SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Digital Pen Solutions




Security Solutions & Services – SBL Enterprise - Architecture
Contents


             Contents

                            Overview
                            Technology
                            Business
                            Success cases




2
    Security Solutions & Services – SBL Enterprise - Architecture
Overview


         Mobility – Anywhere at Anytime
                 Breaking static links with the office, where the information systems are located.
                 Optimization - improvement of business processes that require professional journey.
                 Maximum usage of resources and investment in information systems




         Mobility – A good investment                                             IT efficiency (13.7%)



                 Implementation cost retrieved in 4,3 months
                                                                                                     Other cost
                 ROI about 129% in the first year                             User                   reductions
                                                                       productivity                  (23.7%)
                                                                           (59.7%)
                 Better quality of life of employees
                                                                                               IT Productivity
                 Costs reduction in remote access and laptops                                  (3.0%)

                                                                                                          IDC - 2005



3
    Security Solutions & Services – SBL Enterprise - Architecture
Technology – Mobile Forms General Vision


             System description

                  Using a “normal” pen, with a high technology inside, whatever you write or
                  draw can be sent to a PC or using a mobile phone through the Internet, to
                  any web server local or remote.




4
    Security Solutions & Services – SBL Enterprise - Architecture
Technology – the device


             Components: Digital Pens
         Unique code: user identification



                                                                    BluetoothTM
                                                                Allow data transmitting


                                     Battery                 Memory
                                                            Store coordinates, pressure,
                                                            execution time, codes, etc.


                                                       Processor
                                                      Analyze images and establish
                                                      stroke coordinates

                                                Camera
                                                Capture pattern photos
                           Ink


5
    Security Solutions & Services – SBL Enterprise - Architecture
Technology – The Paper


             Paper components
                  Pattern

                            Great points combination (2 raised to the power of
                            72).
                            6x6 points area gives a unique position.
                            Establishment of pen position.
                            It allows specific functions definition.
                            It could be printed in a lot of surfaces.
                            Almost invisible.
                            It has a specific code for each application.




6
    Security Solutions & Services – SBL Enterprise - Architecture
Technology – General Architecture




                                   THASH: Thales Application Source Handler

                                   THOR: Thales prOcessing Router

7
    Security Solutions & Services – SBL Enterprise - Architecture
Technology - Security


             Security
                     Unique pattern in all the word:
                          Organization and application identification

                     Pen unique code in all the word:
                          User identification

                     Previous sending pattern code and pen code identification

                     It could be requested a PIN code before sending (using a mobile phone or a PC).

                     Only strokes are the data which is sent. Only coordinates in a paper not
                     related with the content semantic.

                     Whatever is written or drawn could be encrypted “end-to-end”

                     User could knows if his request had success, he could receive additional
                     information (SMS, etc)




8
    Security Solutions & Services – SBL Enterprise - Architecture
Business – Organizational Productivity


             Processes

             Processes optimization and cost reduction

              Current sending forms process:


                             Send     Delivery   Receipt

                                                                                           Data
                  Fulfill                                  Scan   Recognize   Validate   Extraction

                              FAX
                            Sending




              Sending forms using Digital Pen:

                                                                                           Data
                  Fulfill                                         Recognize   Validate   Extraction




9
    Security Solutions & Services – SBL Enterprise - Architecture
Thales Offer

               Integration and components: Thales supplies a set of
             components and tools to cover all the steps in the lifecycle of Digital
             Pen applications development and deployment:
                     Forms design and edition tools.
                     Router applications to allow sending data through mobile phones or
                     directly download into a PC platform.
                     Data forms management components.
                     Backend systems integration components
                     Form printing systems and license management.

               Infrastructures: Thales supplies infrastructures management
             services derived from the solution:
                     Hardware, basis software and server communications
                     Mobile devices management software

               Related services: adding value to achieve a 360 service:
                     Pens and paper licenses provisioning
                     Centralized printing service
                     Users and administrators training
                     Helpdesk service
                     Process consultancy
                     Backend integration consultancy
                     Change management
                     Verification service of handwriting recognition
10
     Security Solutions & Services – SBL Enterprise - Architecture
Success cases: example


              Technical Inspection of vehicles


                  VB.NET technology for the router in PC.

                  ASP.NET Server.

                  ASP.NET validation web.




11
     Security Solutions & Services – SBL Enterprise - Architecture
Success cases: example


               Gas Natural inspections


                  Java technology of router in the mobile
                  phone

                  J2EE Server

                  J2EE validation web




12
     Security Solutions & Services – SBL Enterprise - Architecture
Thank you for your attention

Weitere ähnliche Inhalte

Was ist angesagt?

Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
IDES Editor
 
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
Aberla
 
Evaluating thin client_security
Evaluating thin client_securityEvaluating thin client_security
Evaluating thin client_security
Nick Turunov
 

Was ist angesagt? (20)

Sa 008 patterns
Sa 008 patternsSa 008 patterns
Sa 008 patterns
 
05 architectural design
05 architectural design05 architectural design
05 architectural design
 
XP-Manchester 2013 Software Architecture for Agile Developers Intro
XP-Manchester 2013 Software Architecture for Agile Developers IntroXP-Manchester 2013 Software Architecture for Agile Developers Intro
XP-Manchester 2013 Software Architecture for Agile Developers Intro
 
Infrastructuregrowing
InfrastructuregrowingInfrastructuregrowing
Infrastructuregrowing
 
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
Desktop Transformation Success - The 5 Secrets to Delivering User Satisfactio...
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
 
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 
Managed BI Solutions for Telecommunications
Managed BI Solutions for TelecommunicationsManaged BI Solutions for Telecommunications
Managed BI Solutions for Telecommunications
 
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
ESEconf2011 - Cruywagen Leon: "Cool ways to work smarter in the cloud"
 
Expanding mission critical ci
Expanding mission critical ciExpanding mission critical ci
Expanding mission critical ci
 
SmartConnect-Mobility
SmartConnect-MobilitySmartConnect-Mobility
SmartConnect-Mobility
 
Evaluating thin client_security
Evaluating thin client_securityEvaluating thin client_security
Evaluating thin client_security
 
Software Architecture: Design Decisions
Software Architecture: Design DecisionsSoftware Architecture: Design Decisions
Software Architecture: Design Decisions
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12
 
I heat 2012-philipgaffney-l2s2
I heat 2012-philipgaffney-l2s2I heat 2012-philipgaffney-l2s2
I heat 2012-philipgaffney-l2s2
 
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...
 
Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Discovering Computers: Chapter 14
Discovering Computers: Chapter 14
 
Benno Zollner - Reshaping IT
Benno Zollner - Reshaping ITBenno Zollner - Reshaping IT
Benno Zollner - Reshaping IT
 
A vision on collaborative computation of things for personalized analyses
A vision on collaborative computation of things for personalized analysesA vision on collaborative computation of things for personalized analyses
A vision on collaborative computation of things for personalized analyses
 

Andere mochten auch

Digital pen.pptxdf
Digital pen.pptxdfDigital pen.pptxdf
Digital pen.pptxdf
Sumit Sharma
 
Digital pen
Digital penDigital pen
Digital pen
bengy1
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
Manu Priya
 
Smartpen presentation
Smartpen presentationSmartpen presentation
Smartpen presentation
jgomez27
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
veera
 

Andere mochten auch (20)

DIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTIONDIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTION
 
Paper, pen and digital
Paper, pen and digitalPaper, pen and digital
Paper, pen and digital
 
Digital pen 2016
Digital pen 2016Digital pen 2016
Digital pen 2016
 
Digital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika NigamDigital Jewellery compiled by Anshika Nigam
Digital Jewellery compiled by Anshika Nigam
 
Digital Pens - Firas Hijazi - FIATECH and COMIT
Digital Pens - Firas Hijazi - FIATECH and COMITDigital Pens - Firas Hijazi - FIATECH and COMIT
Digital Pens - Firas Hijazi - FIATECH and COMIT
 
Digital pen.pptxdf
Digital pen.pptxdfDigital pen.pptxdf
Digital pen.pptxdf
 
CubeIQ | Digital-Pen (eg1210-1)
CubeIQ | Digital-Pen (eg1210-1)CubeIQ | Digital-Pen (eg1210-1)
CubeIQ | Digital-Pen (eg1210-1)
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital pen
Digital penDigital pen
Digital pen
 
Digital Pen Presentation
Digital Pen PresentationDigital Pen Presentation
Digital Pen Presentation
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Smartpen presentation
Smartpen presentationSmartpen presentation
Smartpen presentation
 
New Age Digital Pen Presentation 05 2009
New Age Digital Pen Presentation 05 2009New Age Digital Pen Presentation 05 2009
New Age Digital Pen Presentation 05 2009
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
digital pen
digital pendigital pen
digital pen
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery by SH
Digital jewellery by SHDigital jewellery by SH
Digital jewellery by SH
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 

Ähnlich wie Digital Pen En 2008

INFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDSINFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDS
gopikurup
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
Duffy Fron
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
ISS
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
changcai
 
Clextra tablet applications
Clextra tablet applicationsClextra tablet applications
Clextra tablet applications
Edgevalue
 

Ähnlich wie Digital Pen En 2008 (20)

INFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDSINFOSEC LANDSCAPE AND RESEARCH TRENDS
INFOSEC LANDSCAPE AND RESEARCH TRENDS
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Software Factories in the Real World: How an IBM® WebSphere® Integration Fact...
Software Factories in the Real World: How an IBM® WebSphere® Integration Fact...Software Factories in the Real World: How an IBM® WebSphere® Integration Fact...
Software Factories in the Real World: How an IBM® WebSphere® Integration Fact...
 
Srayan guhathakurta resume
Srayan guhathakurta resumeSrayan guhathakurta resume
Srayan guhathakurta resume
 
Changing the economics of it
Changing the economics of itChanging the economics of it
Changing the economics of it
 
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Dell AI Telecom Webinar
Dell AI Telecom WebinarDell AI Telecom Webinar
Dell AI Telecom Webinar
 
Clextra tablet applications
Clextra tablet applicationsClextra tablet applications
Clextra tablet applications
 
Corporate overview 1.2
Corporate overview 1.2Corporate overview 1.2
Corporate overview 1.2
 
Micro Strategies Overview
Micro Strategies OverviewMicro Strategies Overview
Micro Strategies Overview
 
Big Data Beyond Hadoop*: Research Directions for the Future
Big Data Beyond Hadoop*: Research Directions for the FutureBig Data Beyond Hadoop*: Research Directions for the Future
Big Data Beyond Hadoop*: Research Directions for the Future
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
Bechtel On OpenID and OAuth from Cloud Identity Summit
Bechtel On OpenID and OAuth from Cloud Identity SummitBechtel On OpenID and OAuth from Cloud Identity Summit
Bechtel On OpenID and OAuth from Cloud Identity Summit
 
Portfoli Sci English V2010
Portfoli Sci English V2010Portfoli Sci English V2010
Portfoli Sci English V2010
 

Digital Pen En 2008

  • 1. Digital Pen Solutions Security Solutions & Services – SBL Enterprise - Architecture
  • 2. Contents Contents Overview Technology Business Success cases 2 Security Solutions & Services – SBL Enterprise - Architecture
  • 3. Overview Mobility – Anywhere at Anytime Breaking static links with the office, where the information systems are located. Optimization - improvement of business processes that require professional journey. Maximum usage of resources and investment in information systems Mobility – A good investment IT efficiency (13.7%) Implementation cost retrieved in 4,3 months Other cost ROI about 129% in the first year User reductions productivity (23.7%) (59.7%) Better quality of life of employees IT Productivity Costs reduction in remote access and laptops (3.0%) IDC - 2005 3 Security Solutions & Services – SBL Enterprise - Architecture
  • 4. Technology – Mobile Forms General Vision System description Using a “normal” pen, with a high technology inside, whatever you write or draw can be sent to a PC or using a mobile phone through the Internet, to any web server local or remote. 4 Security Solutions & Services – SBL Enterprise - Architecture
  • 5. Technology – the device Components: Digital Pens Unique code: user identification BluetoothTM Allow data transmitting Battery Memory Store coordinates, pressure, execution time, codes, etc. Processor Analyze images and establish stroke coordinates Camera Capture pattern photos Ink 5 Security Solutions & Services – SBL Enterprise - Architecture
  • 6. Technology – The Paper Paper components Pattern Great points combination (2 raised to the power of 72). 6x6 points area gives a unique position. Establishment of pen position. It allows specific functions definition. It could be printed in a lot of surfaces. Almost invisible. It has a specific code for each application. 6 Security Solutions & Services – SBL Enterprise - Architecture
  • 7. Technology – General Architecture THASH: Thales Application Source Handler THOR: Thales prOcessing Router 7 Security Solutions & Services – SBL Enterprise - Architecture
  • 8. Technology - Security Security Unique pattern in all the word: Organization and application identification Pen unique code in all the word: User identification Previous sending pattern code and pen code identification It could be requested a PIN code before sending (using a mobile phone or a PC). Only strokes are the data which is sent. Only coordinates in a paper not related with the content semantic. Whatever is written or drawn could be encrypted “end-to-end” User could knows if his request had success, he could receive additional information (SMS, etc) 8 Security Solutions & Services – SBL Enterprise - Architecture
  • 9. Business – Organizational Productivity Processes Processes optimization and cost reduction Current sending forms process: Send Delivery Receipt Data Fulfill Scan Recognize Validate Extraction FAX Sending Sending forms using Digital Pen: Data Fulfill Recognize Validate Extraction 9 Security Solutions & Services – SBL Enterprise - Architecture
  • 10. Thales Offer Integration and components: Thales supplies a set of components and tools to cover all the steps in the lifecycle of Digital Pen applications development and deployment: Forms design and edition tools. Router applications to allow sending data through mobile phones or directly download into a PC platform. Data forms management components. Backend systems integration components Form printing systems and license management. Infrastructures: Thales supplies infrastructures management services derived from the solution: Hardware, basis software and server communications Mobile devices management software Related services: adding value to achieve a 360 service: Pens and paper licenses provisioning Centralized printing service Users and administrators training Helpdesk service Process consultancy Backend integration consultancy Change management Verification service of handwriting recognition 10 Security Solutions & Services – SBL Enterprise - Architecture
  • 11. Success cases: example Technical Inspection of vehicles VB.NET technology for the router in PC. ASP.NET Server. ASP.NET validation web. 11 Security Solutions & Services – SBL Enterprise - Architecture
  • 12. Success cases: example Gas Natural inspections Java technology of router in the mobile phone J2EE Server J2EE validation web 12 Security Solutions & Services – SBL Enterprise - Architecture
  • 13. Thank you for your attention