HOME
*





CIPURSE
CIPURSE is an open security standard for transit fare collection systems. It makes use of smart card technologies and additional security measures. History The CIPURSE open security standard was established by the Open Standard for Public Transportation Alliance to address the needs of local and regional transit authorities for automatic fare collection systems based on smart card technologies and advanced security measures. Products developed in conformance with the CIPURSE standard are intended to: *include advanced security technology, *support multiple applications, *help enable compatibility with legacy systems, and *be available in a variety of form factors. The open CIPURSE standard is intended to: *promote vendor neutrality, *enable cross-vendor system interoperability, *reduce the risk of adopting new technology, and *improve market responsiveness. All of these factors are intended to reduce operating costs and increase flexibility for transport system operators. B ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Calypso (electronic Ticketing System)
Calypso is an international electronic ticketing standard for microprocessor contactless smart cards, originally designed by a group of transit operators from 11 countries including Belgium, Canada, France, Germany, Italy, Latvia, México, Portugal and others. It ensures multi-sources of compatible products, and allows for interoperability between several transport operators in the same area. History Calypso was born in 1993 from a partnership between the Paris transit operator RATP and ''Innovatron'', a company owned by the French smartcard inventor, Roland Moreno. The key features of the scheme were patented by ''Innovatron''. Most European transit operators from Belgium, Germany, France, Italy and Portugal eventually joined the group in the following years. The first use of the technology was in 1996. In the same time, the international standard ISO/IEC 14443 for contactless smart cards was being designed, and the actors of Calypso strongly lobbied to have their technology ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Near Field Communication
Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 cm (1 in) or less. NFC offers a low-speed connection through a simple setup that can be used to bootstrap more-capable wireless connections. Like other "proximity card" technologies, NFC is based on inductive coupling between two so-called antennas present on NFC-enabled devices—for example a smartphone and a printer—communicating in one or both directions, using a frequency of 13.56 MHz in the globally available unlicensed radio frequency ISM band using the ISO/IEC 18000-3 air interface standard at data rates ranging from 106 to 424 kbit/s. The standards were provided by the NFC Forum. The forum was responsible for promoting the technology and setting standards and certifies device compliance. Secure communications are available by applying encryption algorithms as is done for credit cards and if they fit the crite ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ISO/IEC 14443
ISO/IEC 14443 ''Identification cards -- Contactless integrated circuit cards -- Proximity cards'' is an international standard that defines proximity cards used for identification, and the transmission protocols for communicating with it. Standard The standard is developed by ISO/IEC JTC 1 (Joint Technical Committee 1) / SC 17 (Subcommittee 17) / WG 8 (Working Group 8). Parts * ISO/IEC 14443-1:2018 Part 1: Physical characteristics * ISO/IEC 14443-2:2016 Part 2: Radio frequency power and signal interface * ISO/IEC 14443-3:2018 Part 3: Initialization and anticollision * ISO/IEC 14443-4:2018 Part 4: Transmission protocol Types Cards may be Type A and Type B, both of which communicate via radio at 13.56 MHz (RFID HF). The main differences between these types concern modulation methods, coding schemes (Part 2) and protocol initialization procedures (Part 3). Both Type A and Type B cards use the same transmission protocol (described in Part 4). The transmission protocol sp ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Public Transport
Public transport (also known as public transportation, public transit, mass transit, or simply transit) is a system of transport for passengers by group travel systems available for use by the general public unlike private transport, typically managed on a schedule, operated on established routes, and that charge a posted fee for each trip. There is no rigid definition; the ''Encyclopædia Britannica'' specifies that public transportation is within urban areas, and air travel is often not thought of when discussing public transport—dictionaries use wording like "buses, trains, etc." Examples of public transport include Public transport bus service, city buses, trolleybuses, trams (or light rail) and Passenger rail transport, passenger trains, rapid transit (metro/subway/underground, etc.) and ferry, ferries. Public transport between cities is dominated by airlines, intercity bus service, coaches, and intercity rail. High-speed rail networks are being developed in many parts ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Counterfeiting
To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value than the real thing. Counterfeit products are fakes or unauthorized replicas of the real product. Counterfeit products are often produced with the intent to take advantage of the superior value of the imitated product. The word ''counterfeit'' frequently describes both the forgeries of currency and documents as well as the imitations of items such as clothing, handbags, shoes, pharmaceuticals, automobile parts, unapproved aircraft parts (which have caused many accidents), watches, electronics and electronic parts, software, works of art, toys, and movies. Counterfeit products tend to have fake company logos and brands, which results in patent or trademark infringement in the case of goods. They also have a reputation for being lower quality, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


INSIDE Secure S
Inside may refer to: * Insider, a member of any group of people of limited number and generally restricted access Film * ''Inside'' (1996 film), an American television film directed by Arthur Penn and starring Eric Stoltz * ''Inside'' (2002 film), a Canadian prison drama film * ''Inside'' (2006 film), an American thriller film starring Nicholas D'Agosto and Leighton Meester * ''Inside'' (2007 film), originally ''À l'intérieur'', a French horror film directed by Alexandre Bustillo and Julien Maury ** ''Inside'' (2016 film), a 2016 Spanish-American film remake of the 2007 film * ''Inside'' (2011 film), an American social film * ''Inside'' (2012 film), an American horror film * ''Inside'' (2013 film), a Turkish drama film * '' Bo Burnham: Inside'', a 2021 American comedy special * ''Inside'' (2023 film), an upcoming film starring Willem Dafoe Television * "Inside" (''American Horror Story''), an episode of the tenth season of ''American Horror Story'' Music Albums * ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Infineon Technologies AG
Infineon Technologies AG is a German semiconductor manufacturer founded in 1999, when the semiconductor operations of the former parent company Siemens AG were spun off. Infineon has about 50,280 employees and is one of the ten largest semiconductor manufacturers worldwide. In fiscal year 2021, the company achieved sales of €11.06 billion. Infineon bought Cypress Semiconductor in April 2020. Markets Infineon markets semiconductors and systems for automotive, industrial, and multimarket sectors, as well as chip card and security products. Infineon has subsidiaries in the US in Milpitas, California, and in the Asia-Pacific region, in Singapore and Tokyo, Japan. Infineon has a number of facilities in Europe, one in Dresden. Infineon's high power segment is in Warstein, Germany; Villach and Graz in Austria; Cegléd in Hungary; and Italy. It also runs R&D centers in France, Singapore, Romania, Taiwan, UK, Ukraine and India, as well as fabrication units in Singapore, Malaysia, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Oberthur Technologies
Oberthur Technologies was a French digital security company, providing secure technology solutions for Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control. As of 2008, Oberthur's revenue was €882 million. Oberthur Technologies was the successor of the Oberthur printing which was founded in 1842 by the master printer and lithographer, François-Charles Oberthür. Oberthur merged with Morpho to form IDEMIA on 28 September 2017. History 1842 Oberthur was founded by printer and lithographer François-Charles Oberthür 1984 Jean-Pierre Savare takes over security printing activity for François-Charles Oberthur Fiduciaire 1985 Creation of François-Charles Oberthur Card Systems 1990 Acquisition of Banknote of America Corporation 1991 Creation of François-Charles Oberthur Chèque et Sécurité 1993 Acquisition of Axytrans, France 1997 Creation of Oberthur Smart Cards 1999 Acquisition of De La Rue Card Systems a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Giesecke & Devrient GmbH
Giesecke+Devrient, also known as (G+D), is a German company headquartered in Munich that provides banknote and securities printing, smart cards, and cash handling systems. History Founded in 1852 by Hermann Giesecke and Alphonse Devrient, the firm initially specialized in high-quality printing, notably currency and securities printing. From the 1850s to the 1870s the firm printed some of the important biblical editions of Constantin von Tischendorf. The partnership's reputation for quality work was confirmed at the 1867 international exhibition in Paris. Giesecke+Devrient supplied currency during the inflation in the Weimar Republic in the 1920s, one of the most prominent cases of hyperinflation. It also printed tickets to the 1936 Olympics in Germany and did business with Spain under Franco."Zimbabwe Can't Paper Over Its Million-Percent Inflation Anymore; Under Pressure, German Company Cuts Off Shipments of Blank Bank Notes to Mugabe," ''Wall Street Journal.'' July 2, 200 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Radio Frequency
Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the upper limit of audio frequencies and the lower limit of infrared frequencies; these are the frequencies at which energy from an oscillating current can radiate off a conductor into space as radio waves. Different sources specify different upper and lower bounds for the frequency range. Electric current Electric currents that oscillate at radio frequencies (RF currents) have special properties not shared by direct current or lower audio frequency alternating current, such as the 50 or 60 Hz current used in electrical power distribution. * Energy from RF currents in conductors can radiate into space as electromagnetic waves ( radio waves). This is the basis of radio technology. * RF current does not penetrate deeply into electrical c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Key (cryptography)
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key’s security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. Scope The key is what is used to encrypt data from plaintext to ciphertext. There are different methods for utilizing keys and encryption. Symmetric cryptography Symmetric cryptography refers to the practice of the same key being used for both encryption and decryption. Asymmetric cryptography Asymmetric cryptography has separate keys for encrypting and decrypting. These keys are known as the public and private keys, respectively. Purpose Since the key pro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Man-in-the-middle Attack
In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker wit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]