SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Yiannis Hatzopoulos
Scientific Engineering Services
A USB CardJava Dongle offering
•Anti-Piracy protection
•Digital Rights Management
•eCommerce security
•Secure conditional access to local
and remote computational resources
•Complex licensing schemes support
CER2005-Brussels
Recipient of the eGateOpen
2004 Jury Award,
sponsored by Sun Micro, ST, Axalto
eSmartLock
USB
CardJava
Dongle
Anti-Piracy module
Secure eCommerce Token
ERP/ CRM connectivity
TimeStamp authenticator
Lease / Pay-as-you-use
Digital Right Management
support
Crypto web access
Secure CD / DVD access
Secure local Save/Load
operation support
Multi – User
Concurrency Licensing
administrator
eSignature generator and
authenticator
Key Distribution Server
on LANs and WANs
eSmartLock API service delivery
Certificate
AntiPiracy
Protection
ERP/CRM eBilling
Server
eSignature
Validation
Protected
CD/ DVD
access Internet Crypto
Access
Soft Product Key / Credits / DRM
eSessioning
Encrypted Storage
on Hard Disk
Trusted Third
Party – VPN service
Trusted Third
Party – VPN service
+
eSmartLock Functional
Components
eGate K(R)
eGate
K(R)
eGate eGate
K(R)
PC
to Card
authentication
Card to PC
authentication
Card to Card
authentication
eSmartLock mutual authentication patterns
Client
Server
R
R
R
Renv
Envelope Key generation
Card RSA Public Key
Renv( TicketKey)
Ticket Key
3DES, Renv
Ticket key Encrypted
Channel
eSmartLock Ticket Key generation
MS CryptoAPI
RSAREF2 API
Challenge
CardID Soft Product Key Data MAC
Soft Product Key
It only decodes on a specific card
Credit Update Operation
Soft Product Key Data
Credit Credit UpdateData
New
Authenticated TimeStamp
Generic DRM Command Set
Soft Product Key Data
On Card Parser
PC based DRM parser ( option sets / keysets / commands etc)
On PC Parser
Vendor’s Order Processing dept
Compiles
DRM request from Customer
eSmartLock Soft Product Key Processing pattern
PersistentStorageonCard
DRM Command
eSmartLock
Digital Rights
Management
Business rules
Card controlled
Individualization
Rights revocation
Rights renewal
Secure delivery path
Trial
Leasing
Pay-per-use
Rights Transfer
Conventional licencing
Flexible Multi-User
Licensing
Produces RSA
encrypted PK
[CardID,eSession
Key,K(eSessionKey),
K(TimeStamp)]
eSession Request:
Encrypts K[Random pad,
CardID, eSession parameters]
Performs RSA Private
Key decryption,
authenticates with K
=> eSessionKey,
TimeStamp
Internet
Secure
Channel
eSessionKey
TimeStamp
eSmartLock
eSmartLock eSessioning
Content
Access
Server/ ERP
eGate eGate
eGate
Object of Interest
eSmartLock
Public Keys
ESmartLock
Client i
Access
Control
List
Authenticate Identity - Submit PK
Authorized Services
ESmartLock
Server
CA - KDC
ESmartLock
Client A
Client PK Registration
eGate
ESmartLock
Client B
B’s Public Key
A’sPublicKey
VPN
eSignature
Checks
Key Distribution
Center function
Store PK
safely
eSmartLock Client – Server
Trusted Third Party Service
Extranet
N Max Active Concurrent Licenses allowed
eSmartLockServereSmartLockClients
eSmartLock concurrency licensing
Dynamic
License ID
storage
eSmartLock
K User Population
010010100100010100101001000001
100101000101001010100101010011
101001010101001010100101010010
101010101010010101001010101001
010101010100101010101001010101
111110100101010111110100101011
Secure Hash Algorithm
Encrypt with
RSA Private Key
Signature
010010100100010100101001000001
100101000101001010100101010011
101001010101001010100101010010
101010101010010101001010101001
010101010100101010101001010101
111110100101010111110100101011
Signature
Secure Hash
Algorithm Decrypt with
RSA Public Key
ComparisonThe RSA Public key is imported
from an eSmartLock KDC
eSignature Creation eSignature Verification
eSmartLock eSignature support
Sourcedata
eSmartLock antiPiracy functionality
•Mutual authentication pattern PC-Card
•PC – Card Communication based on Tickets
•onCard attack detector
•Secure access onCard parameter file
•Byte buffer unlocker on PC memory
•Executable code on-Card repository: exe and java based
•Debugger detection – interrupt vector redirection
•Time-trapping to detect tracing attacks
•Runtime code decryption layers
•Use of dumb threads
•External code calls on Card

Más contenido relacionado

Destacado

Deutsche Welle Islamic SIM story in english
Deutsche Welle Islamic SIM story in englishDeutsche Welle Islamic SIM story in english
Deutsche Welle Islamic SIM story in englishYiannis Hatzopoulos
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitiesYiannis Hatzopoulos
 
CER (Communicating European Research) event news _en Brussels Belgium
CER (Communicating European Research) event news _en Brussels BelgiumCER (Communicating European Research) event news _en Brussels Belgium
CER (Communicating European Research) event news _en Brussels BelgiumYiannis Hatzopoulos
 
Mobile world magazine - SIM card for Muslims
Mobile world magazine - SIM card for MuslimsMobile world magazine - SIM card for Muslims
Mobile world magazine - SIM card for MuslimsYiannis Hatzopoulos
 
Araboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليدية
Araboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليديةAraboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليدية
Araboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليديةYiannis Hatzopoulos
 
Africanword.tv Islamic SIM to be showcased in Africa
Africanword.tv Islamic SIM to be showcased in AfricaAfricanword.tv Islamic SIM to be showcased in Africa
Africanword.tv Islamic SIM to be showcased in AfricaYiannis Hatzopoulos
 
Salam news Russia. Islamic SIM Card
Salam news Russia. Islamic SIM CardSalam news Russia. Islamic SIM Card
Salam news Russia. Islamic SIM CardYiannis Hatzopoulos
 
Κάρτα SIM με ειδικές λειτουργίες για μουσουλμάνους
Κάρτα SIM με ειδικές λειτουργίες για μουσουλμάνουςΚάρτα SIM με ειδικές λειτουργίες για μουσουλμάνους
Κάρτα SIM με ειδικές λειτουργίες για μουσουλμάνουςYiannis Hatzopoulos
 
Συνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.gr
Συνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.grΣυνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.gr
Συνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.grYiannis Hatzopoulos
 
IST Aim Energy management device d3-1-1-1v1-0
IST Aim Energy management device d3-1-1-1v1-0IST Aim Energy management device d3-1-1-1v1-0
IST Aim Energy management device d3-1-1-1v1-0Yiannis Hatzopoulos
 
Nigeria weekly standard - SIM Card for Muslims
Nigeria weekly standard - SIM Card for MuslimsNigeria weekly standard - SIM Card for Muslims
Nigeria weekly standard - SIM Card for MuslimsYiannis Hatzopoulos
 
Fortune Greece - Islamic SIM story in english
Fortune Greece - Islamic SIM story in englishFortune Greece - Islamic SIM story in english
Fortune Greece - Islamic SIM story in englishYiannis Hatzopoulos
 
Mongolia islam. SIM Card for Muslims report
Mongolia islam. SIM Card for Muslims reportMongolia islam. SIM Card for Muslims report
Mongolia islam. SIM Card for Muslims reportYiannis Hatzopoulos
 
Islamic sim to be showcased in Africa
Islamic sim  to be showcased in AfricaIslamic sim  to be showcased in Africa
Islamic sim to be showcased in AfricaYiannis Hatzopoulos
 
Islamic SIM card report KERDOS.GR
Islamic SIM card report KERDOS.GRIslamic SIM card report KERDOS.GR
Islamic SIM card report KERDOS.GRYiannis Hatzopoulos
 
Deutsche Welle - Islamic SIM in Bengali
Deutsche Welle - Islamic SIM in BengaliDeutsche Welle - Islamic SIM in Bengali
Deutsche Welle - Islamic SIM in BengaliYiannis Hatzopoulos
 
Islamic SIM Card - European Venture Summit 2012 Berlin
Islamic SIM Card - European Venture Summit 2012 BerlinIslamic SIM Card - European Venture Summit 2012 Berlin
Islamic SIM Card - European Venture Summit 2012 BerlinYiannis Hatzopoulos
 

Destacado (20)

Deutsche Welle Islamic SIM story in english
Deutsche Welle Islamic SIM story in englishDeutsche Welle Islamic SIM story in english
Deutsche Welle Islamic SIM story in english
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
 
Teller pass slides
Teller pass slidesTeller pass slides
Teller pass slides
 
Simagine KonnexSIM award 2009
Simagine KonnexSIM award 2009Simagine KonnexSIM award 2009
Simagine KonnexSIM award 2009
 
CER (Communicating European Research) event news _en Brussels Belgium
CER (Communicating European Research) event news _en Brussels BelgiumCER (Communicating European Research) event news _en Brussels Belgium
CER (Communicating European Research) event news _en Brussels Belgium
 
Hajj Sim Geotracker public
Hajj Sim Geotracker publicHajj Sim Geotracker public
Hajj Sim Geotracker public
 
Mobile world magazine - SIM card for Muslims
Mobile world magazine - SIM card for MuslimsMobile world magazine - SIM card for Muslims
Mobile world magazine - SIM card for Muslims
 
Araboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليدية
Araboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليديةAraboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليدية
Araboftoday.com يوناني يخترع شريحة “إسلامية” للهواتف التقليدية
 
Africanword.tv Islamic SIM to be showcased in Africa
Africanword.tv Islamic SIM to be showcased in AfricaAfricanword.tv Islamic SIM to be showcased in Africa
Africanword.tv Islamic SIM to be showcased in Africa
 
Salam news Russia. Islamic SIM Card
Salam news Russia. Islamic SIM CardSalam news Russia. Islamic SIM Card
Salam news Russia. Islamic SIM Card
 
Κάρτα SIM με ειδικές λειτουργίες για μουσουλμάνους
Κάρτα SIM με ειδικές λειτουργίες για μουσουλμάνουςΚάρτα SIM με ειδικές λειτουργίες για μουσουλμάνους
Κάρτα SIM με ειδικές λειτουργίες για μουσουλμάνους
 
Συνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.gr
Συνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.grΣυνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.gr
Συνέντευξη για το σχεδιασμό της Ισλαμικής κάρτας SIM στο Islam.gr
 
IST Aim Energy management device d3-1-1-1v1-0
IST Aim Energy management device d3-1-1-1v1-0IST Aim Energy management device d3-1-1-1v1-0
IST Aim Energy management device d3-1-1-1v1-0
 
Nigeria weekly standard - SIM Card for Muslims
Nigeria weekly standard - SIM Card for MuslimsNigeria weekly standard - SIM Card for Muslims
Nigeria weekly standard - SIM Card for Muslims
 
Fortune Greece - Islamic SIM story in english
Fortune Greece - Islamic SIM story in englishFortune Greece - Islamic SIM story in english
Fortune Greece - Islamic SIM story in english
 
Mongolia islam. SIM Card for Muslims report
Mongolia islam. SIM Card for Muslims reportMongolia islam. SIM Card for Muslims report
Mongolia islam. SIM Card for Muslims report
 
Islamic sim to be showcased in Africa
Islamic sim  to be showcased in AfricaIslamic sim  to be showcased in Africa
Islamic sim to be showcased in Africa
 
Islamic SIM card report KERDOS.GR
Islamic SIM card report KERDOS.GRIslamic SIM card report KERDOS.GR
Islamic SIM card report KERDOS.GR
 
Deutsche Welle - Islamic SIM in Bengali
Deutsche Welle - Islamic SIM in BengaliDeutsche Welle - Islamic SIM in Bengali
Deutsche Welle - Islamic SIM in Bengali
 
Islamic SIM Card - European Venture Summit 2012 Berlin
Islamic SIM Card - European Venture Summit 2012 BerlinIslamic SIM Card - European Venture Summit 2012 Berlin
Islamic SIM Card - European Venture Summit 2012 Berlin
 

Similar a eSmartLock CER 2005 show Brussels

Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonGreg Stone
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...Tom Diederich
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+AppViewX
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate ManagerAnita Benett
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7koolkampus
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015Chandra Patni
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service Nya
 
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...Edge AI and Vision Alliance
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Securityguest2a5a03
 
Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7Eugene Sushchenko
 

Similar a eSmartLock CER 2005 show Brussels (20)

eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, Boston
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Unit 5 m commerce
Unit 5 m commerceUnit 5 m commerce
Unit 5 m commerce
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate Manager
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service
 
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7
 

Más de Yiannis Hatzopoulos

Más de Yiannis Hatzopoulos (20)

Islamic SIM application server
Islamic SIM application serverIslamic SIM application server
Islamic SIM application server
 
Keletron Card SmartGrids Amsterdam
Keletron Card SmartGrids AmsterdamKeletron Card SmartGrids Amsterdam
Keletron Card SmartGrids Amsterdam
 
LogosSolvo-Islamic-SIM-Service-Brochure.pdf
LogosSolvo-Islamic-SIM-Service-Brochure.pdfLogosSolvo-Islamic-SIM-Service-Brochure.pdf
LogosSolvo-Islamic-SIM-Service-Brochure.pdf
 
2nd_059-069_ChatzopoulosI.pdf
2nd_059-069_ChatzopoulosI.pdf2nd_059-069_ChatzopoulosI.pdf
2nd_059-069_ChatzopoulosI.pdf
 
milipants.pdf
milipants.pdfmilipants.pdf
milipants.pdf
 
EOS_Wedding_gown.pdf
EOS_Wedding_gown.pdfEOS_Wedding_gown.pdf
EOS_Wedding_gown.pdf
 
Sealoc Poster
Sealoc PosterSealoc Poster
Sealoc Poster
 
Sealoc exhibited
Sealoc  exhibitedSealoc  exhibited
Sealoc exhibited
 
Weather map rendering engine Sealoc
Weather map rendering engine SealocWeather map rendering engine Sealoc
Weather map rendering engine Sealoc
 
Ofire+ public thermis_manual
Ofire+ public thermis_manualOfire+ public thermis_manual
Ofire+ public thermis_manual
 
Ofire+ dimos thermis_manual
Ofire+ dimos thermis_manualOfire+ dimos thermis_manual
Ofire+ dimos thermis_manual
 
Getronics / Ingenico TT41
Getronics / Ingenico TT41Getronics / Ingenico TT41
Getronics / Ingenico TT41
 
SmsVoice it
SmsVoice itSmsVoice it
SmsVoice it
 
Lexicon 4 lang science terminology dictionary
Lexicon 4 lang science terminology dictionaryLexicon 4 lang science terminology dictionary
Lexicon 4 lang science terminology dictionary
 
ELETO - 4 language science dictionary
ELETO - 4 language science dictionaryELETO - 4 language science dictionary
ELETO - 4 language science dictionary
 
Islamic sim European Venture Summit
Islamic sim European Venture SummitIslamic sim European Venture Summit
Islamic sim European Venture Summit
 
Intellibox
IntelliboxIntellibox
Intellibox
 
Chipper + TT41 POS terminal
Chipper + TT41 POS terminalChipper + TT41 POS terminal
Chipper + TT41 POS terminal
 
USB_Antipiracy_dongle
USB_Antipiracy_dongleUSB_Antipiracy_dongle
USB_Antipiracy_dongle
 
Bluefish islamic-sim-service
Bluefish islamic-sim-serviceBluefish islamic-sim-service
Bluefish islamic-sim-service
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

eSmartLock CER 2005 show Brussels

  • 1. Yiannis Hatzopoulos Scientific Engineering Services A USB CardJava Dongle offering •Anti-Piracy protection •Digital Rights Management •eCommerce security •Secure conditional access to local and remote computational resources •Complex licensing schemes support CER2005-Brussels Recipient of the eGateOpen 2004 Jury Award, sponsored by Sun Micro, ST, Axalto
  • 2. eSmartLock USB CardJava Dongle Anti-Piracy module Secure eCommerce Token ERP/ CRM connectivity TimeStamp authenticator Lease / Pay-as-you-use Digital Right Management support Crypto web access Secure CD / DVD access Secure local Save/Load operation support Multi – User Concurrency Licensing administrator eSignature generator and authenticator Key Distribution Server on LANs and WANs eSmartLock API service delivery
  • 3. Certificate AntiPiracy Protection ERP/CRM eBilling Server eSignature Validation Protected CD/ DVD access Internet Crypto Access Soft Product Key / Credits / DRM eSessioning Encrypted Storage on Hard Disk Trusted Third Party – VPN service Trusted Third Party – VPN service + eSmartLock Functional Components
  • 4. eGate K(R) eGate K(R) eGate eGate K(R) PC to Card authentication Card to PC authentication Card to Card authentication eSmartLock mutual authentication patterns Client Server R R R
  • 5. Renv Envelope Key generation Card RSA Public Key Renv( TicketKey) Ticket Key 3DES, Renv Ticket key Encrypted Channel eSmartLock Ticket Key generation MS CryptoAPI RSAREF2 API
  • 6. Challenge CardID Soft Product Key Data MAC Soft Product Key It only decodes on a specific card Credit Update Operation Soft Product Key Data Credit Credit UpdateData New Authenticated TimeStamp Generic DRM Command Set Soft Product Key Data On Card Parser PC based DRM parser ( option sets / keysets / commands etc) On PC Parser Vendor’s Order Processing dept Compiles DRM request from Customer eSmartLock Soft Product Key Processing pattern PersistentStorageonCard DRM Command
  • 7. eSmartLock Digital Rights Management Business rules Card controlled Individualization Rights revocation Rights renewal Secure delivery path Trial Leasing Pay-per-use Rights Transfer Conventional licencing Flexible Multi-User Licensing
  • 8. Produces RSA encrypted PK [CardID,eSession Key,K(eSessionKey), K(TimeStamp)] eSession Request: Encrypts K[Random pad, CardID, eSession parameters] Performs RSA Private Key decryption, authenticates with K => eSessionKey, TimeStamp Internet Secure Channel eSessionKey TimeStamp eSmartLock eSmartLock eSessioning Content Access Server/ ERP
  • 9. eGate eGate eGate Object of Interest eSmartLock Public Keys ESmartLock Client i Access Control List Authenticate Identity - Submit PK Authorized Services ESmartLock Server CA - KDC ESmartLock Client A Client PK Registration eGate ESmartLock Client B B’s Public Key A’sPublicKey VPN eSignature Checks Key Distribution Center function Store PK safely eSmartLock Client – Server Trusted Third Party Service Extranet
  • 10. N Max Active Concurrent Licenses allowed eSmartLockServereSmartLockClients eSmartLock concurrency licensing Dynamic License ID storage eSmartLock K User Population
  • 11. 010010100100010100101001000001 100101000101001010100101010011 101001010101001010100101010010 101010101010010101001010101001 010101010100101010101001010101 111110100101010111110100101011 Secure Hash Algorithm Encrypt with RSA Private Key Signature 010010100100010100101001000001 100101000101001010100101010011 101001010101001010100101010010 101010101010010101001010101001 010101010100101010101001010101 111110100101010111110100101011 Signature Secure Hash Algorithm Decrypt with RSA Public Key ComparisonThe RSA Public key is imported from an eSmartLock KDC eSignature Creation eSignature Verification eSmartLock eSignature support Sourcedata
  • 12. eSmartLock antiPiracy functionality •Mutual authentication pattern PC-Card •PC – Card Communication based on Tickets •onCard attack detector •Secure access onCard parameter file •Byte buffer unlocker on PC memory •Executable code on-Card repository: exe and java based •Debugger detection – interrupt vector redirection •Time-trapping to detect tracing attacks •Runtime code decryption layers •Use of dumb threads •External code calls on Card