<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; smart card</title>
	<atom:link href="https://javacard.vetilles.com/tag/smart-card/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Chip to Cloud live, day 1: Opening panel on eID in Europe</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 09:24:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</guid>
		<description><![CDATA[This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room. To celebrate that, I have decide to attend [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room.</p>
<p>To celebrate that, I have decide to attend the opening session this year. We started by an enthusiastic eID spporter from European Union, promising us all regulations and standards ready for 2014, which sounds interesting. After all, there are very interesting deployment in countries like Belgium and Estonia, which could be extended.</p>
<p>Then, we get a panel, with the question below. Speakers are Christian van der Valk, from TrustWeaver, Herrmann Sterzinger, from G&#038;D, Massimo Cappelli, from Global CyberSecurity Center, and Marie Figarella, from Gemalto.</p>
<p>Why has eIAS services not been a success to date?</p>
<ul>
<li>Is it really the case? There haven&#8217;t been failures, there are many services ready to,use, and a lack of recognition, with a common perception that digital signature ismore difficult than it actually is.</li>
<li>Citizen certificates are too expensive, and the use cases are not compelling enough. Thisis changing in some places, like in Austria, where the state pays the citizen certificate.</li>
<li>Market fragmentation and lack of trust and confidence are the two main issues. They may even be linked because the fragmentation does not allow the development of global solutlons, deployed across Europe.</li>
<li>Issues have been legal and societal, not technical. Fragmentation and lacking use case are the most important,</li>
</ul>
<p>How would the new electronic identification and trust services regulation improve on this situation?</p>
<ul>
<li>Moving from directive to regulation is important</li>
<li>Making it global would be good, but also hittin some limits, in particular regarding discrepancies in privacy requirements.</li>
<li>Moving to a regulation will limit fragmentation, the scope will be larger, going beyond signatures to seals, timestamps, and more. Mobility between states will also be greatly improved. Finally, supervision should be improved.</li>
</ul>
<p>What additional key actions would be necessary to make eIAS a success?</p>
<ul>
<li>Sharing identity and authentication between public and private spheres would help. Also,aligning with the global market with help, including private support, like Adobe. Also, the recognition of non-PKI solutions would be required (that sounds interesting)</li>
<li>Moving beyond web authentication is required. Moving to global regulation loses things, such as already deployed eIDs, which do not comply to the new regulation, and also existing standads and existing profiles.</li>
<li>Bureaucratic simplification associated to eIAS would be great help. We are also missing a common framework of expertise, with collaboration between national agencies. Thereisalso a digital and cultural divide, which hurts wide adoption. Finally, including soft identity would increase the use of strong identity, if it can be used in our everyday life.</li>
<li>Associate reliable digital identity with a portable secure elemnt, to allow 2-factor authentication. Build an open and interoperale secure Internet. Privacy by design. Push digital identity on all SIM cards to benefit from NFC</li>
</ul>
<p>Now, that&#8217;s quite interesting. The views from the panelists are quite consistent. The question that puzzles me most is the relationship between national and private identity. I am left wondering what opportunities will be given to private companies and web providers to leverage this eID. Making this happen would be a great boost to eIAS.</p>
<p>I also liked Gemalto&#8217;s analysis and proposals, which was short and to the point, except the last point, of course; mandating SIM-based identity for NFC is ludicrous and pure lobbying, at least because the SIM is not the only way to access NFC.</p>
<p>So, an interesting first panel, although there haven&#8217;t been many suprises and illuminating discussions.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Smart card security on the radio</title>
		<link>https://javacard.vetilles.com/2010/05/03/smart-card-security-on-the-radio/</link>
		<comments>https://javacard.vetilles.com/2010/05/03/smart-card-security-on-the-radio/#comments</comments>
		<pubDate>Mon, 03 May 2010 20:40:57 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Discussions]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=576</guid>
		<description><![CDATA[Smart card security doesn&#8217;t often get on traditional media, so we can all (at least, the French-spaking ones) be happy that France Culture will spend an hour discussing the security of payment cards, trying to provide an answer to the question &#8220;Comment amÃ©liorer la sÃ©curitÃ© des cartes bancaires?&#8220;. Among the speakers, we will have Jean-Louis [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Smart card security doesn&#8217;t often get on traditional media, so we can all (at least, the French-spaking ones) be happy that France Culture will spend an hour discussing the security of payment cards, trying to provide an answer to the question &#8220;<a href="http://sites.radiofrance.fr/chaines/france-culture2/emissions/science_publique/fiche.php?diffusion_id=83616" class="liexternal">Comment amÃ©liorer la sÃ©curitÃ© des cartes bancaires?</a>&#8220;. Among the speakers, we will have Jean-Louis Lanet, from UniversitÃ© de Limoges, and Pierre Chassigneux, from Cartes Bancaires. This talk show follows the publication of an article about the same topic in the French magazine <a href="http://www.sciencesetavenir.fr/" class="liexternal">Sciences et Avenir</a>.</p>
<p>This sounds interesting, and I will be listening to the show (maybe not live, but I will definitely get the podcast). I listened many times to France Culture&#8217;s science shows, and they are usually serious and interesting. Of course, the question (in English, how to enhance the security of bank cards?) is already a bit aggressive, and I am sure that some people would even challenge that question, claiming that there isn&#8217;t much to be enhanced. Well, we&#8217;ll see on Friday.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/05/03/smart-card-security-on-the-radio/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip And PIN Is Broken (A Little)</title>
		<link>https://javacard.vetilles.com/2010/02/16/chip-and-pin-is-broken-a-little/</link>
		<comments>https://javacard.vetilles.com/2010/02/16/chip-and-pin-is-broken-a-little/#comments</comments>
		<pubDate>Tue, 16 Feb 2010 21:30:43 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=543</guid>
		<description><![CDATA[By now, there has been sufficient hype around Ross Anderson&#8217;s latest attack on EMV banking cards. Once again, the Cambridge guys have scored a good one here, as the simplicity of the attack is outright incredible: Intercept the PIN Presentation command, make the terminal believe that the PIN is correct (i.e., return Status Word 9000), [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>By now, there has been sufficient hype around Ross Anderson&#8217;s <a href="http://www.lightbluetouchpaper.org/2010/02/11/chip-and-pin-is-broken/" class="liexternal">latest attack</a> on EMV banking cards. Once again, the Cambridge guys have scored a good one here, as the simplicity of the attack is outright incredible: Intercept the PIN Presentation command, make the terminal believe that the PIN is correct (<em>i.e.</em>, return Status Word 9000), while never sending the APDU to the card. After that, the terminal thinks that the PIN was presented correctly, and the card thinks that no PIN was presented. OK, let&#8217;s stop here for a minute.</p>
<p>Most of us, who don&#8217;t know the <a href="http://www.emvco.com/specifications.aspx" class="liexternal">EMV specs</a> by heart, would believe that the PIN authentication is part of the card applet&#8217;s state machine. After all, Chip and PIN seem to be very tightly connected to each other. Well, it isn&#8217;t the case, and PIN verification is just something that may happen, or not. So, the discrepancy can go unnoticed.</p>
<p>When looking at the EMV protocol in greater details, like they do in the article, we notice that the information is actually present, but that we are missing a method to consolidate the various bits of information. Some items are optional, while some others (the IAD) use proprietary formats, and are not intended to be parsed on the terminal. Basically, there are solutions to counter the attack, but they are not obvious to implement. If you want all the technial details, refer to the <a href="http://www.cl.cam.ac.uk/research/security/banking/nopin/oakland10chipbroken.pdf" class="lipdf">full paper</a>.</p>
<p>Now, what does this attack tell us about the EMV Protocol? Well, it has a vulnerability, like many (all?) other security protocols, at least in the way it is most often implemented in practice. It&#8217;s a rather big one, too, which shows that smart card protocols most likely get less interest than others. It also shows that simple is not only beautiful, but also secure, or at least that the complexity of systems like EMV, with all its options, is becoming a real security issue.</p>
<p>Then, another issue is that the ability to perform over-the-air software updates to fix vulnerabilities is becoming standard, on computers, on phones, and even on some TVs and soud systems, provided that they are connected to Internet. Well, such things remain hard to do on payment terminals, and also on smart cards, even though th security of these devices is critical. Can we really expect card operating systems to become more complex if we aren&#8217;t able to maintain them over their lifetime? Probably not, and that transition is going to be tough.</p>
<p>Another thing that this attack reminds us of is that smart cards are just another security measure, which cannot be perfect. The paper contains the usual attacks against UK banks who, according to the authors, make customers liable as soon as PIN authentication is used on a bad transaction. Here, the problem is not the technology, it is the system around it. Magstripe technology is far more broken, but if the insurance provided by US banks is better, then the consequence is that the customer, in the end, is better off with the lower security, because their insurance provided by their banks is better.</p>
<p>About PIN security itself, it is in fact very easy to guess the number typed by a person on a keypad, even without seeing the keypad. You can make the experience in any European supermarket line: simply try to guess the PIN typed by the people in front of you. You will notice that in many cases, you have the feeling that you got a lot of information about that PIN. Add to that the fact that you are far from being a trained professional, and you can get an idea of the problem: protecting a PIN is difficult. As far as I know, in France, where Chip and PIN has been the rule for many years, it is not too hard to avoid liability even if our PIN has been disclosed. The PIN is not a miracle, and it cannot solve all problems.</p>
<p>Finally, a positive note. We are getting quite a lot of attacks on smart cards these days. The program of <a href="http://cardis2010.xlim.fr/program.html" class="liexternal">Cardis 2010</a> includes 6 papers on attacks, and the published state-of-the-art is getting closer to the laboratories&#8217; state-of-the-art. Some might say that this is dangerous for cards, but some others will say that this is actually a positive evolution, moving away from the &#8220;smart cards are secure&#8221; dogma into a &#8220;smart card can help build good security models&#8221; logic. And if we use that logic to build business models that ultimately benefit final customers, then all of this will have been a step in the right direction.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/02/16/chip-and-pin-is-broken-a-little/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The Android SE war has started &#8230;</title>
		<link>https://javacard.vetilles.com/2009/11/05/the-android-se-war-has-started/</link>
		<comments>https://javacard.vetilles.com/2009/11/05/the-android-se-war-has-started/#comments</comments>
		<pubDate>Wed, 04 Nov 2009 22:44:55 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Java Card 3.0]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=498</guid>
		<description><![CDATA[These days, Android is a bit of a hot topic, for many reasons that we all know. It seems that a new device is released every week, the operating system is open source, so everybody can at least play with it and integrate low-level software, applications can be deployed, and most likely much more. Android [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>These days, Android is a bit of a hot topic, for many reasons that we all know. It seems that a new device is released every week, the operating system is open source, so everybody can at least play with it and integrate low-level software, applications can be deployed, and most likely much more.</p>
<p>Android does not offer a Secure Element interface. Of course, Android phones are able to interact with SIM cards, but applications have no access to the cards, or to any other Secure Element (SE). And of course, forget about NFC access. Will that last? Of course not, as manufacturers and other service providers will make sure that they can build Android applications that use secure elements.</p>
<p>Apparently, Giesecke&#038;Devrient has really started that war, by announcing <a href="http://www.gi-de.com/portal/page?_pageid=44,156821&#038;_dad=portal&#038;_schema=PORTAL" class="liexternal">a security solution for devices running Android</a>. This is a combination of two things: a MicroSD card that embeds a smart card chip, and software that allows the Android platform to access it.</p>
<p>Cartes is about 10 days from now, so we can expect a few more announcements and demos to be made there. Trusted Logic has already announced a <a href="http://www.trusted-logic.com/spip.php?article170" class="liexternal">NFC stack</a> for Android, and I bet that more will come.</p>
<p>For now, we can take a closer look to the G&#038;D solution, especially because they have published their software on a <a href="http://code.google.com/p/seek-for-android/" class="liexternal">Google Code Project</a>.<br />
<span id="more-498"></span></p>
<p>This project is still evolving, so what I am writing is is a snapshot of its state on November 4, 2009. One of the latest additions is a paper called <a href="http://seek-for-android.googlecode.com/files/20091104_Android_Security_and_Trust_v11.pdf" class="lipdf">Security and Trust for Android</a>. This paper contains a lot of information, as well as a nice vision, but it is also a bit confusing, and remains a proposal, as stated in the introduction.</p>
<p>This paper deserves to be read, though. Its main vision is that there are many SE&#8217;s that can be used (SIM card, MicroSD, TrustZone, Software SE), with different properties, and in particular with different security levels. Nevertheless, the paper insists on the fact that all these SE&#8217;s should be accessible through a regular API, and that there should be a similar way to program applications on all these SE&#8217;s. Now, that&#8217;s an interesting vision, although it is kind of hard to achieve (for instance, SIMs and MicroSDs both use Java Card applets, whereas TrustZone and software SE&#8217;s are usually based on native applications.</p>
<p>I have not looked in great details at what they offer, and I have not tried to use the software. However, I did take a look at the samples, in particular at the one <a href="http://code.google.com/p/seek-for-android/source/browse/trunk/samples/SmartcardSample/src/com/gieseckedevrient/android/apps/smartcardsample/MainActivity.java" class="liexternal">based on the native interface</a>. This interface looks quite nice and simple, and the sample is far easier to read than the one <a href="http://code.google.com/p/seek-for-android/source/browse/trunk/samples/PcscSample/src/com/gieseckedevrient/android/apps/pcscsample/MainActivity.java" class="liexternal">based on PC/SC</a>.</p>
<p>Basically, this effort looks like a good way of making a SE interface available on Android, and to offer a way to interface with a particular kind of SE. This looks like basic software, and I am sure that we will need to consider many more aspects, like security, access control, and more. However, this is not the goal here, as the proof-of-concept definitely is the important part. Completeness (and complexity) will come later.</p>
<p>I would love to say more about the technical details, but it is late, and trying these things out takes time. I will therefore come back later to that topic. For now, I will close with a few non-technical comments:</p>
<ul>
<li>I like the fact that G&#038;D has made the software open source. Obviously, the Android drivers and APIs are not how they intend to make money, so this sounds like the natural thing to do. However, this is the smart card industry, and secret is usually considered better.</li>
<li>Hopefully, G&#038;D will also work with the other actors of the industry in order to make this API the best possible. Since this would add more weight to their proposal, it also sounds like a natural thing to do.</li>
<li>Even more hopefully, the industry as a whole will make sure that the Android developer community actually understands how to use these Secure Elements. This will require a strong educational message, which is just started by the G&#038;D white paper.</li>
</ul>
<p>The last remark goes to the Secure MicroSD product, together with its Android integration. It is a composite product, integrating a large memory and a smart card microcontroller; in addition, it is integrated on a Web-oriented platform. Well, that sure looks like a great target for Java Card 3.0 and its servlets. This would even greatly simplify the API requirements at the Android level, and also greatly enhance the appeal of the solution to Android developers.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/11/05/the-android-se-war-has-started/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip cards for (some) Americans</title>
		<link>https://javacard.vetilles.com/2009/10/10/chip-cards-for-some-americans/</link>
		<comments>https://javacard.vetilles.com/2009/10/10/chip-cards-for-some-americans/#comments</comments>
		<pubDate>Sat, 10 Oct 2009 21:22:29 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=483</guid>
		<description><![CDATA[It seems that the American plastic cards are getting them in trouble, at least when they travel in Europe. Of course, cards without chips still work perfeectly in restaurants, hotels, and stores. However, things are very different at automated machines. If you are in France and you want to pay for underground parking, for renting [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It seems that the American plastic cards are <a href="http://www.nytimes.com/2009/10/04/travel/04pracchip.html?_r=4&#038;pagewanted=1&#038;ref=world" class="liexternal">getting them in trouble</a>, at least when they travel in Europe. Of course, cards without chips still work perfeectly in restaurants, hotels, and stores. However, things are very different at automated machines. If you are in France and you want to pay for underground parking, for renting a bike, or for a subway trip, your card better have a chip with which to perform an EMV transaction. Otherwise, you may well be out of luck.</p>
<p>There are a few exceptions to that rule. If you are lucky enough to be in a place that accepts American Express, these cards will be accepted even if they don&#8217;t have a chip (this is quite natural, since even those issued in Europe have no chip). But in many cases, you may well be really out of luck. Consider the subway example, for instance. In many places, it is becoming common to close all tellers at late hours, only to leave automated machines. And if you can&#8217;t get them to work, well, things may get ugly.</p>
<p>Things are only going to get worse, and apparently, some American companies have understood that. According to the NYTimes, Travelex is getting ready to issue prepaid smart cards for its customers in a bout a year from now. That means that, in a while, we should see American tourists with smart cards. And if it works, we are quite likely to start seeing American businessmen with smart cards as well, as corporate cards for international travellers will start having them as well.</p>
<p>Good news for smart cards? Not necessarily. If we consider that only 20% of all Americans have a passport, this also caps the number of Americans with that specific need. Most likely not the killer reason for American banks to switch to smart cards, which are still considered too expensive to manage.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/10/10/chip-cards-for-some-americans/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>What does advertising say about smart cards?</title>
		<link>https://javacard.vetilles.com/2009/09/29/what-does-advertising-say-about-smart-cards/</link>
		<comments>https://javacard.vetilles.com/2009/09/29/what-does-advertising-say-about-smart-cards/#comments</comments>
		<pubDate>Tue, 29 Sep 2009 20:11:40 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Java Card]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=477</guid>
		<description><![CDATA[In a recent blog post, Matt Asay looks at the advertising that Google associates to various products, including open source products. His conclusion is that open source is about productivity, since most advertisements that Google associates with queries on &#8220;open source&#8221; or on open source product names are related to the efficient use of open [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>In a <a href="http://news.cnet.com/8301-13505_3-10363287-16.html" class="liexternal">recent blog post</a>, Matt Asay looks at the advertising that Google associates to various products, including open source products. His conclusion is that open source is about productivity, since most advertisements that Google associates with queries on &#8220;open source&#8221; or on open source product names are related to the efficient use of open source products.</p>
<p>Of course, this is too tempting not to imitate that. I therefore looked for &#8220;smart card&#8221; and &#8220;Java Card&#8221;. And the results were not that inspiring<br />
<span id="more-477"></span></p>
<p>When you search for smart cards, Google offers you &#8230; smart cards. Most of the offers on the side are advertisements for <a href="http://www.usasmartcard.com" class="liexternal">USA Smart Card</a> or <a href="http://www.motechno.com" class="liexternal">motechno</a>, or <a href="http://www.smartcardsource.com" class="liexternal">Smart Card Source</a> (my links are free). All these guys sell rather old smart cards at rather steep prices. On the other hand, for people who want to try using cards, this is often the only way to get their hands on actual cards, since it is quite hard to get some from the manufacturers.</p>
<p>This is really a sad situation, and we are kind of hurting ourselves. &#8220;How to get cards?&#8221; is the most common question that I get on this blog&#8217;s &#8220;Contact&#8221; link. I don&#8217;t have a good answer, and by making it hard to get cards, we are mostly hurting our allies. And if somebody worries about bad guys who get cards to attack them, I would tell them not to worry. Real bad guys are able to get the cards they need.</p>
<p>Of course, I would love to be proven wrong. So, if a manufacturer has a way to provide a kit with up-to-date Java Card cards (at least Java Card 2.2.2 with GlobalPlatform 2.1, preferably 2.2, wonderfully, Java Card 3.0), I will gladly provide free advertising. Just leave a comment or contact me.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/09/29/what-does-advertising-say-about-smart-cards/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>e-Smart is back &#8230;</title>
		<link>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/</link>
		<comments>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/#comments</comments>
		<pubDate>Sat, 19 Sep 2009 13:54:13 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[e-Smart]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[smart card]]></category>
		<category><![CDATA[Smart Mobility]]></category>
		<category><![CDATA[Smart University]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=440</guid>
		<description><![CDATA[It&#8217;s that time of the year when summer turns in to fall (rather violently around here), and when smart card R&#038;D people gather in Sophia Antipolis for the Smart Event. I will be present throughout the week, with quite a busy schedule, between my own participations and the interesting sessions that I want to hear. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It&#8217;s that time of the year when summer turns in to fall (rather violently around here), and when smart card R&#038;D people gather in Sophia Antipolis for the Smart Event. I will be present throughout the week, with quite a busy schedule, between my own participations and the interesting sessions that I want to hear.</p>
<p>Let me get you a biased timeline for this week, from Tuesday to Friday.<br />
<span id="more-440"></span></p>
<p>Let&#8217;s start by Tuesday:</p>
<ul>
<li>The <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-university/program_javacard.htm" class="liexternal">Java Card 3.0 Programming</a> course at <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-university/program.htm" class="liexternal">Smart University</a> lasts all Tuesday and Wednesday. My personal contribution in it is about security, on Tuesday afternoon. That should keep me busy for a full half-day.</li>
<li>If you are into contests (or if you are broke; this event is free), the new <a href="http://www.simagine.info/" class="liexternal">SIMagine</a> contest will be launched with a <a href="http://www.strategiestm.com/conferences/smart-event/09/workshops/index.htm#" class="liexternal">full-day conference</a> on Tuesday. This is not a Gemalto contest any more, but a wider contest, which is not limited to cards any more (even though I guess that involving a card in this could be a good idea). If you have a good mobile security idea (with a SIM card), that could be of interest.</li>
</ul>
<p>Wednesday will be very busy, in particular because there are events on the side of the main conferences:</p>
<ul>
<li>In the morning, the Java Card Forum organizes a meeting with academia, to see how we can help in promoting research about Java Card 3.0. This event is invitational, but if you are an academic, present at e-Smart, and you are interested, you are welcome at 10:00AM (I am not sure of the room, but I am sure that there will be an indication; follow the JCF logo).</li>
<li>In the morning, I like the title of Jacques Bus&#8217; keynote speech, <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#opening" class="liexternal">Trust in digital life</a>. I usually skip keynotes, but I may attend that one.</li>
<li>In the afternoon, There are also interesting speeches at e-Smart. First, one of my colleagues, Guillaume Dufay, talking about a formal model of really open cards (old topic, with a new twist), <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p1a2" class="liexternal">around 3:00PM</a>. Later in the afternoon, there will also be a speech from G&#038;D about a secure runtime in the mobile; finally, Trusted Logic has a competitor in that field, moving forward to prove its interest.</li>
<li>Finally, almost all of <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm" class="liexternal">Smart Mobility</a>&#8216;s <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm#p1a1" class="liexternal">afternoon sessions</a> sound interesting, for various reasons. Tough choices ahead &#8230;</li>
</ul>
<p>Thursday will not be dull either, although I will finally be able to fully focus on the conferences:</p>
<ul>
<li>The <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p2m1" class="liexternal">morning</a> at e-Smart will be a combination of NFC Security and Trusted Personal Devices. Two topics of interest for me, so I may be surfing between sessions.</li>
<li>Smart Mobility will bring us some discussions about the NFC ecosystems (TSMs and more), and about user experience. Interesting, but I have the feeling that there a few more new things at e-Smart (I may be wrong, though).</li>
<li>The first part of the afternoon is a no-brainer, at least for me. I will be on the stage, talking about Java Card 3.0 and Smart Card Web Server Security. My co-presenters, from Gemalto/Eurosmart and from Inside, will also have interesting speeches about cloud computing and about convergence.</li>
<li>If this is not you cup of tea, the <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p2a1" class="liexternal">other session</a> of e-Smart could be very interesting, about state-of-the-art security. I am likely to join that session after break.</li>
<li>On the Smart Mobility side, my choice would go to the <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm#p2a2" class="liexternal">Mobile banking</a> session, but mostly because I know about mots of the things presented in the other session.</li>
</ul>
<p>Friday is morning only, but that is quite a dense morning:</p>
<ul>
<li>At e-Smart, it is the <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p3m1" class="liexternal">Java Card</a> session. The first part is quite introductive, with the amusing PlaySIM project (already discussed <a href="http://javacard.vetilles.com/2009/06/04/live-from-j1-the-playsim-project/" class="liinternal">here</a>). The second part includes two speeches about attacks; expect to find me there.</li>
<li>In parallel, Smart Mobility has a special TL session, with 4 consecutive speakers from Trusted Logic and Trusted Labs. I may miss some of them because of the Java Card session, but they are all worth it.</li>
</ul>
<p>Finally, I will try to be connected, like usually in conferences. I will be on Twitter (<a href="http://twitter.com/evetillard" class="liexternal">evetillard</a>), with the tag <a href="http://twitter.com/#search?q=%23esmart" class="liexternal">#esmart</a> (join me using it), and I will also try to blog live about the most exciting things.  </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Smart cards, linux, and tokens</title>
		<link>https://javacard.vetilles.com/2008/09/29/smart-cards-linux-and-tokens/</link>
		<comments>https://javacard.vetilles.com/2008/09/29/smart-cards-linux-and-tokens/#comments</comments>
		<pubDate>Mon, 29 Sep 2008 21:11:15 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[smart card]]></category>
		<category><![CDATA[token]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2008/09/29/smart-cards-linux-and-tokens/</guid>
		<description><![CDATA[Neowave is getting a lot of media attention, and they are also involved indirectly in an interesting project, Live Token. The idea is to put together a USB token containing a Linux distro and a smart card that will be used to provide security services, for encryption, authentication, and more. The idea definitely looks good: [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.neowave.fr/en/index.html" class="liexternal">Neowave</a> is getting <a href="http://blog.wired.com/gadgets/2008/09/french-railway.html" class="liexternal">a</a> <a href="http://www.rfidjournal.com/article/view/4283/" class="liexternal">lot</a> <a href="http://www.techradar.com/news/world-of-tech/future-tech/crazy-french-rfid-travel-card-has-built-in-usb-jack-462988" class="liexternal">of</a> <a href="http://www.everythingusb.com/weneo-id-smart-usb-ticket-15337.html" class="liexternal">media</a> <a href="http://www.theregister.co.uk/2008/08/28/usb_smart_cards/" class="liexternal">attention</a>, and they are also involved indirectly in an interesting project, <a href="http://www.livetoken.com/" class="liexternal">Live Token</a>.</p>
<p>The idea is to put together a USB token containing a Linux distro and a smart card that will be used to provide security services, for encryption, authentication, and more. The idea definitely looks good: a self-contained Operating System with embedded smart card security (at least, there should be no problem addressing this smart card). To make it better, they intend to put a card that supports Java Card there, and we could imagine an API. Just add Java Card 3.0, and this would look quite perfect.</p>
<p>I definitely wish them the best for this project.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2008/09/29/smart-cards-linux-and-tokens/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
