Century Longmai – Digital Security Logo Century Longmai – Digital Security Retina Logo Century Longmai – Digital Security Sticky Logo Century Longmai – Digital Security Sticky Logo Retina
  • PRODUCTSLongmai product portfolio
    • mToken PKI Authentication
      • mToken CryptoID-FIPS Token
      • mToken K1-HID Token
      • mToken K2-CCID Token
      • mToken K3-Auto Plug & Play Token
      • mToken K5-Mobile PKI Token
      • mToken K9-Bio Token
      • mToken UKey
      • mToken TF-Smart Card MicroSD
    • mLock Software Protection
      • mLock X1-Smart STD
      • mLock X3–Smart Code
      • mLock X5-Supporting Linux OS
      • mLock Smart UDisk
      • mLock Time
    • mOTP Authentication Token
      • mOTP m100
      • mOTP m200
      • mOTP m300
    • meDocs e-Document Management
      • meDocs-M
      • meDocs-P
    • mCard Smart Card
      • mCard CPK
      • mCard JavaCard
    • mReader Smart Card Reader
      • mReader W100
    • mFIDO FIDO Authentication
      • mFIDO U2
      • mFIDO U4
    • mNFC NFC Readers
      • mNFC N100
      • mNFC N200
  • SOLUTIONS & SERVICES
    • Identity & Access
      • Access Control
      • License Control
      • mCard CPK solution
      • Online IA
    • Government
      • eDocument Security
      • eHealthCare
      • Online Gaming Security
      • Wireless Digital Signature
    • Financial
      • eBanking
      • eCommerce
      • Mobile Payment
    • Personal e-Document Security
    • ODM/OEM Services
  • ABOUT US
    • Who We Are
    • What We Do
    • Who We Work With
    • Contact Info
    • Corporate Program
    • Jobs/Careers
    • FAQs
    • Press Release
    • Technologies
      • Bluetooth LE
      • BYOD
      • Cryptography
      • Glossary Terms
      • mCard Java Card
      • Internet of Things
      • One Time Password
      • Other Technologies
  • PRODUCTSLongmai product portfolio
    • mToken PKI Authentication
      • mToken CryptoID-FIPS Token
      • mToken K1-HID Token
      • mToken K2-CCID Token
      • mToken K3-Auto Plug & Play Token
      • mToken K5-Mobile PKI Token
      • mToken K9-Bio Token
      • mToken UKey
      • mToken TF-Smart Card MicroSD
    • mLock Software Protection
      • mLock X1-Smart STD
      • mLock X3–Smart Code
      • mLock X5-Supporting Linux OS
      • mLock Smart UDisk
      • mLock Time
    • mOTP Authentication Token
      • mOTP m100
      • mOTP m200
      • mOTP m300
    • meDocs e-Document Management
      • meDocs-M
      • meDocs-P
    • mCard Smart Card
      • mCard CPK
      • mCard JavaCard
    • mReader Smart Card Reader
      • mReader W100
    • mFIDO FIDO Authentication
      • mFIDO U2
      • mFIDO U4
    • mNFC NFC Readers
      • mNFC N100
      • mNFC N200
  • SOLUTIONS & SERVICES
    • Identity & Access
      • Access Control
      • License Control
      • mCard CPK solution
      • Online IA
    • Government
      • eDocument Security
      • eHealthCare
      • Online Gaming Security
      • Wireless Digital Signature
    • Financial
      • eBanking
      • eCommerce
      • Mobile Payment
    • Personal e-Document Security
    • ODM/OEM Services
  • ABOUT US
    • Who We Are
    • What We Do
    • Who We Work With
    • Contact Info
    • Corporate Program
    • Jobs/Careers
    • FAQs
    • Press Release
    • Technologies
      • Bluetooth LE
      • BYOD
      • Cryptography
      • Glossary Terms
      • mCard Java Card
      • Internet of Things
      • One Time Password
      • Other Technologies

Our Technology Catalog – CPK, PKI, 2FA, PC/SC

​Digital security involves both physical secure elements, operating systems and software to deliver end-user value by protecting identities and digital assets.  Personalization and provisioning mechanisms are also key factors in the execution of innovative business models.

Public Key Infrastructure (PKI)

The Public Key Infrastructure is a broadly used security system that employs a public key to digitally sign and/or encrypt data when performing a secure transaction. PKI solutions require a Certificate Authority (CA) to issue such Public Keys and be liable when linking keys to individuals. PKI deployments involve a Key Management System (KMS) to enroll users, issue certificates and store keys.

Read More about Longmai’s expertize in this domain

Combined Public Key (CPK)

Combined Public Key (CPK) Cryptosystem is an Identity Based Encryption (IBE) scheme, which is a public-key cryptosystem where any string is a valid public key, such as email address info@longmai.net

Users who share a public parameter (called public key matrix) can encrypt a message or verify a signature by other’s identity (such as email address) without his X.509 certificate. CPK is based on Elliptic Curve Cryptography (ECC).

 

Personal computer/Smart Card (PC/SC)

PC/SC, Personal computer/Smart Card is a standard framework for Smart Card access on Windows Platforms (included in Windows 2000).

What is the PC/SC Technology ?
The interoperability specification for ICCs and Personal Computer Systems (PC/SC) has been developed to ease the introduction of smart cards into the world of PCs. The advantage of PC/SC is that applications do not have to acknowledge the details corresponding to the smart card reader when communicating with the smart card. This application can function with any reader that complies with the PC/SC standard.

 

One-Time Password (OTP)

One-Time-Password (OTP) is a two factor authentication technique widely used for online banking and enterprise logical access. Security-wise, one factor authentication such as Username/Password is subject to phishing attacks. To strengthen security it is recommended to use 2 factors: “What I know” + “What I have” to eliminate fraudsters from phishing passwords. An OTP device will generate a one-time password to be entered for a given transaction that is mandatory to granting access or validating the transaction. Such OTP devices can be standalone (Timebase or sequential list of one time passwords) or connected via the internet to a back-office server that calculates the One-Time-Password.  Read ABout One time password system to prevent using stolen or copied passwords.

Two Factor Authentication (2FA)

Two Factor Authentication (2FA) is a security technique aimed at strengthening 1FA techniques (typically Username/Password). This system requires a second factor that is mandatory to access or validate a transaction. The first factor is usually “Something I know” and the second factor can be “something I have,” “Where I am” (geo-localization) or “What I am” (Biometrics). 2FA creates many new initiatives for a seamless second factor system. Today, the second FA is often an OTP (One-Time-Password) calculated by itself or via a connection to a server, and delivered to a device the user has with him/her. Gemalto Ezio Suite offers a comprehensive portfolio of such solutions, including the use of a payment card which generates OTPs.

JavaCard

JavaCard is an implementation of Java adapted for a Smart Cards microprocessor system. It optimizes performance with a highly compressed amount of code. UICC SIM cards support Java applets and developers can access a very rich SDK to develop their applications. To date, Java Card and the STK (SIM Tool Kit) are the most efficient methods of deploying applications to more than 4 billion handsets using 2G, 3G and 4G networks worldwide.
Read More about Java Card technology

Biometric Authentication

Biometrics is a human identity attribute that is unique to each individual and non-modifiable over time. This identifying human trait can be a fingerprint, an iris image or a DNA sample. Biometric data procurement consists of measuring an identity attribute and comparing it with previously collected records. This step can be done in one of two ways. One method is submitting the comparative analysis to a central online database that stores biometric data collected from enrolled users. The second way is perform a “match-on-card,” an offline verification of the stored biometric data found inside the microprocessor chip of the smart card. The second technique, “match-on-card”, is an extremely secure method and allows for no central database to obtain remote access.

Navigate to our Product Release Page

Copyright © 2013 - Century Longmai. All Rights Reserved Privacy Terms | 中文网站