JavacardOS will not accept order any more, please contact our partner Feitian online Store:
https://ftsafe.en.alibaba.com/index.html

Search found 36 matches

by Bob2002
Mon Dec 19, 2016 12:02 am
Forum: Algorithm School
Topic: ECC cryptography on javacard
Replies: 2
Views: 11038

Re: ECC cryptography on javacard

Smart Card Bitcoin Wallet is a good example of how to use ECC algorithm.
by Bob2002
Wed Dec 14, 2016 2:41 am
Forum: Questions & Answers
Topic: When will the ECC tools be available?
Replies: 3
Views: 13999

Re: When will the ECC tools be available?

ECDSA.png
by Bob2002
Wed Dec 14, 2016 2:31 am
Forum: Solutions
Topic: Digitally sign an office document
Replies: 0
Views: 27853

Digitally sign an office document

You can digitally sign a document for many of the same reasons you might sign a paper document. A digital signature is used to authenticate (authenticate: The process of verifying that people and products are who and what they claim to be. For example, confirming the source and integrity of a softw...
by Bob2002
Tue Dec 13, 2016 6:09 am
Forum: Questions & Answers
Topic: Can applets be installed by other applets?
Replies: 2
Views: 9301

Re: Can applets be installed by other applets?

Thank you for your prompt reply, thank you.
by Bob2002
Tue Dec 13, 2016 6:08 am
Forum: Questions & Answers
Topic: When will the ECC tools be available?
Replies: 3
Views: 13999

Re: When will the ECC tools be available?

Thank you for your prompt reply, thank you.
by Bob2002
Tue Dec 13, 2016 2:12 am
Forum: Questions & Answers
Topic: When will the ECC tools be available?
Replies: 3
Views: 13999

When will the ECC tools be available?

I saw that "Note: Generating key pair online with ECC algorithm is under construction. Stay tuned. "
but,When will the ECC tools be available?
by Bob2002
Tue Dec 13, 2016 1:48 am
Forum: Open Source Applets
Topic: Smart Card Fido U2F Applet
Replies: 9
Views: 93867

Re: Smart Card Fido U2F Applet

The Mission of the FIDO (Fast IDentity Online) Alliance is to change the nature of online authentication by: ⋅ Developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users. ⋅ Operati...
by Bob2002
Tue Dec 13, 2016 1:40 am
Forum: Reader
Topic: Reader for Windows 10 IoT Core
Replies: 5
Views: 17466

Re: Reader for Windows 10 IoT Core

Where can I find HID Reader?
by Bob2002
Sun Dec 11, 2016 11:56 pm
Forum: Solutions
Topic: Windows smart card logon
Replies: 0
Views: 25895

Windows smart card logon

How to secure your data centers when your critical infrastructure is administrated by contractors with just a password everyone knows ? How to prevent targeted APT (Advanced Persistent Threats) attacks where a malware collects administrators’ cached credentials ? How to prevent hardware keylogger fr...
by Bob2002
Sun Dec 11, 2016 11:45 pm
Forum: Solutions
Topic: Secure Email
Replies: 0
Views: 31081

Secure Email

Secure Email refers that sender encrypt the message with the recipient's digital certificate on condition that both of them have e-mail digital certificate. So that email on the internet will not be stolen during transmission and only the recipient can read encrypted mail. Even if the messages are r...
JavaCard OS : Disclaimer