralization of CO2...
 
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAPMichael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
Michael Golz, Senior VP & CIO SAP Americas, en el CIO Summit de SAP
 

Ähnlich wie Certgate

VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance WebinarGrafic.guru
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelesssierradeveloper
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Satheesh Kumar V
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM France Lab
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from IntelEdge AI and Vision Alliance
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinDroidcon Berlin
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Marco Pozzato
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan MĂĽrtensson
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon Berlin
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinDroidcon Berlin
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 

Ähnlich wie Certgate (20)

VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
 
Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015Secure VoIP - DroidCon 2015
Secure VoIP - DroidCon 2015
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 

Mehr von Droidcon Berlin

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google castDroidcon Berlin
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limitsDroidcon Berlin
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility Droidcon Berlin
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in uxDroidcon Berlin
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_backDroidcon Berlin
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86Droidcon Berlin
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetizationDroidcon Berlin
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building AndroidDroidcon Berlin
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentationDroidcon Berlin
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Droidcon Berlin
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkraussDroidcon Berlin
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014Droidcon Berlin
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Droidcon Berlin
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidconDroidcon Berlin
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devicesDroidcon Berlin
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradioDroidcon Berlin
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 

Mehr von Droidcon Berlin (20)

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
 
crashing in style
crashing in stylecrashing in style
crashing in style
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in ux
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
 
droidparts
droidpartsdroidparts
droidparts
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetization
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkrauss
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 

KĂźrzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

KĂźrzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Certgate

  • 1. A Fortress for your Android Application Jian Wang Head of Technology, certgate
  • 2. Business and the Mobile World Agenda  About certgate  Mobile Security Solutions  Android Security Concept  certgate Mobile Application Protection Layer  [Live Demonstration]  Q&A Slide 3
  • 3. Business and the Mobile World About certgate  Mobile IT security innovator  Founded in 2008, located in Nuremberg, Germany  certgate is mastering the secure mobile IT device from hardware to application level  Created the first microSD memory card with full smartcard capabilities, bringing hardware-based crypto functions to smartphones and tablets (Patent protected) Slide 4
  • 4. Business and the Mobile World certgate Smartcard microSD Slide 5
  • 5. Business and the Mobile World The Challenge  Most businesses and administrations today • Either deploy smartphones and tablets to their employees • Or accept their employees to use their own devices for business purposes  Those who don‘t do either have a reason: • They don‘t feel safe doing it • They would love to introduce new business models and applications like mobile e-D, payment, physical access and much, much more if only they COULD feel safe Slide 6
  • 6. Business and the Mobile World There Are Solutions on the Market  Digital signing and encryption of emails with S/MIME  Certificates stored in a fully-fledged (yet small-in-format) smartcard  VPN Client requiring digital user authentication  Banking client requiring digital user authentication and digital signature  VoIP client creating session keys on the smartcard sitting inside the device Slide 7
  • 7. certgate – Use Cases Secfone – Voice Encryption for Android • Tap-proof worldwide voice communication • Latest Android smartphones supported • End-to-end encryption with hardware protected keys • Authenticates user by a privately or publicly owned server – no data pass through the server • Directly integrates in fixed-line enterprise communication Slide 9 Version 11-05
  • 8. certgate – Use Cases TouchDown – Exchange Integration for Android • Secure Exchange synchronization for Android smartphones • Consistent PKI integration of mobile devices • Authentication and secure data transfer based on hardware certificates • S/MIME protection for your confidential data: messages, contacts, appointments Slide 10 Version 11-05
  • 9. certgate MAPL™ for Android Here Is A New One Slide 11
  • 10. certgate MAPL™ for Android Why Did We Do This In the First Place  Protect confidential data on the device  Protect an application against unauthorized users  Provide security with minimal integration effort  Qualify the device to fit the BYOD concept  Enable surplus security functions by the same hardware token, e.g. S/MIME encryption and secure VoIP Slide 12
  • 11. certgate MAPL™ for Android Android Security Overview  The Application Sandbox • Each application is assigned with a UID • Each application is running as a user in a separate process • IPC through Binder, Intents, Services, and Content Provider  The Android Permission Model • Permissions are GIDs • Declared in the app’s Android manifest • Need to be explicitly confirmed by the user Slide 13
  • 12. certgate MAPL™ for Android Which Concerns Are Being Addressed?  Extension of rights by „rooting“ the device: Allows free access to all system resources  Shortcomings in platform specific knowledge: Process boundaries can be violated e.g. by Intents  Limitations in cryptographical comprehension: Sub-optimal choice of algorithms and cipher modes and less than perfect implementation of same Slide 14
  • 13. certgate MAPL™ for Android Different Cipher Modes Original Encrypted Encrypted using CBC mode using ECB mode Picture: Larry Ewing Slide 15
  • 14. certgate MAPL™ for Android The Solution  Mobile Application Protection Layer (MAPL) • No app execution without correct user PIN • Standard Android API • Transparent Encryption of Files and Database • Android SharedPreferences encryption • Tamper-proof key storage on cgCard™ Slide 16
  • 15. certgate MAPL™ for Android Solution Architecture Application Crypto Service certgate MAPLTM JCE Provider Database / File Access Android Framework Slide 17
  • 16. certgate MAPL™ for Android Live Demo  Howto: User Login  Howto: Encrypt InternalStorage  Howto: Encrypt SharedPreferences  Howto: Encrypt Datenbank Slide 18
  • 17. certgate MAPL™ for Android Add MAPL library into your project Slide 19
  • 18. certgate MAPL™ for Android An example Android-Manifest Slide 20
  • 19. certgate MAPLTM for Android Modification of your Android manifest file  Using MAPL applikation class  Set MAPL activity as your entry activity  Declare your application entry activity Slide 21
  • 20. certgate MAPLTM for Android A MAPL ready Android manifest Slide 22
  • 21. certgate MAPL™ for Android MAPL Effects Login: Before: After: Slide 24
  • 22. certgate MAPL™ for Android What‘s In It For You?  certgate MAPL™ can be integrated into virtually every app  Secure hardware element beats every software approach by attack resistance level  Powerful tool to really become security policy compliant  Enables company-wide BYOD practice Slide 25
  • 23. Thank you Get MAPL now! mapl.certgate.com Slide 27