Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.

Slides:



Advertisements
Similar presentations
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Advertisements

A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 11 Windows on a Network.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
Introduction to Computers and Information Systems CE 100: Module 1: Hardware.
IS Network and Telecommunications Risks
Networks Adapting Computers to Telecommunications Media.
IS 247 Introduction to Web Application Development Tim Wu.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
4Gon Tel: +44 (0) Fax: +44 (0) G/3G ROUTERS GWR series Sergej Stolić, M.Sc.Geneko.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
DAKNET Presented By: rreema.
LECTURE 2 CT1303 LAN. STANDARD MODELS: OSI Model : Open system Interconnection. is a conceptual model that characterizes and standardizes the internal.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Rajesh Kakde Senior Windows Embedded Consultant Adeneo Corporation Session Code: WEM302.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Innovative Broadband Services C hanging the way we present information: Digital Signs : Effective business promotion Nikolaos Desypris, Chief Executive.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
Basic Data Communication
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
FIRST COURSE Essential Computer Concepts. 2 Objectives Compare the types of computers Describe the components of a computer system Describe input and.
Application Suite. ¿What is HiperCenter? HiperCenter provides a rapid and reliable way to implement on line transaction processing (OLTP) solutions. HiperCenter.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
CCNA2 Chapter 1 Wide Area Networks and Routers. WAN is a data communications network that operates beyond a LAN’s geographic scope. Users subscribe to.
Presentation on Kiosk Services TrigMax Enterprise Solutions Mason Liu, Ph.D.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
ATM/POS INTEGRATION INTORDUCTION
GENERAL BANK MANAGEMENT Technology Management
ECE 477 Design Review Team 4  Spring 2008 Zach Dicklin Amy Ritter Ian Bacon Eric Yee.
Fundamental Principles of Computer Systems Unit B, Objective 3.01 & 3.02.
Input/OUTPUT [I/O Module structure].
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
CHAPTER FOUR COMPUTER SOFTWARE.
Chapter 7 Low-Level Protocols
Introduction to Interactive Media Interactive Media Tools: Software.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
Next Generation Security Solutions Next Generation Controllers January 2013.
Multimedia is a combination of text, art, sound, animation, and video.
MODULE 1 Computing Essentials © Paradigm Publishing, Inc.1.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Computers Are Your Future Eleventh Edition
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Cisco 2 - Router Perrine. J Page 111/12/2015 Chapter 1 WAN is a data communications network that operates beyond a LAN’s geographic scope. One must subscribe.
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
Computer Basics & Terminology Study Guide Test 5 6 th grade MSBCS-BCSI-1 Students will identify computer system components.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
NETWORKING & SYSTEM UPDATES
New product introduction:
4 m 9K Copyright 2002 Forum 9000, LLC Slide 1 Forum 9000 Quality Systems for Quality Care.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
Semester 1 v CCNA 1 Module 1:Introduction. Semester 1 v Connecting to the Internet.
Networks The Big Picture. Three Great Leaps of Civilization.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
emerald™ New Product Announcement November 2012.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
Network Infrastructure
Hardware.
CT1303 LAN Rehab AlFallaj.
RKL Remote key loading.
Presentation transcript:

Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.

9/28/2006TrigMax Enterprise Solutions Case Study – Wall Mount ATM

9/28/2006TrigMax Enterprise Solutions System Overview  Capacity  Operate up to 1,000 ATM terminals in parallel  Software environment  Linux  InforMix or Oracle Database  ISO8583 Financial Data Exchange Protocol  Security  DES-ANSI X3.92:1981 data encryption  Public-Key based ISO 7816 security infrastructure  Message Authentication Code (MAC) deployment  ISO 9564 : 1991 for Personal PIN protection  EMV certified  Multi-level TCP/IP networks with VLAN

9/28/2006TrigMax Enterprise Solutions Architecture Partitions  System Topology  Network Structure  Kiosk Terminal  Edge Server  Main Server  Security

9/28/2006TrigMax Enterprise Solutions Technology Overview > System Topology LAN ADSL CDMA Kiosk Edge Server Bank Main Server MODE M 3 rd Party Edge Server 3 rd Party Network Kiosk Sub-net Main Network Virtual LAN

9/28/2006TrigMax Enterprise Solutions Architecture > Network Structure Network architecture defines following components:  Multi-layer network topology  Terminal – server connection scheme  TCP/IP Client/Server interaction  Run-Time environment  Web based secured https access  Data distribution  Web based applications  SQL database

9/28/2006TrigMax Enterprise Solutions Architecture > Kiosk Terminal  Hardware and peripheral modules  Software and environment  Human-machine interface  Network interface Following considerations are needed in designing the kiosk terminal:

9/28/2006TrigMax Enterprise Solutions Architecture > Kiosk Terminal > Hardware  LCD and touch-screen display  Secured metal keypad, YDT220  CDMA2000-1X / GPRS, sync/async Modem, LAN(RJ45), RS232  Printer  ISO7812 standard 1,2, or 3 track reader  ISO7816 IC card ( APDU I/O)  Network NIC  Power

9/28/2006TrigMax Enterprise Solutions Architecture > Kiosk Terminal > Parts List Modules Items Descriptions Parts Remark Main Controller Microprocessor 32bit ARM 4 serial ports on board Mamory 128M Motherboard Embedded system board Display I/F On board Network I/F On Board Flash Compact Flash IO Network I/F Ethernet RJ45 Cellula Wireless CDMA or GPRS Input Devices Credit Card Reader Manual card reader LKE750 Standard IC card/RFID Custom Optional Keypad Metal keypad, YDT keypad, 2x4 function keys PCB security optional Output Devices Display 10.4 inch LCD Bullet-proof glass Sound Custom Printer Epson,EUT532 EUT532+MB500 Power Main power LW2145 Regulator, Filter, ATX standard

9/28/2006TrigMax Enterprise Solutions Architecture > Kiosk Terminal > Software  Basic requirement - Remote upgradeable  Security drivers  EMV standard card driver  ISO 7816 IC card interface  ISO 8583 card-based transaction protocol  Keypad driver, touch screen driver  Printer driver  Unified Network driver for broadband, wireless, and serial port connections  Multimedia display drivers  Image and video (MPG, JPG, GIF, Flash)  Audio (mp3, au)

9/28/2006TrigMax Enterprise Solutions Architecture > Kiosk Terminal > Human-Machine Interface  Support commercial applications  Support multimedia A / V display  Support image processing  Value-added advertisement – online remote update  User friendly interactive interface

9/28/2006TrigMax Enterprise Solutions Architecture > Kiosk Terminal > Network Interface  Support variety of TCP/IP based communication methods  Wireless  Cellular  Wired – Ethernet, Serial, DSL, modem  Generic driver interface  ISO 8583 – Standard for Financial Transaction Card Originated Messages

9/28/2006TrigMax Enterprise Solutions Architecture > Edge Server  Major functionalities  Kiosk terminal management  Transaction status tracking  Software environment  Network interface

9/28/2006TrigMax Enterprise Solutions Architecture > Edge Server > Software Environment  Security Measures  Security key manager  Dynamic key generation and distribution  Security monitoring  Data Transaction Measures  Transaction recording and dispatch  Error handling, recovery  Operation monitoring

9/28/2006TrigMax Enterprise Solutions Architecture > Edge Server > Software Components The software package consists of following components:  Kiosk (ATM side) interface module  Main server (bank side) interface module  Database (Oracle) management module  Security management module

9/28/2006TrigMax Enterprise Solutions Architecture > Security  Support the Public-Key based ISO 7816 security infrastructure  Support EMV protocol  Security measurements: Access control, Identification, Authentication, Data integrity, Data protection, Channel monitoring, error concealment.

9/28/2006TrigMax Enterprise Solutions Architecture > Security > Keys Main key Distributed by the edge server to generate the Terminal Key Use the Terminal ID as the formation factor Terminal Key Scramble the Work Key ① Terminal : Decrypt and retrieve the Work Key at reception ② Edge Server : Generate and encrypt the Work Key Work Key Encrypt the payload, generate the MAC code for data integrity checking. ① Terminal : encrypt/decrypt the transaction payload ② Edge Server : encrypt/decrypt the transaction payload Terminal ID Unique ID for each terminal Combined with Main Key to track the transaction per terminal Personal Key To determine the legality of personal PIN ① Terminal: Collect and encrypt the data and personal key using the Work Key, deliver the payload to the Main Server through the Edge Server. ② Main Server (bank): Validate and authorize the transaction PSAM (Payment Secure Application Module) MAC (Message Authentication Code)

9/28/2006TrigMax Enterprise Solutions Architecture > Security > Data Safety  Network safety  Firewalls in routers  Virtual sub-net (VLAN) partitions  Safety in data transfer  Deployment of MAC for data integrity  Encryption for data protection  Safety in data storage  Identification (access, owner, transaction)  Encryption