Gemalto

Displaying 1-10 of 10 results

  • White Papers // Dec 2013

    Building the Business Case for Cloud SSO

    There are many compelling reasons to add Single Sign-On (SSO) to the cloud applications their business uses. Maybe the user want to get better control over the cloud-based applications employees and contractors are using for their business. Perhaps the user are worried about insecure or shared passwords. People might be...

    Provided By Gemalto

  • White Papers // Nov 2013

    Two-Factor Authentication for Cloud Applications

    The One-Time Password (OTP) can be a special case. It's a pin or password generated at the time of the connection - hence something the user know. It has a very short life, so even if a keylogger steals it, they cannot use it. But if the user have the...

    Provided By Gemalto

  • White Papers // Nov 2013

    Identity and Access Management in the Cloud: A Primer

    Enter cloud-based applications. Businesses using cloud applications have a whole new set of challenges around managing identity for applications that are inherently outside their control. Their users may not even be within their own networks when connecting to cloud-based applications on the business' behalf. Whether people are accessing hosted email,...

    Provided By Gemalto

  • White Papers // Mar 2010

    A Smarter Way to Store PKI Credentials

    Public key infrastructure (PKI) is a proven technology for identity and access management systems that improves IT security and enables secure logon, file encryption, and digital signature for transactions. Other tangible benefits include increased productivity, lower help desk costs for password support and reduced operating expenses due to process enhancements....

    Provided By Gemalto

  • White Papers // Apr 2009

    A Browser-Based Approach to Smart Card Connectivity

    Smart cards have provided security services for a wide range of applications including telecommunication, banking, and citizen identification. Connecting web applications with smart cards is a natural step forward to address some of the security issues in today's Web. The traditional approach for smart card based web applications provides security,...

    Provided By Gemalto

  • White Papers // Jan 2009

    Telecommunications: The Role of the UICC in Long Term Evolution All IP Networks

    The UICC (Universal Integrated Circuit Card) is the smart card used in mobile terminals for GSM and UMTS/3G networks. It authenticates the subscriber to the network while ensuring the integrity and security of their personal data. It also stores applications for both operator and end-user use for the correct deployment...

    Provided By Gemalto

  • White Papers // Oct 2008

    Security and Trust in Mobile Applications

    Traditionally, the mobile application environment has been relatively easy to manage. Operators preloaded devices with some applications, and other applications were made available only via purchase directly from the service provider. In this paradigm, the applet space could be easily controlled by validating each applet on new devices before launch,...

    Provided By Gemalto

  • White Papers // Oct 2008

    Operating Software in Secure Electronic Documents

    Secure documents such as passports, identity cards, driver licenses and healthcare cards can be migrated to electronic security by embedding these with a secure electronic component. This type of electronic component comprises a microprocessor running specially developed operating software. Successful implementation of a secure electronic document is achieved when best-in-class...

    Provided By Gemalto

  • Case Studies // Oct 2008

    Convenient Identification Solutions for Secure Access to University Premises and Electronic Internal Information

    In 2005 a new Polish law permitted the use of smart cards as an official student ID. This meant implementing new student ID for 448 universities/ high-schools in Poland. It needed to have strong secure authentication for identity credentials as well as provide physical access to the campus. Gemalto worked...

    Provided By Gemalto

  • White Papers // Dec 2006

    A Protection Scheme for Moc-Enabled Smart Cards

    The concept of Match-on-Card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not....

    Provided By Gemalto

  • White Papers // Jan 2009

    Telecommunications: The Role of the UICC in Long Term Evolution All IP Networks

    The UICC (Universal Integrated Circuit Card) is the smart card used in mobile terminals for GSM and UMTS/3G networks. It authenticates the subscriber to the network while ensuring the integrity and security of their personal data. It also stores applications for both operator and end-user use for the correct deployment...

    Provided By Gemalto

  • White Papers // Oct 2008

    Security and Trust in Mobile Applications

    Traditionally, the mobile application environment has been relatively easy to manage. Operators preloaded devices with some applications, and other applications were made available only via purchase directly from the service provider. In this paradigm, the applet space could be easily controlled by validating each applet on new devices before launch,...

    Provided By Gemalto

  • White Papers // Oct 2008

    Operating Software in Secure Electronic Documents

    Secure documents such as passports, identity cards, driver licenses and healthcare cards can be migrated to electronic security by embedding these with a secure electronic component. This type of electronic component comprises a microprocessor running specially developed operating software. Successful implementation of a secure electronic document is achieved when best-in-class...

    Provided By Gemalto

  • White Papers // Apr 2009

    A Browser-Based Approach to Smart Card Connectivity

    Smart cards have provided security services for a wide range of applications including telecommunication, banking, and citizen identification. Connecting web applications with smart cards is a natural step forward to address some of the security issues in today's Web. The traditional approach for smart card based web applications provides security,...

    Provided By Gemalto

  • White Papers // Mar 2010

    A Smarter Way to Store PKI Credentials

    Public key infrastructure (PKI) is a proven technology for identity and access management systems that improves IT security and enables secure logon, file encryption, and digital signature for transactions. Other tangible benefits include increased productivity, lower help desk costs for password support and reduced operating expenses due to process enhancements....

    Provided By Gemalto

  • White Papers // Dec 2013

    Building the Business Case for Cloud SSO

    There are many compelling reasons to add Single Sign-On (SSO) to the cloud applications their business uses. Maybe the user want to get better control over the cloud-based applications employees and contractors are using for their business. Perhaps the user are worried about insecure or shared passwords. People might be...

    Provided By Gemalto

  • White Papers // Nov 2013

    Two-Factor Authentication for Cloud Applications

    The One-Time Password (OTP) can be a special case. It's a pin or password generated at the time of the connection - hence something the user know. It has a very short life, so even if a keylogger steals it, they cannot use it. But if the user have the...

    Provided By Gemalto

  • White Papers // Nov 2013

    Identity and Access Management in the Cloud: A Primer

    Enter cloud-based applications. Businesses using cloud applications have a whole new set of challenges around managing identity for applications that are inherently outside their control. Their users may not even be within their own networks when connecting to cloud-based applications on the business' behalf. Whether people are accessing hosted email,...

    Provided By Gemalto

  • White Papers // Dec 2006

    A Protection Scheme for Moc-Enabled Smart Cards

    The concept of Match-on-Card (MoC) consists of a smart card which receives an applicant's candidate template T to be compared with the stored reference template Tref by processing the complete matching algorithm during a biometric authentication request. The smart card will then output whether this comparison is positive or not....

    Provided By Gemalto

  • Case Studies // Oct 2008

    Convenient Identification Solutions for Secure Access to University Premises and Electronic Internal Information

    In 2005 a new Polish law permitted the use of smart cards as an official student ID. This meant implementing new student ID for 448 universities/ high-schools in Poland. It needed to have strong secure authentication for identity credentials as well as provide physical access to the campus. Gemalto worked...

    Provided By Gemalto