SlideShare a Scribd company logo
1 of 12
JAVA CARD

Prepared by : Jakasaniya Ravi
Roll no : MCA13
CONTENTS










Introduction
History
What is Java Card
Architecture
Working
Applications
Challenges
Conclusion
INTRODUCTION


Java Card refers to a technology that allows javabased applications(applets)to be run securely on
smart cards and similar small memory footprint
devices.



Java Card gives the user ability to program the
device and make them application specific.



The Java Card is an extremely secure Javapowered electronic token.



Java Card could have a number of real-world
applications.
HISTORY
YEAR

VERSION

1996

FUNCTIONALITY
Introduction of Java Card technology

1997

Java Card 2.0

Technology Foundations

1999

Java Card 2.1

Interoperable File Format

2000

Java Card
2.1.1

Additional Crypto APIs

2002

Java Card 2.2

Next gen crypto ,memory management

2003

Java Card
2.2.1

Enhancements for USIM

2006

Java Card
2.2.2

Contactless

2008

Java Card 3.0

“Classic ” and “Connected”
WHAT IS JAVA CARD?
A

programmable smart card

 A multi-application

 An

smart card

interoperable smart card

 A smart

card for secure application loading
ARCHITECTURE
JAVA CARD ARCHITECTURE
- HARDWARE


64 KB ROM



32 KB EEPROM



28 KB available for the customer



2 KB RAM



Slow and simple microprocessor(8-bit)
WORKING
APPLICATION AREAS

Financial
• Smart Credit / Debit
• E-Purses
• Loyalty Programs

Mobile Communication
• Infotainment
• Business Support
• Network Optimizers
CHALLENGES


Java cards have very restricted resources
1.Limited Memory
2.Limited Computing Power
 Java Card doesn’t support some of java features
1.Large primitive data types : long, double,
float
2.char,string
3.Multidimensional array
4.Dynamic class loading
5.Garbage collection
6.Multithreading
7.Object Cloning
CONCLUSION


The java card adds a new platform to the world of
java.
 Java card is a significant step forward.
 Realistic threats exist also for java card.
 Off-card verification is more risky than it seems.
 Java card issuers to counter act the threats.
 Java card security is attainable.
THANK YOU

More Related Content

What's hot

Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhanJana Vontari
 
430525618-Snapdragon-processors-seminar.pptx
430525618-Snapdragon-processors-seminar.pptx430525618-Snapdragon-processors-seminar.pptx
430525618-Snapdragon-processors-seminar.pptxShyamPriya2
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernetMohammad Waziruddin
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologyapuneet bhatia
 
E notice board project report
E notice board project reportE notice board project report
E notice board project reportamit chaudhary
 
Presentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security SystemPresentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security SystemSagar Magarde
 
Introduction to beamforming antennas
Introduction to beamforming antennasIntroduction to beamforming antennas
Introduction to beamforming antennasJOSE T Y
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsAkhil Kumar
 

What's hot (20)

Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhan
 
430525618-Snapdragon-processors-seminar.pptx
430525618-Snapdragon-processors-seminar.pptx430525618-Snapdragon-processors-seminar.pptx
430525618-Snapdragon-processors-seminar.pptx
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
 
Smart Card
Smart CardSmart Card
Smart Card
 
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
 
IOT report
IOT reportIOT report
IOT report
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
Smart card technologya
Smart card technologyaSmart card technologya
Smart card technologya
 
Smart card
Smart cardSmart card
Smart card
 
Ipsec
IpsecIpsec
Ipsec
 
iOS platform
iOS platformiOS platform
iOS platform
 
Cryptography
CryptographyCryptography
Cryptography
 
E notice board project report
E notice board project reportE notice board project report
E notice board project report
 
Java Ring
Java RingJava Ring
Java Ring
 
Presentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security SystemPresentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security System
 
PPT on iOS
PPT on iOS PPT on iOS
PPT on iOS
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Introduction to beamforming antennas
Introduction to beamforming antennasIntroduction to beamforming antennas
Introduction to beamforming antennas
 
SOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victimsSOS transmission through cellular phones to help accident victims
SOS transmission through cellular phones to help accident victims
 

Viewers also liked

Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java CardAnshuman Sinha
 
jCardSim – Java Card is simple!
jCardSim – Java Card is simple!jCardSim – Java Card is simple!
jCardSim – Java Card is simple!Mikhail Dudarev
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java CardJulien SIMON
 
Step-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected PlatformStep-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected PlatformEric Vétillard
 
Technical seminar project stalin babu m 116_f1a0471
Technical seminar project  stalin babu m  116_f1a0471Technical seminar project  stalin babu m  116_f1a0471
Technical seminar project stalin babu m 116_f1a0471STALIN BABU
 
SSD - Solid State Drive PPT by Atishay Jain
SSD - Solid State Drive PPT by Atishay JainSSD - Solid State Drive PPT by Atishay Jain
SSD - Solid State Drive PPT by Atishay JainAtishay Jain
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewelleryManu Priya
 
Pt Sankyu Indonesia International
Pt Sankyu Indonesia InternationalPt Sankyu Indonesia International
Pt Sankyu Indonesia Internationalarmenaldrin
 
Solid State Drives (Third Generation) 2013
Solid State Drives (Third Generation) 2013Solid State Drives (Third Generation) 2013
Solid State Drives (Third Generation) 2013Hemanth HR
 
Introduction to Thrift
Introduction to ThriftIntroduction to Thrift
Introduction to ThriftDvir Volk
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos Shyam Jos
 
Digital jewellery by SH
Digital jewellery by SHDigital jewellery by SH
Digital jewellery by SHshhajira
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery pptNida Khan
 

Viewers also liked (20)

Java card technology
Java card technologyJava card technology
Java card technology
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Javacardtech
JavacardtechJavacardtech
Javacardtech
 
Technical Overview of Java Card
Technical Overview of Java CardTechnical Overview of Java Card
Technical Overview of Java Card
 
jCardSim – Java Card is simple!
jCardSim – Java Card is simple!jCardSim – Java Card is simple!
jCardSim – Java Card is simple!
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java Card
 
Step-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected PlatformStep-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected Platform
 
Technical seminar project stalin babu m 116_f1a0471
Technical seminar project  stalin babu m  116_f1a0471Technical seminar project  stalin babu m  116_f1a0471
Technical seminar project stalin babu m 116_f1a0471
 
SSD - Solid State Drive PPT by Atishay Jain
SSD - Solid State Drive PPT by Atishay JainSSD - Solid State Drive PPT by Atishay Jain
SSD - Solid State Drive PPT by Atishay Jain
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Smart Cards Evolution
Smart Cards EvolutionSmart Cards Evolution
Smart Cards Evolution
 
Pt Sankyu Indonesia International
Pt Sankyu Indonesia InternationalPt Sankyu Indonesia International
Pt Sankyu Indonesia International
 
Solid State Drives (Third Generation) 2013
Solid State Drives (Third Generation) 2013Solid State Drives (Third Generation) 2013
Solid State Drives (Third Generation) 2013
 
Introduction to Thrift
Introduction to ThriftIntroduction to Thrift
Introduction to Thrift
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos
 
Dif fft
Dif fftDif fft
Dif fft
 
Digital jewellery by SH
Digital jewellery by SHDigital jewellery by SH
Digital jewellery by SH
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 

Similar to Java card (20)

JAVA CARD BY SAIKIRAN PANJALA
JAVA CARD BY SAIKIRAN PANJALAJAVA CARD BY SAIKIRAN PANJALA
JAVA CARD BY SAIKIRAN PANJALA
 
java Ring
java Ringjava Ring
java Ring
 
Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)Java Card 2.x FAQ (2001)
Java Card 2.x FAQ (2001)
 
Study of Java Card and its Application
Study of Java Card and its ApplicationStudy of Java Card and its Application
Study of Java Card and its Application
 
Java card
Java card Java card
Java card
 
Java card technology
Java card technologyJava card technology
Java card technology
 
java-ring
 java-ring java-ring
java-ring
 
New Ring
New RingNew Ring
New Ring
 
Java Card Technology: The Foundations of NFC
Java Card Technology: The Foundations of NFCJava Card Technology: The Foundations of NFC
Java Card Technology: The Foundations of NFC
 
PlaySIM Project Java One 2009
PlaySIM Project Java One 2009PlaySIM Project Java One 2009
PlaySIM Project Java One 2009
 
Java Ring
Java RingJava Ring
Java Ring
 
What is smart card on tam
What is smart card on tamWhat is smart card on tam
What is smart card on tam
 
Java Ring
Java RingJava Ring
Java Ring
 
Java ring
Java ringJava ring
Java ring
 
Introduction to java micro edition
Introduction to java micro editionIntroduction to java micro edition
Introduction to java micro edition
 
Blackberry Development Environment
Blackberry Development EnvironmentBlackberry Development Environment
Blackberry Development Environment
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Tu dresden 290404_jcop
Tu dresden 290404_jcopTu dresden 290404_jcop
Tu dresden 290404_jcop
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future King
 
Training Seminar
Training SeminarTraining Seminar
Training Seminar
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Java card

  • 1. JAVA CARD Prepared by : Jakasaniya Ravi Roll no : MCA13
  • 2. CONTENTS         Introduction History What is Java Card Architecture Working Applications Challenges Conclusion
  • 3. INTRODUCTION  Java Card refers to a technology that allows javabased applications(applets)to be run securely on smart cards and similar small memory footprint devices.  Java Card gives the user ability to program the device and make them application specific.  The Java Card is an extremely secure Javapowered electronic token.  Java Card could have a number of real-world applications.
  • 4. HISTORY YEAR VERSION 1996 FUNCTIONALITY Introduction of Java Card technology 1997 Java Card 2.0 Technology Foundations 1999 Java Card 2.1 Interoperable File Format 2000 Java Card 2.1.1 Additional Crypto APIs 2002 Java Card 2.2 Next gen crypto ,memory management 2003 Java Card 2.2.1 Enhancements for USIM 2006 Java Card 2.2.2 Contactless 2008 Java Card 3.0 “Classic ” and “Connected”
  • 5. WHAT IS JAVA CARD? A programmable smart card  A multi-application  An smart card interoperable smart card  A smart card for secure application loading
  • 7. JAVA CARD ARCHITECTURE - HARDWARE  64 KB ROM  32 KB EEPROM  28 KB available for the customer  2 KB RAM  Slow and simple microprocessor(8-bit)
  • 9. APPLICATION AREAS Financial • Smart Credit / Debit • E-Purses • Loyalty Programs Mobile Communication • Infotainment • Business Support • Network Optimizers
  • 10. CHALLENGES  Java cards have very restricted resources 1.Limited Memory 2.Limited Computing Power  Java Card doesn’t support some of java features 1.Large primitive data types : long, double, float 2.char,string 3.Multidimensional array 4.Dynamic class loading 5.Garbage collection 6.Multithreading 7.Object Cloning
  • 11. CONCLUSION  The java card adds a new platform to the world of java.  Java card is a significant step forward.  Realistic threats exist also for java card.  Off-card verification is more risky than it seems.  Java card issuers to counter act the threats.  Java card security is attainable.