Secure SMS messaging using Quasigroup encryption and Java SMS API

Size: px
Start display at page:

Download "Secure SMS messaging using Quasigroup encryption and Java SMS API"

Transcription

1 Secure SMS messaging using Quasigroup encryption and Java SMS API Marko Hassinen, Smile Markovski University of Kuopio, Finland SS Cyril and Methodius University, Republic of Macedonia SPLST 2003 Kuopio, Finland p.1/18

2 Contents Motivation Definition of the encryption method Application structure Performance figures Conclusions and Future Work SPLST 2003 Kuopio, Finland p.2/18

3 Motivation SMS message can go to a wrong number SPLST 2003 Kuopio, Finland p.3/18

4 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted SPLST 2003 Kuopio, Finland p.3/18

5 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted The device with messages in it may get lost SPLST 2003 Kuopio, Finland p.3/18

6 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted The device with messages in it may get lost The operator can have malicious employees SPLST 2003 Kuopio, Finland p.3/18

7 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted The device with messages in it may get lost The operator can have malicious employees Authentication of receiver SPLST 2003 Kuopio, Finland p.3/18

8 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect SPLST 2003 Kuopio, Finland p.4/18

9 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect A quasigroup is a groupoid with unique left and right inverses. SPLST 2003 Kuopio, Finland p.4/18

10 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect A quasigroup is a groupoid with unique left and right inverses. A quasigroup can be characterised with a that is an matrix where each row and column is a permutation of elements of a set SPLST 2003 Kuopio, Finland p.4/18

11 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect A quasigroup is a groupoid with unique left and right inverses. A quasigroup can be characterised with a that is an matrix where each row and column is a permutation of elements of a set The encryption primitive defined as on sequence where is SPLST 2003 Kuopio, Finland p.4/18

12 Decryption SPLST 2003 Kuopio, Finland p.5/18 is defined as,where Decryption

13 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18

14 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18

15 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18

16 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18

17 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18

18 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. SPLST 2003 Kuopio, Finland p.6/18

19 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. The amount of different latin squares of order is SPLST 2003 Kuopio, Finland p.6/18

20 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. The amount of different latin squares of order is There are at least 288 latin squares of order 4, but more than of order 16. SPLST 2003 Kuopio, Finland p.6/18

21 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. The amount of different latin squares of order is There are at least 288 latin squares of order 4, but more than of order 16. A Latin square of order 16 has 256 entries that can be stored in 128 bytes. SPLST 2003 Kuopio, Finland p.6/18

22 J2ME as an application environment J2ME (Java 2 Micro Edition) is a runtime environment designed for devices with limited resources MIDP APPLICATIONS MIDP OEM SPECIFIC APPLICATIONS OEM SPECIFIC CLASSES NATIVE APPLICATIONS CLDC NATIVE SOFTWARE DEVICE SPLST 2003 Kuopio, Finland p.7/18

23 J2ME as an application environment Basic language features and libraries are in the CLDC (Connected Limited Device Configuration). MIDP APPLICATIONS MIDP OEM SPECIFIC APPLICATIONS OEM SPECIFIC CLASSES NATIVE APPLICATIONS CLDC NATIVE SOFTWARE DEVICE SPLST 2003 Kuopio, Finland p.7/18

24 J2ME as an application environment Mobile Information Device Profile (MIDP) provides additional functionality for a specific type of device. MIDP APPLICATIONS MIDP OEM SPECIFIC APPLICATIONS OEM SPECIFIC CLASSES NATIVE APPLICATIONS CLDC NATIVE SOFTWARE DEVICE SPLST 2003 Kuopio, Finland p.7/18

25 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it SPLST 2003 Kuopio, Finland p.8/18

26 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it 2. Receive encrypted messages and decrypt them SPLST 2003 Kuopio, Finland p.8/18

27 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it 2. Receive encrypted messages and decrypt them 3. Operate fast enough to provide acceptable service in an environment with very limited processing power like a mobile phone SPLST 2003 Kuopio, Finland p.8/18

28 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it 2. Receive encrypted messages and decrypt them 3. Operate fast enough to provide acceptable service in an environment with very limited processing power like a mobile phone 4. Be compact enough for use in mobile phone memory space SPLST 2003 Kuopio, Finland p.8/18

29 Architecture of CryptSMS software QX.java NokiaSMSHandler.java OutgoingTextMessage.java NokiaDebugLog.java WMA Nokia WMASMSHandler.java SMSHandler.java NUMScreen.java CryptSMS.java PASScreen.java SMSScreen.java DebugLog.java WriteSMS.java CommonLog.java Siemens SiemensSMSHandler.java QX.java Receiver.java OutgoingTextMessage.java SiemensDebugLog.java SPLST 2003 Kuopio, Finland p.9/18

30 Storage memory and JAR size MIDP application (MIDlets) are stored in the device as JAR (Java archive) files JAR sizes for our application are: Nokia: bytes Siemens: bytes WTK: bytes, WTK is the Wireless Toolkit provided by Sun MicroSystems. Through obfuscation the JAR size can be reduced by approximately 10. SPLST 2003 Kuopio, Finland p.10/18

31 Runtime memory Runtime memory usage for each object was measured as follows: int iamount = 100; Object[] objects; long lfree = 0; long lused = 0; objects = new SMSScreen[iAmount]; Runtime.getRuntime().gc(); lfree = Runtime.getRuntime().freeMemory(); for(int i = 0; i < iamount; i++) objects[i] = new SMSScreen(this, TEST,1); Runtime.getRuntime().gc(); lused = lfree - Runtime.getRuntime().freeMemory(); DebugLog.makeEntry(iAmount+ SMSScreen) used: +lused); for(int i = 0; i < iamount; i++) objects[i] = null; SPLST 2003 Kuopio, Finland p.11/18

32 Name of the class Siemens Nokia WTK WTK* Remarks CommonLog.java N/A N/A N/A Abstract super class CryptSms.java DebugLog.java N/A N/A N/A N/A Static class NokiaDebugLog.java N/A 41 N/A N/A NokiaSmsHandler.java N/A 264 N/A N/A NUMScreen.java OutgoingTextMessage.java PASScreen.java QX.java Receiver.java 20 N/A N/A N/A SiemensDebugLog 16 N/A N/A N/A SiemensSmsHandler 284 N/A N/A N/A SmsHandler.java N/A N/A N/A N/A Abstract super class SmsScreen.java WmaDebugLog.java N/A N/A WmaSmsHandler.java N/A N/A WriteSmsScreen.java SPLST 2003 Kuopio, Finland p.12/18

33 Encryption processing power Time needed for encrypting or decrypting a message of a certain length was measured with following way: long lmillis = System.currentTimeMillis(); // Operation that needs to be measured... long ltimespent = System.currentTimeMillis() - lmillis; DebugLog.makeEntry( Encryption time + ltimespent); A bit string with time bits can be encrypted in linear An optimization can be achieved by sorting the latin square. SPLST 2003 Kuopio, Finland p.13/18

34 Encryption processing power (cont.) As a result encryption takes time length of the passphrase. Sorting the latin square takes time order of the group. where is the where is the SPLST 2003 Kuopio, Finland p.14/18

35 Some experiment results 800 Encryption and decryption times with 4 and 16 rounds *Encryption 4*Decryption 16*Encryption 16*Decryption 500 Time (msec) Number of characters SPLST 2003 Kuopio, Finland p.15/18

36 Conclusions Quasigroup encryption is compact and fast enough to be used on a restricted mobile platform. Cryptocraphic security of quasigroup encryption needs to be studied more extensively Latencies, such as encryption can be easily hidden from the user with careful application design Device vendors have their own specific API:s in addition to MIDP and WMA. Not all of them implement WMA. For our purposes Siemens Java API proved to offer the best functionality. SPLST 2003 Kuopio, Finland p.16/18

37 Future work Other cryptocraphic algorithms Public key encryption Authentication Signatures Data integrity Non repudation X.509 certificates Phonebook for keys and numbers Compression SPLST 2003 Kuopio, Finland p.17/18

38 Thank you Questions? SPLST 2003 Kuopio, Finland p.18/18

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2017 July 2017

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2017 July 2017 Siebel Installation Guide for Microsoft Windows Siebel Innovation Pack 2017 July 2017 Copyright 2005, 2017 Oracle and/or its affiliates. All rights reserved. This software and related documentation are

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

Google Cloud Technical Brief

Google Cloud Technical Brief Google Cloud Technical Brief As data and applications move to GCP so does the increased threat of web attacks like SQL injections, cross site scripting (XSS), hacking attempts, bad bots and application

More information

Computer Science Undergraduate Scholarship

Computer Science Undergraduate Scholarship Computer Science Undergraduate Scholarship Regulations The Computer Science Department at the University of Waikato runs an annual Scholarship examination. Up to 10 Scholarships are awarded on the basis

More information

Using E-Procurement data to measure the transparency and performance of public spending

Using E-Procurement data to measure the transparency and performance of public spending Using E-Procurement data to measure the transparency and performance of public spending M.Sc. Marija Jovanoska Head of department Monitoring and -Procurement Department USERS OF THE SYSTEM Public Procurement

More information

Siemens Business Services E-Government Strategy. How to build it for a whole country the Austrian E-Government Experience

Siemens Business Services E-Government Strategy. How to build it for a whole country the Austrian E-Government Experience Siemens Business Services E-Government Strategy How to build it for a whole country the Austrian E-Government Experience Copyright Siemens Business 2006 Services Siemens GmbHBusiness 2006. All Services

More information

Working with Parameter Effectivity

Working with Parameter Effectivity Working with Parameter Effectivity HELP.LOECH Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any

More information

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

Advanced Clinical Workflow for Connecting Clinic

Advanced Clinical Workflow for Connecting Clinic Advanced Clinical Workflow for Connecting Clinic Sagar Ravindra Patil, Mahadev Sudhakar Garad, Nikhil Goraksh Pawar, Supriya DadabhauTambe Abstract -This system is designed to improve clinical workflow,

More information

NURSE CALLING SYSTEM

NURSE CALLING SYSTEM NURSE CALLING SYSTEM Patients' care is undoubtedly the main aim of all hospitals and Nursing Homes. Hence there is a need to provide one dedicated line of communication to every patient so that the patient

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Defense Information Systems Agency DATE: February 2012 COST ($ in Millions) FY 2014 FY 2015 FY 2016 FY 2017 To Complete Element - 5.500 - - - - - -

More information

COMPANY CONSULTING Terms of Reference Development of an Open Innovation Portal for UTFSM FSM1402 Science-Based Innovation FSM1402AT8 I.

COMPANY CONSULTING Terms of Reference Development of an Open Innovation Portal for UTFSM FSM1402 Science-Based Innovation FSM1402AT8 I. COMPANY CONSULTING Terms of Reference Development of an Open Innovation Portal for UTFSM FSM1402 Science-Based Innovation FSM1402AT8 I. BACKGROUND 1.1 General overview of the project in which the Consulting

More information

CAHPS Hospital Survey Podcast Series Transcript

CAHPS Hospital Survey Podcast Series Transcript CAHPS Hospital Survey Podcast Series Transcript HCAHPS Score Calculations Part II: Patient-Mix Adjustment Slide 1-HCAHPS Score Calculations Part II: Patient-Mix Adjustment (PMA) Welcome to the CAHPS Hospital

More information

General Pathways Education Workshop (click t o to g o go t o to t he the desired section)

General Pathways Education Workshop (click t o to g o go t o to t he the desired section) General Pathways Education Workshop (click to go to the desired section) Introduction to Workshop/Instructions Why Care Pathways? Components of the Care Pathway Care Pathway Simulation Implementing Care

More information

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS)

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) BUPERS-07 BUPERS INSTRUCTION 2060.1 From: Chief of Naval Personnel Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) Ref: (a) CNO WASHINGTON DC 211645Z Apr 15 (NAVADMIN

More information

DWA Standard APEX Key Glencoe

DWA Standard APEX Key Glencoe CA Standard 1.0 DWA Standard APEX Key Glencoe 1.0 Students solve equations and inequalities involving absolute value. Introductory Algebra Core Unit 03: Lesson 01: Activity 01: Study: Solving x = b Unit

More information

Onboard. Design Specifications v1.0. Team Members. Liam Yafuso Robert Waite Diane Cordero Jacqueline Avis Daniel Tea

Onboard. Design Specifications v1.0. Team Members. Liam Yafuso Robert Waite Diane Cordero Jacqueline Avis Daniel Tea Onboard Design Specifications v1.0 Team Members Liam Yafuso Robert Waite Diane Cordero Jacqueline Avis Daniel Tea 1 1 Introduction 1.1 Product Overview 1.2 Definitions, Acronyms, and Abbreviations 2 Components

More information

Team 3: Communication Aspects In Urban Operations

Team 3: Communication Aspects In Urban Operations Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2007-03 Team 3: Communication Aspects In Urban Operations Doll, T. http://hdl.handle.net/10945/35617

More information

System of Records Notice (SORN) Checklist

System of Records Notice (SORN) Checklist System of Records Notice (SORN) Checklist Do not use any tabs, bolding, underscoring, or italicization in the system of records notice submissions to the Defense Privacy Office. Use this as a checklist

More information

Punjab & Sind Bank (A Government of India undertaking)

Punjab & Sind Bank (A Government of India undertaking) Punjab & Sind Bank (A Government of India undertaking) Addendum No. 1 Dated: 01.06.2018 RFP No. PSB/HOIT/RFP/113/2018-19, Date: 15-05-2018 Request for Proposal For Supply, Customization, Deployment, Maintenance

More information

CAMPUS CONSORTIUM SINGLE SIGN-ON AND IDENTITY GRANT

CAMPUS CONSORTIUM SINGLE SIGN-ON AND IDENTITY GRANT CAMPUS CONSORTIUM SINGLE SIGN-ON AND IDENTITY GRANT Overview Campus Consortium offers Grant Programs for a variety of solutions, products and services. Campus Consortium Grants are funded by Campus Consortium

More information

EPSRC-KETEP Call for Collaborative Research between the UK and Korea in Smart Grids

EPSRC-KETEP Call for Collaborative Research between the UK and Korea in Smart Grids EPSRC-KETEP Call for Collaborative between the UK and Korea in Smart Grids Summary Call type: Collaborative research Closing date: 16.00 on 16 December 2015 Related themes: Energy The Engineering and Physical

More information

Raiser s Edge: How To Query Constituent Giving With A Cumulative Total Including Soft Credits

Raiser s Edge: How To Query Constituent Giving With A Cumulative Total Including Soft Credits Raiser s Edge: How To Query Constituent Giving With A Cumulative Total Including Soft Credits The Problem: Your development team is planning a strategic ask for donors who have given a total of $2,500

More information

Nursys e-notify. Nursys e-notify File and API Specifications Version 2.1.5

Nursys e-notify. Nursys e-notify File and API Specifications Version 2.1.5 Nursys e-notify Nursys e-notify File and API Specifications Version 2.1.5 2018 National Council of State Boards of Nursing, Page 1 of 49 0.1 Disclaimer The information contained in this document is the

More information

An Efficient Mode of Communication for Blood Donor

An Efficient Mode of Communication for Blood Donor An Efficient Mode of Communication for Blood Donor, Assistant Professor, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore,

More information

RESEARCH METHODOLOGY

RESEARCH METHODOLOGY Research Methodology 86 RESEARCH METHODOLOGY This chapter contains the detail of methodology selected by the researcher in order to assess the impact of health care provider participation in management

More information

2017 Annual Missile Defense Small Business Programs Conference

2017 Annual Missile Defense Small Business Programs Conference 2017 Annual Missile Defense Small Business Programs Conference DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DISTRIBUTION STATEMENT A. Approved for public release; distribution

More information

Oracle Talent Acquisition Cloud

Oracle Talent Acquisition Cloud Oracle Talent Acquisition Cloud Release 15B Release Content Document August 2016 Revised: August 2017 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 5 ORACLE TALENT ACQUISITION CLOUD... 6 ORACLE TALEO

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 15 R-1 Line #32

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 15 R-1 Line #32 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Air Force Date: March 2014 3600: Research, Development, Test & Evaluation, Air Force / BA 4: Advanced Component Development & Prototypes (ACD&P) COST

More information

LOS ANGELES COUNTY SHERIFF S DEPARTMENT REQUEST FOR INFORMATION RFI NUMBER 652 SH ONLINE TRAFFIC REPORTS (OLTR)

LOS ANGELES COUNTY SHERIFF S DEPARTMENT REQUEST FOR INFORMATION RFI NUMBER 652 SH ONLINE TRAFFIC REPORTS (OLTR) LOS ANGELES COUNTY SHERIFF S DEPARTMENT REQUEST FOR INFORMATION RFI NUMBER 652 SH ONLINE TRAFFIC REPORTS (OLTR) May 2018 Prepared By These guidelines are intended to provide general information only and

More information

Remote Patient Tracking and Monitoring System

Remote Patient Tracking and Monitoring System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

INSIGHT INTO THE MIND OF TODAY S JOB SEEKERS

INSIGHT INTO THE MIND OF TODAY S JOB SEEKERS INSIGHT INTO THE MIND OF TODAY S JOB SEEKERS What HR professionals need to know to stay ahead of the competition in the war for top talent JOB a Research ebook by: HIRING INSIGHTS GETTING TO KNOW THE JOB

More information

The 8 Mistakes People Make When Selecting an Image Exchange Provider WHITEPAPER

The 8 Mistakes People Make When Selecting an Image Exchange Provider WHITEPAPER The 8 Mistakes People Make When Selecting an Image Exchange Provider WHITEPAPER The 8 Mistakes An effective image exchange solution can have significant positive impact on your ability to provide effective

More information

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 10 R-1 Line #10

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 10 R-1 Line #10 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040: Research, Development, Test & Evaluation, Army / BA 2: Applied Research COST ($ in Millions) Prior Years FY 2013 FY 2014

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

From SAS Programming with Medicare Administrative Data. Full book available for purchase here.

From SAS Programming with Medicare Administrative Data. Full book available for purchase here. From SAS Programming with Medicare Administrative Data. Full book available for purchase here. Contents About This Book... ix About The Author... xiii Acknowledgments...xv Chapter 1: Introduction... 1

More information

Geofencing in ehealth

Geofencing in ehealth Gefencing in ehealth Mbile Services Prject by Fatimah Zahra (7515) Faculty f Cmputer Science Free University f Bzen-Blzan Italy, 2009 Cntents Cntents...2 Figures...2 1. Intrductin...3 2. System Functins...3

More information

PDMS to S3D Plant Migration

PDMS to S3D Plant Migration PDMS to S3D Plant Migration Webinar on April 6 th, 2016 Session 1: Europe / Asia Pacific starts at 3pm Singapore Session 2: Americas / Europe starts at 11pm Singapore Your presenters Raghu Krishnamoorthy

More information

Secure your video conferences.

Secure your video conferences. ONLINE MEETINGS Secure your video conferences. Skype for Business as a part of Office 365 doesn t just keep you connected it keeps you more secure as well. Save with stronger security. CONSIDER THE SENSITIVE

More information

Optimization Problems in Machine Learning

Optimization Problems in Machine Learning Optimization Problems in Machine Learning Katya Scheinberg Lehigh University 2/15/12 EWO Seminar 1 Binary classification problem Two sets of labeled points - + 2/15/12 EWO Seminar 2 Binary classification

More information

July 1, June 30, 2019

July 1, June 30, 2019 July 1, 2018 - June 30, 2019 2308 Killearn Center Blvd., Suite 101 Tallahassee, FL 32309 Phone: (850) 692-6887 careersourceflorida.com Table of Contents Program Overview... 3 Available Funding & Maximum

More information

DEP Documentation RSA Key Import In Keytable User Manual

DEP Documentation RSA Key Import In Keytable User Manual Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation RSA Key Import In Keytable User Manual Version: 04.00 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/16 Version Management

More information

TELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL

TELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL TELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL NOVEMBER 2017 CSHCN PROVIDER PROCEDURES MANUAL NOVEMBER 2017 TELECOMMUNICATION SERVICES Table of Contents 38.1 Enrollment......................................................................

More information

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

Getting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER

Getting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER Getting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER Table of Contents Outsourcing Market Trends.... 3 Key Drivers for Outsourcing and

More information

Moving from HASP HL to Sentinel HASP. Migration Guide

Moving from HASP HL to Sentinel HASP. Migration Guide Moving from HASP HL to Sentinel HASP Migration Guide Migration Guide: Moving from HASP HL to Sentinel HASP Copyrights and Trademarks Copyright 2010 SafeNet, Inc. All rights reserved. Cross-Locking, Hardlock,

More information

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse Contents Patient Choice... 2 Security Protections... 2 Participation Agreement... 2 Controls... 3 Break the Glass... 3 Auditing... 3 Privacy Protections... 4 HIPAA Compliance... 4 State Law Compliance...

More information

LotusLive. Working together just got easier Online collaboration solutions for the working world

LotusLive. Working together just got easier Online collaboration solutions for the working world LotusLive Working together just got easier Online collaboration solutions for the working world LotusLive Software as a Service & Cloud Computing Lotus Collaboration Strategy LotusLive family Click to

More information

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR

BIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR UMANICK TECHNOLOGIES, S.L. www.umanick.com info@umanick.com 1 / 7 Introduction In any country s health care system, many challenges have yet to be resolved. And patient identification is perhaps the greatest

More information

TOUM: The Official Noticeboard of the University of Murcia

TOUM: The Official Noticeboard of the University of Murcia TOUM: The Official Noticeboard of the University of Murcia Outline Motivation TOUM Procedure TOUM Service Management application Electronic signature issues Official Website TOUM Project FundeWeb framework

More information

Texas Medicaid. Provider Procedures Manual. Provider Handbooks. Telecommunication Services Handbook

Texas Medicaid. Provider Procedures Manual. Provider Handbooks. Telecommunication Services Handbook Texas Medicaid Provider Procedures Manual Provider Handbooks December 2017 Telecommunication Services Handbook The Texas Medicaid & Healthcare Partnership (TMHP) is the claims administrator for Texas Medicaid

More information

Your Guide to Writing a Grant Management Software RFP

Your Guide to Writing a Grant Management Software RFP Your Guide to Writing a Grant Management Software RFP Background The AmpliFund team has reviewed and responded to hundreds of grant management software request for proposals (RFPs) for organizations of

More information

The Journey of Commercialization

The Journey of Commercialization The Journey of Commercialization, Partner, Sell Mike Broeker April, 2018 The Intelligent Workplace The Robert L. Preger Intelligent Workplace, built in 1997, is a 7000 square foot living laboratory of

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 19 Jun 2017 Effective Date: 02 Jan 2018 Task Number: 14-EAC-8027 Task Title: Conduct Paying Agent Operations (Financial Management Support Detachment

More information

Request for Information (RFI) For Network Monitoring & Management (NMC/OMC) Services

Request for Information (RFI) For Network Monitoring & Management (NMC/OMC) Services Request for Information (RFI) For Network Monitoring & Management (NMC/OMC) Services 1 Background In February 2012, Congress enacted The Middle Class Tax Relief and Job Creation Act of 2012, containing

More information

[MC-DTCXA]: MSDTC Connection Manager: OleTx XA Protocol

[MC-DTCXA]: MSDTC Connection Manager: OleTx XA Protocol [MC-DTCXA]: MSDTC Connection Manager: OleTx XA Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation

More information

Moving from HASP4 to Sentinel HASP. Migration Guide

Moving from HASP4 to Sentinel HASP. Migration Guide Moving from HASP4 to Sentinel HASP Migration Guide Migration Guide: Moving from HASP4 to Sentinel HASP Copyrights and Trademarks Copyright 2010 SafeNet, Inc. All rights reserved. Cross-Locking, Hardlock,

More information

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2015, Rev. D November 2015

Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2015, Rev. D November 2015 Siebel Installation Guide for Microsoft Windows Siebel Innovation Pack 2015, Rev. D November 2015 Copyright 2005, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

The future of patient care. 6 ways workflow automation will transform the healthcare experience

The future of patient care. 6 ways workflow automation will transform the healthcare experience The future of patient care 6 ways workflow automation will transform the healthcare experience Workflow automation: The foundation for improved patient care The patient lifecycle goes through many phases.

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO. Quantity of RDT&E Articles

UNCLASSIFIED. FY 2016 Base FY 2016 OCO. Quantity of RDT&E Articles Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 COST ($ in Millions) Years FY 2017 FY 2018 FY 2019 FY 2020 To Program Element - 6.021 8.312 7.963-7.963 8.046 8.146 8.194

More information

The Evolution of the Conference Room and the Technology Behind it

The Evolution of the Conference Room and the Technology Behind it WHITEPAPER The Evolution of the Conference Room and the Technology Behind it How a Shift in Demand Will Impact Technology, Support, and Users Bill Haskins Andy Nilssen Andrew Davis October 2013 Paper sponsored

More information

Active biosurveillance in an urban metropolitan area

Active biosurveillance in an urban metropolitan area Active biosurveillance in an urban metropolitan area Sheryl L. Happel Lewis, MPH 1 Kathy Hurt-Mullen, MPH 2 Wayne Loschen, MS 1 Richard A. Wojcik, MS 1 Joseph S. Lombardo, MS 1 November 18, 2003 1 The

More information

CDIP SCHOLAR & MENTOR

CDIP SCHOLAR & MENTOR CDIP SCHOLAR & MENTOR EXPENSE REPORT FOR CDIP MINI GRANT AND TRAVEL GRANT PROGRAMS 2017/2018 ACADEMIC YEAR www.calstate.edu/hr/cdip FINAL REPORTS FOR CDIP SCHOLAR AND MENTOR A Final Activity Report and

More information

Reporting a Privacy Breach to the Commissioner

Reporting a Privacy Breach to the Commissioner SEPTEMBER 2017 Reporting a Privacy Breach to the Commissioner GUIDELINES FOR THE HEALTH SECTOR To strengthen the privacy protection of personal health information, the Ontario government has amended the

More information

MISSISISSIPPI STATE UNIVERSITY Request for Proposals (RFP) MSU #18 03 Communications as a Service Solution

MISSISISSIPPI STATE UNIVERSITY Request for Proposals (RFP) MSU #18 03 Communications as a Service Solution MISSISISSIPPI STATE UNIVERSITY Request for Proposals (RFP) MSU #18 03 Communications as a Service Solution Issue Date: [12 5 17] Issuing Agency: Office of Procurement and Contracts Mississippi State University

More information

Pamela Duncan, Ph.D PI COMPASS Trial Scott Rushing, Director Research Information Systems

Pamela Duncan, Ph.D PI COMPASS Trial Scott Rushing, Director Research Information Systems ecompass for Health: Precision health at its best Pamela Duncan, Ph.D PI COMPASS Trial Scott Rushing, Director Research Information Systems 1 Clinical Informatics Solutions Require Clinical Vetting Value

More information

CSE255 Introduction to Databases - Fall 2007 Semester Project Overview and Phase I

CSE255 Introduction to Databases - Fall 2007 Semester Project Overview and Phase I SEMESTER PROJECT OVERVIEW In this term project, you are asked to design a small database system, create and populate this database by using MYSQL, and write a web-based application (with associated GUIs)

More information

Project Overview for the Technical Compliance Monitoring System

Project Overview for the Technical Compliance Monitoring System Project Overview for the Technical Compliance Monitoring System Request for Proposal 6 November 2017 ICANN Project Overview for the Technical Compliance Monitoring System November 2017 1 1 Introduction

More information

Lifecycle Models for Survivable Systems

Lifecycle Models for Survivable Systems Lifecycle Models for Survivable s Rick Linger Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense 2000 by Carnegie Mellon University Version 2 SNA Tutorial

More information

Maximizing the Return on a Telepresence Investment

Maximizing the Return on a Telepresence Investment Maximizing the Return on a Telepresence Investment With its real-time capability and high definition screens, telepresence elevates video communication to the personal level of face-to-face interaction,

More information

RESOLUTION NO WHEREAS, adoption of this resolution will repeal and replace City of Cheyenne Resolution No

RESOLUTION NO WHEREAS, adoption of this resolution will repeal and replace City of Cheyenne Resolution No RESOLUTION NO. 4758 ENTITLED: A RESOLUTION REPEALING AND REPLACING RESOLUTION NO. 4180 FOR ESTABLISHING THE CHEYENNE/LARAMIE COUNTY COOPERATIVE GIS PROGRAM, EXECUTIVE COMMITTEE, TECHNICAL AND USER GROUPS,

More information

Bernhard Steffen, Falk Howar, Malte Isberner TU Dortmund /CMU. B. Steffen Summer School CPS

Bernhard Steffen, Falk Howar, Malte Isberner TU Dortmund /CMU. B. Steffen Summer School CPS Active Automata Learning: From DFA to Interface Programs and Beyond or From Languages to Program Executions or (more technically) The Power of Counterexample Analysis Bernhard Steffen, Falk Howar, Malte

More information

Moving from Sentinel SuperPro to Sentinel LDK Migration Guide

Moving from Sentinel SuperPro to Sentinel LDK Migration Guide Moving from Sentinel SuperPro to Sentinel LDK Migration Guide Copyrights and Trademarks Copyright 2013 SafeNet, Inc. All rights reserved. HARDLOCK, HASP, SENTINEL, SUPERPRO and ULTRAPRO are registered

More information

Sentinel LDK. Migration Guide Sentinel SuperPro to Sentinel LDK

Sentinel LDK. Migration Guide Sentinel SuperPro to Sentinel LDK Sentinel LDK Migration Guide Sentinel SuperPro to Sentinel LDK All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall

More information

Vacancy Announcement

Vacancy Announcement Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Marine Sierra Hotel Aviation Readiness Program (M-SHARP) Department of the Navy - United States Marine Corps (USMC) SECTION 1: IS A PIA REQUIRED? a. Will this Department

More information

Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY

Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 2221.5D N2N6 OPNAV INSTRUCTION 2221.5D From: Chief of Naval Operations Subj: RELEASE

More information

Provider Handbooks. Telecommunication Services Handbook

Provider Handbooks. Telecommunication Services Handbook Provider Handbooks December 2016 Telecommunication Services Handbook The Texas Medicaid & Healthcare Partnership (TMHP) is the claims administrator for Texas Medicaid under contract with the Texas Health

More information

HealthMatics ED Emergency Department Information System

HealthMatics ED Emergency Department Information System HealthMatics ED Emergency Department Information System Used in over 3 million emergency department visits a year at the most well respected hospitals nationwide. The right choice for your emergency department.

More information

Server, Desktop, Mobile Platforms Working Group (SDMPWG) Dated

Server, Desktop, Mobile Platforms Working Group (SDMPWG) Dated Server, Desktop, Mobile Platforms Working Group (SDMPWG) Dated 2011-04-25 The information provided below is subject to change and reflects the current knowledge of the Working Group. 1. Management Problem(s)

More information

FF-ASVAB Ability Measures, from the U.S. Department of Defense ASVAB Tests, 1997

FF-ASVAB Ability Measures, from the U.S. Department of Defense ASVAB Tests, 1997 The Harris School NLSY97 Flat Files June 2007 FF-ASVAB-Codebook.607 FF-ASVAB Ability Measures, from the U.S. Department of Defense ASVAB Tests, 1997 Total of 149 variables . des Contains data from FF-ASVAB.dta

More information

The Cost of a Misfiled Medical Document

The Cost of a Misfiled Medical Document : The Cost of a Misfiled Medical Document INTRODUCTION Misfiling of medical documents is a common problem in all types of medical practices. A document may be misfiled for a number of reasons, and each

More information

The Nomad Digital Pen

The Nomad Digital Pen The Nomad Digital Pen ENSC 440/305 School of Engineering Science Simon Fraser University 2009.05.15 Copyright 2009 - TechStyles Inc. 1 Outline The TechStyles Team Roles in the Project Team Dynamic Motivation

More information

2018 NASS IDEAS Award Application State of Colorado

2018 NASS IDEAS Award Application State of Colorado 2018 NASS IDEAS Award Application State of Colorado Nominating State Office: Secretary of State Wayne W. Williams 1700 Broadway, Suite 200 Denver, CO 80290 303-894-2200 Project Lead and Staff Contact for

More information

1. When will physicians who are not "meaningful" EHR users start to see a reduction in payments?

1. When will physicians who are not meaningful EHR users start to see a reduction in payments? CPPM Chapter 7 Review Questions 1. When will physicians who are not "meaningful" EHR users start to see a reduction in payments? a. January 1, 2013 b. January 1, 2015 c. January 1, 2016 d. January 1, 2017

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Missile Defense Agency Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Development (ATD) COST ($

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 20 Mar 2015 Effective Date: 15 Sep 2016 Task Number: 71-8-5715 Task Title: Control Tactical Airspace (Brigade - Corps) Distribution Restriction:

More information

2017 Transition Year Flexibility Advancing Care Information (ACI) Category Options

2017 Transition Year Flexibility Advancing Care Information (ACI) Category Options The Physicians Advocacy Institute s Medicare Quality Payment Program (QPP) Physician Education Initiative 2017 Transition Year Flexibility Advancing Care Information (ACI) Category Options Ad 1 P a g e

More information

Technical Notes for HCAHPS Star Ratings (Revised for October 2017 Public Reporting)

Technical Notes for HCAHPS Star Ratings (Revised for October 2017 Public Reporting) Technical Notes for HCAHPS Star Ratings (Revised for October 2017 Public Reporting) Overview of HCAHPS Star Ratings As part of the initiative to add five-star quality ratings to its Compare Web sites,

More information

Online Application Guideline - Non-Business Organizations -

Online Application Guideline - Non-Business Organizations - Online Application Guideline - Non-Business Organizations - To participate in the Global Compact, a non-business organization: Prepares a Letter of Commitment (Fig. 1 below) signed by the Chief Executive

More information

Russ Kuhn Scott Moore Esri

Russ Kuhn Scott Moore Esri Russ Kuhn Scott Moore Esri ESRI Open Data Discussion OD is here to stay but - Review of why it s here - How is it performing Current WA OD Situation OD Moving Forward - OD Best practices - OD future capabilities

More information

Rural Health Care Services of PHC and Its Impact on Marginalized and Minority Communities

Rural Health Care Services of PHC and Its Impact on Marginalized and Minority Communities Rural Health Care Services of PHC and Its Impact on Marginalized and Minority Communities L. Dinesh Ph.D., Research Scholar, Research Department of Commerce, V.O.C. College, Thoothukudi, India Dr. S. Ramesh

More information

Don t Whisper My Chips

Don t Whisper My Chips Don t Whisper My Chips Colin O Flynn Dalhousie University Halifax, NS. Canada. ColinOFlynn.com DEFCON 2015. 1 Objective: Learn about a type of physical attack. Critical Difference: Everything I m showing

More information

Online Scheduling of Outpatient Procedure Centers

Online Scheduling of Outpatient Procedure Centers Online Scheduling of Outpatient Procedure Centers Department of Industrial and Operations Engineering, University of Michigan September 25, 2014 Online Scheduling of Outpatient Procedure Centers 1/32 Outpatient

More information

Erasmus+ Programme. Key Action 1 Mobility for learners and staff Higher Education Student and Staff Mobility. between programme countries

Erasmus+ Programme. Key Action 1 Mobility for learners and staff Higher Education Student and Staff Mobility. between programme countries Erasmus+ Programme Key Action 1 Mobility for learners and staff Higher Education Student and Staff Mobility Inter-institutional 1 agreement 2014-20[21] 2 between programme countries [Minimum requirements]

More information

Sentinel LDK. Migration Guide HASP HL to Sentinel LDK

Sentinel LDK. Migration Guide HASP HL to Sentinel LDK Sentinel LDK Migration Guide HASP HL to Sentinel LDK All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Joint Distributed Engineering Plant (JDEP)

Joint Distributed Engineering Plant (JDEP) Joint Distributed Engineering Plant (JDEP) JDEP Strategy Final Report Dr. Judith S. Dahmann John Tindall The MITRE Corporation March 2001 March 2001 Table of Contents page Executive Summary 1 Introduction

More information

Ascom MEDSTAR FRANKLIN SQUARE MEDICAL CENTER ASCOM COMMUNICATIONS STREAMLINE WORKFLOW THROUGH CLINICAL INTEGRATION. Introduction

Ascom MEDSTAR FRANKLIN SQUARE MEDICAL CENTER ASCOM COMMUNICATIONS STREAMLINE WORKFLOW THROUGH CLINICAL INTEGRATION. Introduction Customer: Medstar Franklin Square Medical Center Solution: Ascom Unite, IP-DECT handsets and clinical integrations MEDSTAR FRANKLIN SQUARE MEDICAL CENTER ASCOM COMMUNICATIONS STREAMLINE WORKFLOW THROUGH

More information

Visitor Information - Surveys and Countings

Visitor Information - Surveys and Countings Visitor Information - Surveys and Countings in Finland Joel Erkkonen, Metsähallitus,, Natural Heritage Services Tuija Sievänen Tuija Sievänen Finnish Forest Research Institute National Outdoor Recreation

More information