!
"
#
! "# $ % " % " % & #" " ' % " "( )* + " , - "% "# " " ! "# $ % " % " % & #" " ' % " "( ." & "# ' % " "( & " , / 0 10 '#
' " % 2 3" 1%" % 2 1 3 % 3 % " %" 2" " 0 ' 13 % "24% 3 " ## % % #" " "# % "2 % " 0 ' 3 " "3 5 & %" " " % 6 % / % " / " 0&$ % 3 #"% " 2 % "2 % " 0 ' " % #"% " 0&$ ( % " ( 0&$ % 5 & ' %" % 2 #"% ( " " "# 5 & %" " / 2 0&$ % %" % 2 #"% ( " 5 & 3 / ( / " " ' "24% " %" ## % ( ( #" % 1 " " " ( % ( " ' %" % " 3 %" " % "" ( ( " "# " %" 1# "# " " " % 5 & " / " " 7 2 # # " ( / 8 %" " 5 & % " % 2 " "% % %" % " "" ( % 0&$ % " " "## " % " %" % " 13 % " % #" /$) ! " " 2 #" ## % " "( " ' "" 2 #" " ( 5 & % /$) 2 3 %" " "% " 2 3 "" 2 #" / 8 5 & 3 / ( % " " ' " ( " "" # " # # " 5 - 1 %" ( % 2 3 /$) " / 2 0&$ 8 # % 2" "2 " " " # % " ( #"% " " # " 0&$ " " 1 ( " 2 " " "# " 0&$#
1 INTRODUCTION... 1.1–1 1.1 STRUCTURE OF THE REPORT... 1.1–2 1.2 CONVENTIONS USED... 1.2–2 2 BACKGROUND ... 1.2–4 2.1 OVERVIEW OF JAVA... 2.1–4 2.2 JAVA 2 PLATFORM, MICRO EDITION (J2ME)... 2.2–4
2.2.1 Overview of J2ME... 2.2–5 2.2.2 Advantages of Wireless Java... 2.2–7 2.2.3 Loading a Java application into a mobile device ... 2.2–7
2.3 SIM CARDS... 2.3–8
2.3.1 Basics about SIM and smart cards in general ... 2.3–8 2.3.2 Java enabled smart cards ... 2.3–11 2.3.3 Wireless Internet Browser WIB SIM card ... 2.3–19 2.3.4 SIM WIB with Java plug-in... 2.3–20 2.3.5 Over The Air (OTA) overview... 2.3–21
3 DEVELOPMENT AND EVALUATION ... 2.3–23 3.1 APPLICATION... 3.1–23
3.1.1 Basic Requirements... 3.1–23 3.1.2 Use Case examples ... 3.1–23 3.1.3 Limitations ... 3.1–25 3.1.4 Security ... 3.1–25 3.1.5 Evaluation technique ... 3.1–25 3.2 WIB EVALUATION... 3.2–26 3.2.1 Application design ... 3.2–26 3.2.2 Security design ... 3.2–28 3.2.3 Implementation and limitations ... 3.2–28 3.2.4 Evaluation ... 3.2–29 3.2.5 Evaluation Summary ... 3.2–42 3.2.6 Development: problems, environment & time ... 3.2–45
3.3 JAVA CARD EVALUATION... 3.3–46
3.3.1 Application Design... 3.3–46 3.3.2 Security Design ... 3.3–48 3.3.3 Implementation and limitations ... 3.3–49 3.3.4 Evaluation ... 3.3–49 3.3.5 Evaluation Summary ... 3.3–63 3.3.6 Development: problems, environment & time ... 3.3–65
3.4 JAVA IN THE PHONE EVALUATION... 3.4–68
3.4.1 Application Design... 3.4–68 3.4.2 Security design ... 3.4–69 3.4.3 Implementation and limitations ... 3.4–69 3.4.4 Evaluation ... 3.4–71
3.4.5 Evaluation Summary ... 3.4–85 3.4.6 Development: problems, environment & time ... 3.4–87
3.5 WIB WITH JAVA PLUG-IN EVALUATION... 3.5–88
3.5.1 Application Design... 3.5–88 3.5.2 Security design ... 3.5–89 3.5.3 Implementation and limitations ... 3.5–89 3.5.4 Evaluation ... 3.5–91 3.5.5 Evaluation Summary ... 3.5–98 3.5.6 Development: problems, environment & time ... 3.5–100
4 DISCUSSION/ANALYSIS... 3.5–103 4.1 PERFORMANCE... 4.1–103
4.1.1 WIB vs Java Card ... 4.1–103 4.1.2 Java Phone vs WIB with Java plug-in ... 4.1–106
4.2 DEVELOPMENT ENVIRONMENT/LEARNING THRESHOLD... 4.2–110
5 FUTURE WORK ... 4.2–113 6 CONCLUSIONS ... 4.2–115 7 REFERENCES... 4.2–118
$
FIGURE 2-1. JAVA 2 PLATFORM... 2.2–5 FIGURE 2-2. J2ME TREE... 2.2–6 FIGURE 2-3. DOWNLOAD PROCEDURE OF A JAVA APPLICATION... 2.2–8 FIGURE 2-4, THE DIFFERENT PARTS OF A SMART CARD [JAC02]. ... 2.3–9 FIGURE 2-5 THE HIERARCHICAL FILE SYSTEM OF A SMART CARD [JAC02]. ... 2.3–10
FIGURE 2-6, SHOW THE SEPARATION OF THE JCVM INTO ON-CARD ON OFF-CARD
PARTS [CHE00]. ... 2.3–12 FIGURE 2-7, THE LAYERS OF THE JCRE [CHE00]... 2.3–13
FIGURE 2-8, THE USE OF THE APPLET FIREWALL AND THE DIVISION INTO DIFFERENT
CONTEXTS [CHE00]... 2.3–16 FIGURE 2-9, THE USE OF SIOS [CHE00]. ... 2.3–18
FIGURE 2-10, THE INTERACTION BETWEEN THE WIB ON THE SIM AND THE WIG
SERVER. ... 2.3–19 FIGURE 2-11. IMPLEMENTATION OF THE SHAREABLE INTERFACE... 2.3–21
FIGURE 3-1 THE PROCESS WHEN A RESTRICTED PAGE IS REQUESTED AND PAID FOR. ... 3.2–27
FIGURE 3-2 THE TESTBED USED... 3.2–30
FIGURE 3-3 THE TOTAL EXECUTION TIME FOR A STOCK ANALYSIS SESSION DIVIDED
INTO IT’S DIFFERENT PARTS... 3.2–30
FIGURE 3-4 ESTIMATION OF PROPORTIONS WHERE TIME IS SPENT DURING A
TRANSACTION, DASHED AREAS ARE “ZOOMED” IN I.E. THEY SHOULD BE MUCH
SMALLER COMPARED TO THE OTHER. ... 3.2–31
FIGURE 3-5 TIME DISTRIBUTION DURING A SESSION USING PLAIN TEXT FOR THE
COMMUNICATION. ... 3.2–33
FIGURE 3-6 TIME DISTRIBUTION DURING A SESSION USING 3DES FOR THE
COMMUNICATION. ... 3.2–34
FIGURE 3-7 TOTAL EXECUTION TIME IN THE STOCK ANALYSIS EXAMPLE WITH USER
INTERACTION TIME REMOVED... 3.2–35
FIGURE 3-8. INCREASE IN EXECUTION TIME WITH 3DES I.E. WHICH PART HAS THE
LARGEST INCREASE IN EXECUTION TIME COMPARED TO WHEN PLAIN TEXT IS
USED. VALUES HAVE BEEN TAKEN FROM TABLE 3-3... 3.2–36
FIGURE 3-9. THE REAL DIFFERENCE IN EXECUTION TIME BETWEEN THE 3DES AND
PLAIN TEXT CASE. SEE TABLE 3-3 FOR WHICH MEASUREMENT THE DIFFERENT
NUMBERS CORRESPONDS TO. A POSITIVE VALUE MEANS THAT THE 3DES CASE
TAKES THAT MANY MORE MS AND A NEGATIVE VALUE THE OPPOSITE... 3.2–37
FIGURE 3-10 TIME TO ENCRYPT DATA ON THE SIM CARD AS A FUNCTION OF THE
NUMBER OF BYTES. ... 3.2–38
FIGURE 3-11 TIME TO ENCRYPT DATA WITH THE SECURITY CENTER AS A FUNCTION
OF THE NUMBER OF BYTES... 3.2–39
FIGURE 3-12 TOTAL TIME TO PUSH A WML PAGE THE WHOLE WAY TO THE PHONE
FROM A CLIENT CONNECTING TO THE WIG SERVER AS A FUNCTION OF THE
PAGE SIZE. ... 3.2–41
FIGURE 3-13 THE MOST CENTRAL METHODS AND ATTRIBUTES OF THE CLASS
FIGURE 3-14 PROGRAM FLOW WHEN ISSUING A BILL TO THE WIRELESS WALLET
APPLET. ... 3.3–48 FIGURE 3-15 THE TEST BED USED FOR THE EVALUATION. ... 3.3–50
FIGURE 3-16 THE TEST BED USED FOR EVALUATION. ACTIONS NUMBERED X-1 OR X
-2 MAY TAKE PLACE IN PARALLEL... 3.3–51
FIGURE 3-17 ESTIMATION OF PROPORTIONS WHERE TIME IS SPENT DURING A
TRANSACTION, DASHED AREAS ARE “ZOOMED” IN I.E. THEY SHOULD BE MUCH
SMALLER COMPARED TO THE OTHER. ... 3.3–51
FIGURE 3-18 TIME DISTRIBUTION DURING A SESSION USING 3DES FOR THE
COMMUNICATION. ... 3.3–54
FIGURE 3-19 TIME DISTRIBUTION DURING A SESSION USING PLAIN TEXT FOR THE
COMMUNICATION. ... 3.3–55
FIGURE 3-20. INCREASE IN EXECUTION TIME WITH 3DES I.E. WHICH PART HAS THE
LARGEST INCREASE IN EXECUTION TIME COMPARED TO WHEN PLAIN TEXT IS
USED. VALUES HAVE BEEN TAKEN FROM TABLE 3-3... 3.3–57
FIGURE 3-21 THE REAL DIFFERENCE IN EXECUTION TIME BETWEEN THE 3DES AND
PLAIN TEXT CASE. SEE TABLE 3-10 FOR WHICH MEASUREMENT THE DIFFERENT
NUMBERS CORRESPONDS TO. A POSITIVE VALUE MEANS THAT THE 3DES CASE
TAKES THAT MANY MORE MS AND A NEGATIVE VALUE THE OPPOSITE... 3.3–57
FIGURE 3-22 TOTAL EXECUTION TIME IN THE STOCK ANALYSIS EXAMPLE WITH USER
INTERACTION TIME REMOVED. ... 3.3–59
FIGURE 3-23 TIME TO ENCRYPT DATA ON THE SIM CARD AS A FUNCTION OF THE
NUMBER OF BYTES, USING BOTH A TRANSIENT ARRAY AS WELL AS AN
ORDINARY. ... 3.3–60
FIGURE 3-24 SERVER ENCRYPTION TIME I.E. BANK AND OR CONTENT PROVIDER... 3.3–62
FIGURE 3-25 TIME FOR THE APPLICATION NOCRYPTO IN THE GSM CASE... 3.4–74 FIGURE 3-26 TIME FOR THE APPLICATION NOCRYPTO IN THE GPRS CASE... 3.4–75 FIGURE 3-27 TIME FOR THE APPLICATION CRYPTO IN THE GSM CASE... 3.4–76 FIGURE 3-28 TIME FOR THE APPLICATION CRYPTO IN THE GPRS CASE... 3.4–77 FIGURE 3-29 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GSM CASE... 3.4–78 FIGURE 3-30 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GPRS CASE... 3.4–79 FIGURE 3-31 TIME FOR THE APPLICATION CRYPTOLONG IN THE GSM CASE... 3.4–80 FIGURE 3-32 TIME FOR THE APPLICATION CRYPTOLONG IN THE GPRS CASE... 3.4–81
FIGURE 3-33 TIME FOR THE APPLICATION CRYPTOEXTRALONG IN THE GPRS CASE... 3.4–82
FIGURE 3-34 THE TOTAL TIME FOR THE DIFFERENT APPLICATIONS. 1 = NOCRYPTO,
2= CRYPTO, 3=CRYPTOSHORT, 4=CRYPTOLONG... 3.4–83
FIGURE 3-35 THE TOTAL TIME FOR THE DIFFERENT APPLICATIONS. 1 = NOCRYPTO,
2= CRYPTO, 3=CRYPTOSHORT, 4=CRYPTOLONG, 5=CRYPTOEXTRALONG... 3.4–84
FIGURE 3-36 THE TIME FOR ENCRYPTION AND DECRYPTION FOR THE DIFFERENT
AMOUNT OF DATA WITH RESPECT TO THE TWO SCENARIOS SIEMENS SL45I
PHONE (GSM) AND SIEMENS M50 PHONE (GPRS). ... 3.4–84 FIGURE 3-37 THE PROCESS OF MAKING A PURCHASE. ... 3.5–90
FIGURE 3-38 DISPLAYS THE TIME OF PUSHING A WML PAGE FROM THE BANK SERVER
TO THE USER’S PHONE AS A FUNCTION OF THE BYTE CODE TO SEND. ... 3.5–93
FIGURE 3-39 DISPLAYS THE TIME OF SENDING THE RESPONSE TO THE BANK SERVER
FROM THE USER’S PHONE AS A FUNCTION OF THE BYTE CODE TO SEND. ... 3.5–95
FIGURE 3-40 DISPLAYS THE TIME AS A FUNCTION OF THE NUMBER OF BYTES TO
ENCRYPT. ... 3.5–96
FIGURE 3-41 DISPLAYS THE CONTRIBUTION FROM THE DIFFERENT PHASES TO THE
FIGURE 4-1 COMPARISON OF THE TOTAL EXECUTION TIME BETWEEN THE WIB AND
JAVA CARD CASES. ... 4.1–104
FIGURE 4-2 COMPARISON OF TIME SPENT SENDING SMS BETWEEN THE WIB AND
JAVA CARD CASE. MUCH MORE TIME IS SPENT SENDING SMS IN THE WIB CASE
SINCE MORE SMS ARE REQUIRED DUE TO THAT THE WIB IS STATELESS, WHILE
THE JAVA CARD HAS THE POSSIBILITY TO MAINTAIN A STATE... 4.1–105
FIGURE 4-3 THE TIME TO ENCRYPT A NUMBER OF DIFFERENT BYTES USING EITHER A
JAVA CARD OR WIB SIM CARD... 4.1–106
FIGURE 4-4 TOTAL EXECUTION TIME USING GSM NOTE THE HIGH STANDARD
DEVIATION. ... 4.1–107 FIGURE 4-5 TOTAL EXECUTION TIME USING GPRS. ... 4.1–108
FIGURE 4-6 COMPARISON OF THE TOTAL EXECUTION TIME BETWEEN USING SIEMENS
SL45I AND A DIALED UP GSM CONNECTION COMPARED TO A SIEMENS M50
WHICH USED GPRS FOR THE COMMUNICATION. ... 4.1–108
FIGURE 4-7 COMPARISON OF THE ENCRYPTION TYPE WHEN USING DIFFERENT
PHONES A NEWER SIMENS M50 (GPRS PHONE) AND AN OLDER SIEMENS SL45I
(GSM PHONE). ... 4.1–109
FIGURE 4-8 TRANSMISSION TIME AND HOW IT DEPENDS ON THE AMOUNT OF DATA
#
TABLE 2-1 SUPPORTED AND UNSUPPORTED JAVA FEATURES... 2.3–12 TABLE 2-2 SECURITY MECHANISMS IN OTA [G+02] ... 2.3–21
TABLE 3-1 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING
ENCRYPTED COMMUNICATION BETWEEN WIB AND WIG. ... 3.2–32
TABLE 3-2 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING PLAIN
TEXT COMMUNICATION BETWEEN WIB AND WIG. ... 3.2–32
TABLE 3-3 COMPARISON BETWEEN 3DES AND PLAIN TEXT EXECUTION TIME WHERE
3DES IS NORMALIZED TO PLAIN TEXT ALSO THE REAL DIFFERENCE IN MS IS
TAKEN BETWEEN THEM. ... 3.2–35
TABLE 3-4 MEASUREMENT OF ENCRYPTION/DECRYPTION TIME IN A SIM CARD,
THERE WERE 5 MEASUREMENTS MADE EACH SIZE. ... 3.2–38
TABLE 3-5 MEASUREMENT OF ENCRYPTION/DECRYPTION TIME AT THE SECURITY
CENTER SETUP TIME MEASURED SEPARATELY. ... 3.2–39
TABLE 3-6 TOTAL TIMES FOR PUSH COMMUNICATION I.E. THE COMMUNICATION
BETWEEN THE WIG AND EITHER OF CONTENT PROVIDER OR THE WALLET
SERVERS. NUMBER INSIDE PARENTHESIS INDICATES NUMBER OF
MEASUREMENTS... 3.2–40
TABLE 3-7 TIME TO PUSH A PAGE THE WHOLE WAY TO THE WIB PHONE. TEN
MEASUREMENTS WERE MADE FOR EACH PAGE SIZE. NUMBER OF BYTES SENT
WERE LESS THAN PAGE SIZE DUE TO TRANSFORMATION TO BYTE CODE AT THE
WIG SERVER. ... 3.2–40
TABLE 3-8 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING
ENCRYPTION BETWEEN WALLET APPLET AND THE BANK SERVER. ITALIC
VALUES ARE TAKEN FROM THE WIB CASE. ... 3.3–52
TABLE 3-9 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING PLAIN
TEXT WALLET APPLET AND THE BANK SERVER.ITALIC VALUES ARE TAKEN
FROM THE WIB CASE. ... 3.3–54
TABLE 3-10 COMPARISON BETWEEN 3DES AND PLAIN TEXT EXECUTION TIME
WHERE 100 IS THE 3DES A POSITIVE VALUE MEANS THAT THE 3DES IS
FASTER THAN THE PLAIN TEXT VERSION AND A NEGATIVE VALUE THE
OPPOSITE. ITALIC VALUES ARE USED FROM THE WIB CASE AND SINCE NO JAVA
CARD WITH A SUBSCRIPTION WAS AVAILABLE. ... 3.3–56 TABLE 3-11. ENCRYPTION TIME ON JAVA ENABLED SIM CARD... 3.3–60
TABLE 3-12 TIME TAKEN FOR ENCRYPTION/DECRYPTION ON THE SERVER SIDE I.E.
THE BANK AND CONTENTPROVIDER... 3.3–61 TABLE 3-13 DATA SENT FROM AND TO APPLICATION (IN BYTES) ... 3.4–73 TABLE 3-14 TIME FOR THE APPLICATION NOCRYPTO IN THE GSM CASE... 3.4–74 TABLE 3-15 TIME FOR THE APPLICATION NOCRYPTO IN THE GPRS CASE... 3.4–74 TABLE 3-16TIME FOR THE APPLICATION CRYPTO IN THE GSM CASE... 3.4–75 TABLE 3-17 TIME FOR THE APPLICATION CRYPTO IN THE GPRS CASE... 3.4–76 TABLE 3-18 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GSM CASE... 3.4–77 TABLE 3-19 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GPRS CASE... 3.4–78 TABLE 3-20 TIME FOR THE APPLICATION CRYPTOLONG IN THE GSM CASE... 3.4–79 TABLE 3-21 TIME FOR THE APPLICATION CRYPTOLONG IN THE GPRS CASE... 3.4–80
TABLE 3-22 TIME FOR THE APPLICATION CRYPTOEXTRALONG IN THE GPRS CASE... 3.4–81
TABLE 3-23 DISPLAYS THE TOTAL TIME IN THE GSM TEST AS AVERAGE AND
MEDIAN AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER
COMMUNICATION AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL
TIME. ... 3.4–82
TABLE 3-24 DISPLAYS THE TOTAL TIME IN THE GPRS TEST AS AVERAGE AND
MEDIAN AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER
COMMUNICATION AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL
TIME. ... 3.4–83
TABLE 3-25 DISPLAYS THE TIME FOR PHASE 1, WHICH REPRESENT CONTENT
PROVIDER COMMUNICATION WITH BANK SERVER AND BANK SERVER
EXECUTION BEFORE PUSH... 3.5–93
TABLE 3-26 DISPLAYS THE TIME TO PUSH A WML PAGE FROM THE BANK SERVER TO
THE USERS PHONE. ... 3.5–93 TABLE 3-27 USER INTERACTION (INCLUDING ENCRYPTION) ... 3.5–94 TABLE 3-28 SENDING RESPONSE TO BANK SERVER. ... 3.5–94
TABLE 3-29 NUMBER OF ITERATIONS OF ENCRYPTION DEPENDING ON THE SIZE OF
THE BYTES TO ENCRYPT. ... 3.5–95 TABLE 3-30 ENCRYPTION OF DIFFERENT SIZES. ... 3.5–95
TABLE 3-31 DISPLAYS THE TOTAL TIME OF THE APPLICATION’S EXECUTION TIME,
INCLUDING THE TIME FOR USER INTERACTION... 3.5–96
TABLE 3-32 DISPLAYS THE TOTAL TIME OF THE APPLICATION’S EXECUTION TIME,
WHEN ADDED THE TIME FOR ALL PHASES TOGETHER... 3.5–97
TABLE 3-33 SHOWS THE CONTRIBUTION PERCENTAGE OF THE DIFFERENT PHASES. ... 3.5–97
TABLE 3-34 DISPLAYS THE TOTAL TIME OF THE APPLICATION’S EXECUTION TIME,
WHEN ADDED THE TIME FOR ALL PHASES TOGETHER... 3.5–98
TABLE 4-1 COMPARISON BETWEEN WIB AND JAVA CARD EXECUTION TIME WHERE
THE WIB IS NORMALIZED TO JAVA CARD ALSO THE REAL DIFFERENCE IN MS IS
SHOWN. ... 4.1–103
TABLE 4-2 DISPLAYS THE TOTAL TIME IN THE GSM TEST AS AVERAGE AND MEDIAN
AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER COMMUNICATION
AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL TIME. ... 4.1–107
TABLE 4-3 DISPLAYS THE TOTAL TIME IN THE GPRS TEST AS AVERAGE AND
MEDIAN AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER
COMMUNICATION AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL
TIME. ... 4.1–107
TABLE 4-4 TIME TAKEN BOTH TO ENCRYPT A NUMBER OF BYTES EITHER USING A
SIMENS SL45I OR A SIMENS M50... 4.1–109 TABLE 4-5 ENCRYPTION OF DIFFERENT SIZES FOR THE WIB WITH JAVA PLUG-IN... 4.1–109
TABLE 4-6 TIME TAKEN BOTH TO SET UP A CONNECTION AND SEND THE ACTUAL
% & '$ "
9 "# 3 3" " 0 ' #" ( ( " " " " 3" "% ' " 2 " 3 "2 "%% 0 % " (" " " " " 3 " ( 3 ("" ( " " ( ( 3" 2 %" % 9 % (" " " # # 3 " 2 " " ( " " :';<
(
'
' 3" 2 " 0" 0 ' ( " 3 " ( %" 2" " 2 " ! "# $ % " % " % & #" " ' % " "( ." & "# ' % " "( 10"% " 103 0 ' 3 " "3 2 "# 9 "2 " " 0" ! ( 0 ' %6 2" -% " 3 &! 13 % 3 # " %" ( %" -= 0 0 ' "# 3 " 4 " 3 &! -% " 3 " ' 2 "# " " " 0 ' " ( " "# # % "# 3 1 2 ( % % " 3 & " " " ( ! #" " % % 0$0 % " ( "2 % " '" 2 2 " ( % " " 2 2 " "2 % 0 ' " 5 & >5 & "3 ?1 3 % % # % " 2 % " 0&$ % # % % %" " 5 & " " % ' 5 & 3 % "3 2 ( " " " 0&$ % & 2 %" "" #" " " "" ( " 2 " "2 % % 2 9" " " " 2 2 " % " 3 5 & " 6 % " 2 " 0&$ "" 13 % " " " % 3" # ' " " % % 4" "# 2 % 2 " 4 % ( "# " 3 5 -2 " 3 @ .0 @ " %" " 6 " 0 ' " "3 % "2 % " 3 2 " # ) " (" 0&$ % 2 3 5 & # # " 4" "# 0&$ %
" ' 6 " 3 " #"% " 5 & A5 &@ " " # " " ( " " " #" / 2 " &# % ( "# #" 3 " 2 " 6 " 3 2 # A 32 % % %" "# " ( " % #" 0 ' " % #"% " 0&$ ( % " ( 0&$ % 5 & ' # "# " 1%" % 2 1 #"% ( " " "# 5 & %" " / 2 0&$ % ' % ( #" 0 ' % / 8 %" ( " " "3 ( % ( " " 5 & " " ' "24% " %" ## % ( ( #" % 1 " " " ( % % ( " & %" "# " 1%" % 2 15 & 3 / ( 2 %" 3 "# / " % " ' " " " % / "4% " 5 - / " %
< " 2 % " " " 0&$ % " " " " " 5 - " %" " / " " " % " " 0 ' 2 13 % %" % 0&$ ( "" " % (
()(
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
'
5 " ( # " 0$ " 2 0&$ '"" ( % 0 " $ (< ' " "# ## @0$ ( @0$ 13 % % # 0&$ % @0$ D % # 0&$ '"" %" ' " @0$ @0$ D 13 % % # 7 ' - # % " 4 2 # " @0$ ' " " @ .03 % % % @0$ 3" 4 # " @ .03 B" C %" % " # " @0$ *
<D
* + %$
'
*)(
&
,
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
* -
".
'
/,*
0
' / #" 1%" ( "# / ( ( 1/ $ % >/ $? / - &1 " 3 ( "# %" 3 1 ( # " % " 0 % ( " 3 / %" " 1 9( / #" E/- G, • / 10 ) " >/0)? ( #" " %" • / 1) ) " >/))? %" #" #" 1 3 % " • / 1$ % " ) " >/$)? "# % " "( % # % " " #" % % "2 " /$) 2 "# /0) %" " 1 % % - &< $ *1() , * - "
*)*)(
&
,*
/$) " ( "# % 3 % ## " # " % " ' #" 3" " 2 ## % " "# 3 " % /$) " 2 # * 2 " %" 3 "2 "# ## % 3 %" # ( " 1 " "# % " "( #" % ( "# ## % " ' " /$) 3 % %" % " "# % " "( % # % " ( #" ## "# % & ( " 2 " % 2 #" " % ' "%' " ( %" ( "# / $ % >/ $?E/- GE8$! G ' / $ % " % /$) %" # ( " % " I " # % % E8$! G - %" # ( " % # % " # / 2 / $ # " % * % " # " "2 % ( % %" # ( " - %" # ( " 1#" * 1 ( 2 ( #" % : "# " 3" %" % " ' "# - & % " 2 "# /0) - & '" " 2 % " % ( 1%" # ( " % " %" " " # - "# 2 " %" # ( " 2 " % # % - & " %" " #" 2 ( % " #" % # % % 5 %" # ( " % 2 / $ 2 % "# - &1 " " 2 # % # " ( " 2 " " 2 %" % " "# % - & #" % " # % % 1 # % 1 " ( - % " 3 #" % # % "# % 2 " " % " "# E/- G ' ## %" # ( " "# " % 2 / 8"<J >/0. ?' /0. 1 " ( " ( 1 3 # " %" # ( " "# ' ## %" # ( " "# "3 9( /$) & ( 1 # % # % " "3 3 " 2 % ( " 1 3 % # % " " "3 3 2 % ( " ' %" " ( /0. 2 " "3 $ *1*) ,* ' /$) 3" 2 % 8" % 1 ! % 8" # ( " 8" % ! % 8" # ( " "3 9( , '. " ' ! $ / ! 0 ' %" # ( " #" 3 % 3 3" %" % " 1 ( 1 "2 " 1 " ! ( - > !- ? ' % " 2 ( ( "# J "2 >: ? " : 0 % %" # ( " " 3 0 ' 1 #"% 3 2 " " ' 8 !8 % % # % " #" / $ 2 2 : $ % >: $?1 " 2 0=F ' 6 #" 8 !8 3 " # "3 %" " " " "# / % " "( " %" 2 % 2 " ## "2 % 1 " ( " 2 "# % " %" 2 3 ## "2 % ' I "# %" " "# 8 !8 >/ 2 % ? " 2 : ' 8 !8 " % # % " " 2 2 " : "# / % ' 8 !8 #"% " % 3 , "3 % % % 2 6 ( "3 " / % " % # # % " 1 % " " % # " % " 2 2 ( % " B 2"*C " % " % % ( % " 2 " 2 % " E8$! G
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
*)*)*
'
$
2
,
' " 3 / #" 3" 3 3 3 " ; 6 E/- G • ' / #" # 0 % / 2 * % / $1 % 2 %" " " " " " " I % " • ' / ( ( %" ( "2 "( (M "% " "# " 3 % % " • ' / %" ( " 2 - ( * % 2 2 % " % - $&! > $&! % " ?% " % $&! % # % " - " ( "# " 2 "# "3 " ( % " " %*)*)3
' $ ,
#
'
'" 2 2 " "3 " / % " " "2 " 1 " " / % " ( >/-$? % " " " ' $&! "# "" % # ( "3 " " 3 %" % " 1 "3 3 " " %" "3 " 1 6 - % " "# "3 " # " 5 2 ( >" 5 - ( ?"# % " #" "3 (, ' % % " # " 5 2 ( - % " # 13 #" " 2" % " 1 " ' % " ( > " ?% % # " ( % # " " " "# % " " " &# % % " % " ( "3 " % " " " & " 2< $ *13) ! & ' ' ,
*)3
'
*)3)( +
#
' "
'
$
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
< $ *19 8 " " '5, 6*7) ' 3 ( # " 70"# % ( 4 "## ( " # * " 2 ( "# %" @0$ " '" 2 2 " # 2 " " % % 5 "3 " # " % % # " " 2 " % % # % E/-8 G ' "# # % # 2" "# # 3 % %% %" " " 6 "# # 6 " ' # " &F %" " # %% " % # ! ( " " ( ## "# %% %" " % 2 $" # ( " " * 2 2 % , • & 8 # % 3 2 %% • ' ' ( >8; ?1 %% " # 8; • ' ' * >8; ?1 %% " # 8; • '" # %" " 2 " 3 " " " % • 1 %% " # #" 2 ' &F %" " # # " 3 3 " ( &F %" " % 3 2 2 "% % " 2 2 "% 3 % 2 "% %" &# 3 " ( 2 "% %" " 3 " % 3 2 2 "% 0 " " %" # 3 "( %" % " " % 1 % " % " 3 % 1 "% % E/-8 G
< @0$ ## % % 2 3 " @0$ ## % " " % " # ( ( "# % 3 ' ## " ( " "## % 3 (" "## % @0$ " % 2 %" " 3 2" E=0' G" %" 2 " 3 " " " #" " % % &0- 2 #" % " % ' " "# ## % 2 3 ( " % % $" "# 3 " 2 %" % " 3 ( * " % " 2 " " ( 1 % 2 "3 " ( " #" % "( % ( " E/-8 G
*)3)* ,
# ' "
'
7 "# ( 2 # 3 / 2 8 77 ( /8 $ " 2 % % 3 3 % 3 "( 8 " 2 % 3 % 3 "( 8 " - 2 % %" " 3 " 3 " % " " %%" 13 / 8 % % " " " " %% % / 8 % " % " # 3 % " * % 3 " ( " %" " E/80 G / 2 % " /$) >/ $ % " ) " ? 0 % % % "# % % "# 3" " % " " 2 "# # & ' 2 " ## % " "( % % % % 2 "3 " # % % 3 " " 3 2 3 #" * 2 /$) " " # "# % " ( "# "( E8;) G< # *1( ' ' ', 0 " / # = " / # • 0 , 2"" 12 1 " • 7 " • / % ( 1% 1 # % *% " • / "24% " # , % 1 " 1 " " ( % "24% % " 1 %% %" 2 ( • ' 3" 2 ( " " " • ( , " (1 " 2 1# " • 8 % ( • $ " • ! % % " ( • 0 % ( • @ 2 ( %" % " # I " • ' • 724% I " • 724% % " ( ' B" C/ $ /8 $ >/ 8 $ % ?2 " 3" " "## % " " % ' " 6 " * % 3 2 3" " 2 #" " "# % E8;) G ( " " 1 " " ( " 6 " ( * % " 7## % %" " 13 % " "% % % # / % ( " 8-8" - 9 ' 8- # " " " % * % 2 " % ;"3 8- # 2" 9( J #" "3 ( ( $ *1:. & , ; 1 ' 1 ' 5 667) ' / 8 . ) " >/8.)?%" "# # 3" % >- &?1 * " ( 6 #" # % " 1 " 8- # " % > # % % ?1 % " 2 #" " % ( 1 3" %" % " %1" 2" "
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
< D • - ' #= ' # "24% % " 2 2 3 " 9" % " "24% % 2 % .-$ " "24% " 2 ( " 2 3 " E8;) G • " ' /8 $ 3 " " #" " % ( 3 " " ' - & " " #" % " 3 ( 3 " " "# • & ' $ " " ' # 3 " " % ( % 0 % ( ( % * % * % " " " ## % " " 5 " #" " " /8.) " % /8 $ % # % " " ( % ( % % " &''" - " /01" #" " #" " ' / - & " % " 2 ( % 12 (" " % % * " ( - &#" &71%" % " @=&2 " E/-8 G' * " , • = ') " & %1 %" % ( 3 % # % % - 1 &F1- !=10 = # 2 ( 2 "% 3 " ( % • = '>) " & %1 % ( " "24% " ( #" &07 K J D %" 2 # & " # >)9?1 % # >!9? # " - != % # &07K J1 " % " 2" % % #" " #" " • = '>) 8 ' = '>) 81 " % "( 6 % 12 " # - & # % " % " & " " "# /8.) " 2% " 2 " 1 " =0 * " ( " ( ( % "( E8;) G & ( / "( % ( "( 6 # ( ( ( % " " & 13 " % # ( % " # >-&!?%" ( "# 3" , " % &!
.&! " # * " &P ' .&! 3 % 2" #"
% ( - " 2 2 ( &P % I # " " 2 12 " 3" -&! % 2 % " 6 # " % E8;) G ' " ## % 2 3 % 2 "3 " " % 2 " .7$ ( # % 1 % .7$ "3 " # A% " 3 " .7$ " "3 F " " %" " 2 /8 $ %" 2 % I ' " " ( % % "3 " " )) .7$ 2 #" % %
< 3 .7$ - "3 " 2 % " " "3 " % " % /8 $ % O%" " %" E8;) G '" " # % % 6 % "# - != >- % " " "%" ! = ?%" " % 1 %" 3 " % 2 "## % # " 8- # - 3 " % % - != %" 3 %" 8- # " )) .7$ % 8- # 3 % " % # % &# % ( 6 "% -% "# % 2 % " install " ,
public static void install(byte[] bArray, short offset, byte length) ' " " " 3 " " / "( " %" % " " 2 % " " " #" % 2 " "# "( 3 8- # & " 2 % " " # % % ( % % % # % " " 2 ( # % ( - # % % ( % ( 2 # " "3 " # % % ( --# 2 2" ( "( 3 -&! /8.) >/ 8 . ) " ? " 2 " % &# " # " " " ( " "# " 1% " # " % % " 2" #" % 2 % ( " 1 " % % ( 2 % " %" 2 #" " E8;) G & ' #= $ % %" " 3 #" " " % % % " % " 1 % "( % % " " 3 % " % " " " '" %%" 3 " "# " ( % - 9 3 % ( ( % % " " ( " % # " " " " ( ( " 2"" % 2 " " ( % # % ' # 3 " % ( " %" " % I % % ( "( ( 3 % (1 % # " ( # % " "3 2 " % ( % " " % ( * % ( %% " E8;) G '" % 2" % # 3 % " ## %" * -%% " "3 3 %" * " 2 3 %" * 5 2 %" 2 "# %" * 1 9( #" * "# " " %" * - % 3 % ( %" * % % " O % % 3 % " 12
< J " 3 " " %" * > % ( ?' /8.) " ( %" * # " /8.) %" * " %" * % 2 % 2 %" " " % " %% /8.) %" * $ *1?. & ' ' ' > 5 667) - " " % %" * " * % ( /8.) " %" * "# 5 3 "24% % ( "3 ( %" * 3 % % % %" * % % 2 %" 2 #" "3 " " % % %% 2 2 " % ( "3 ( %" * % ( 5 "24% %% %% %" " #" " ( " " % # " 2 % %" * " %" " %% ( "24% "3 " %% "24% # " %" * * % ( 1" 3 SecurityException "3 E8;) G 0 % " % "3 2 %" * " % 1 % # %% 2 2 " 12 "24% > % ( ? # % 2 " ( " %" * " " " % # # " % "# % %% # 5 % " % * % ( % O %" * "24% % 2 %" 2 "# %" * %% %" " 3 % " % %" * '" 2 2 " 2 3 %" * % 2 % " %" * 3 % % /8.) %" * 3 % " /8.)1 % /8.) % ( " 2 " %% - %" "# ## " " % %" * 3 % , /8.) ( 1/8.) " "24% 1( "2 2 # % % 2 " #" "3 ( ( , $ 1 ( 3 /8.) % - != %" % %
% Oselect1deselct " process " %" * % ( "
< K ' # " " %" * 3 % 2 % " /8.)1 " %" * 3 % % % 2 , 8 #= 1" 2 " "## % %% 2 #" " /8.) " 1 "24% 3 2 % " 2 " ( ( " /8.) %" * " 2 " % # " " %" * 2 /8.) %" * 5 " " % %" * % ( " /8.) %" * 13 % #" % 2 #" 3 % ( 2 % " % %" * 9 "# "24% " % 2 # 3 " 2 % " %% 2 " /8.) %" * " ' 3" "# /8.) " "24% " "24% ' " "24% " " 2 " " # % " % % " % " " " I ' % "24% - != /8.) "3 *% " "24% 7 " "24% " 2 " " ( -&! % % # 8 2 "# % 2 3 " ( "2 " 2 ## " 2 " /8.) " "24% # % % " 2 ' %" "# ( "2 * ( - != 2 ## 13 % % 2 #" 3 - != %" % " 3 % " " ( "# #" " E8;) G0 % " " %" " " % " I " " %% "# 2 ## # # % " 3 " .$&>. " $ " & "% " ? % 2" " " 2 * ' 2 # % # %" "# " %% 2 # " ## %" * - % 2% "# 2 # % % 0&7 >0 2 & # % 724% ? 5 * % ( %" * "# 0&7 2 " "24% 12 3 * % ( " %" * 0&7O " % 2 # % %% 2 2 " " # ' 2 # % % 3 " ( %% " " 2 % " # 2 # % ( " % 2 # 3 - % 2 % 2 "3, # % 6 0&7 # " /8.) 2 " ( -&! > 6 # ? 2 1 /8.) " " " 0&7 2 5 get " % ( % O -&! % 2 " % 3 " ( % " " -# /8.) % 0&7 # " 2 1 /8.) 0&7 " % ( % 2 D &# " " ( 0&7 " # /8.) % " # -&! " % ( 0 % % %" ( 0&7 3 " " 1 % ( 2 % 2 % " " # O " % "3 - % ( %" 2 " % " % % % 3 % %" %
< $ *1@. 5 667) & /8.) % " 2 " /.) 1 % # 3 "3 SecurityException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
<
'-. >' ( - % " ? % " 3 % % "
" " & 3"
*)3)3 2
+ &
2 +
'
' 5 & >5 & "3 ?1 " "% " O0&$ % 1 "3
" ( % % 3 "2 % 2 "2 " " ! #" ( 0$0 %" % " % ' 5 & " % # % " " 2 0 ' 7 ## 0&$ % # % 5 & " " 0&$ % E0'5 G'" 5 & " #" 5 &@ "" 9( 1 2 3 " 5 &@ >5 & @ 3 ?" * 2 % %" 2 "## ( 2 % " % ' 4"2 "# 5 &@ " " 6 #" " " " $ *1(6. # & 2 + ' 2 ) '" " % 1 2 "# 5 $ 13 5 $ ( 5 &@ %" " %" 2 %" "" 2 5 & " 5 & " ( 0$0% - 2 %" 5 & #" " 0&$ "" %" " "2 " % > ? 0&$ "" )'0&A0$@) #" @0$ " 2 0&$ % " ( 2 % " 3 "## 2 ' " ( " 03 E8) G, - &F %" " % "
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
*)3)4
2 + &
,
- $1
5 & 3 / ( %" 2 " "# 3" % 6 / 8 " 5 & 1 % " 5 & ( " / 2 0&$ % - " / 8 % %% # % " # " % " " ( % " 0" % 13 % "3 %% " ( # 3 " * 2 3 % 9( "3 * "# " "# 0 2 # % 13 5 & ( & # % # % * ( 0 2 # %5 & ( & # % %" " & %% 2 2 "
' % 5 5 * / 8 -# % 5 & ( & # % " ( 2 %" % 2 %% 2 " & &# " 3 " %% 5 5 % % " " &''" 0" " " & ) 02" 3 -&! %" " ( " 5 5 1 " 4 % # 3" /80 ' " "24% # 2 0 2 # % 0 % "3 3 # % " * % 4 " % "
< $ *1(() " " #
*)3)9
/
0
&
7'- "% " " " ( " 0&$ % 2 " ( " # % " " ( "3 " "# % " " 0&$ % " 2 " % " ( " 0&$ % 7'-( # " 3" " "2 % " %% " % " " 0&$ % #" B" C )0$0 >) % 0 " $ ( 0 % ? % 2 #" @0$ # " %" 1 % " ( 1 % " (( ( E@H G 0 % ( " % " 3 7'- )0$0 6 " #" "# % 6 " 2 # # %" 2 I ' 2 # *1* 8" " 5 A6*7 B " 63)4? " - % " 8 "( % % % $ ( ( . % % % . % " 6 % ( 8" ""# "# % * % " -% "3 ( $ ( %" # ) % " 8 % " %" 2 "# 2 " " % % %" % 2 "# 2 2 % % - B# C " % " 2< "# % % % P7.13 % " % % !)0 !)02 ( ( " 5 )0$0 " 0&$ '-. >' ( - % " ? % " 3 % % " #" " " & 3" ' "% "# ( " " * ( " 0&$ % %" " 2 "2 " " "3 ( 0&$
<
3 !
"
'
' 3 " 3 " % % " " " * % " "# ## % " "( " B# 3" C#" " 2 % ( ' * % " % 2 % " $&'' " # % " " * " " " # ! "3)(
' " ( " " "# ## % % " " "# % " 7 2 % " #" % " 6 " % 2 "# "% ( " 2 2 " "3 % % %" " % " ' % " % " % >3 3 ?#" % " > " % " ?1 % %" % ( % " ( % 3 &0- % %" " 2 " # % %" "" % #" % % " & % " % % 3 % " 2 5 % % % "3 %" #" % " 2 " #"3)()( +
B
"
' # % " # " % " " 2 "# 3 3 ' # % " % , • 7 " 2 2 " 3 3 " # " %%" %" % " % " • ' " 2 # % " "# " " 3 3 # " %" % 3 • ' 3 " #" 6 ( " "3 " 2 3 3 • ' #" " 2 % " 2 % " " 3 %3)()*
> "
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
<
3)()3
"
'" " "2 " "# % " 2 %" "" ( 1 # " " % 1 #"% 3 2 " "2 % %" % " 2 3 7 B2 % 2"*C % 6 3 2 " % 1 % " " " 2 # 1 ( " % " 2 3 3 6 ( 3 " % & " "# " # % " 3 2 " 6 ( " # " 2 3 33)()4
8
'" " % 2 3 % " "# % " "# " 2 7 "# " %" " (" !)0 > % " ? % % " (" % 2" " % % !)0 " 2 "% % (" " I - " "# ( !)0 !)0 '" % ( 3 !)0 #" "3 ( #" *3 (4)(4($4555 3 ( #" % " )( % " % 2 ( * ' 2 ( % " % "3 " % 3 % 3 ( !)0 ' " 3 ( " 2 % " (" 2 #" % % !)0% % 3 "3 13 % %" % % ( !)0 '" 3" "2 2 2 # % E0'- GE0'- G " ("" ( " #" " % " " ( % " 1 ( ( % " 5 %" " % @0$ 3" 3 2 % % % D 1 @0$ 1 % ## % & " % # 2 " " " %" % 12 3" 2 " 2 # " " " ( % 3 " 9" # ( ( % # " @0$ # / " 6 " & /6& " " " "" " % # % " 2 # " )'0&>) " ' %" % " 0 & ?3)()9
B
' " 3 3 # 3" #" " 1 % " "( 3 2 3 %" " " " ( ## % %" % " 1 % # 1 #" % 1 " " ( " "" ; #" "3 ( % 3 2 %" , % % O #" %" % " 1 #" %" % " % "3 %" % " " " ## " "# 8 0" "# % % " % " 1 ( ( ( % " % B C % % 13 3 " " 2 #1 # % " 3 2 %"< J - " 0 % 2 ( ## % 2 3 ## % % #" % ( ( % " 3 %" % " 3 2 "" " ! " " ' 3 "2 2 2 ( # % ## % 2 3 % % 1 % " "## % " % " " 3 " "## " "# ## "" ' " " "# " " # % " 1 3 " 3 * % $ ' " " % 1 % ( ( %" " " " %
3)* 2 +
3)*)(
'
$
' 3 ( " " #" "# % >3 3 ? 2 # " % " ' % %%" 3 2 # %" " % 3 13 " 2 . " 2 "# 2 " # %% %" ( 2 # " ## " % ( %" " " & 0 %" " % 2 # " > ( %" " ? " 6 " " " %%" ( " 9 " % 2 %" 2 % " 2 # " " " ' 2 # "# 2 #" " A % " % " ' "% % 2 9( 3 6 " % #" " " #" # " %" " " #" 3 " % " &# % "" " " #" 2 6 " A " % 6 "% ( " 2 9( " ( 2 % " 3 ) " #" "# % " 2 " # 2 2 ( "" " ( " " % "" " ( 2 "< K
Content Provider Server
WIB Phone
3. Once bill arrives it 's pushed to the user to be signed.
Wallet Server
2. Content provider sends a bill to the "bank".
4. Signed bill sent back 5. When the bill has been signed
the issuer is notified.
6. Requested information is pushed as a WML page once the content provider is
notified of payment.
1. User requests some information needed to pay for.
$ 31( & ' $ B ' ' ' ) ' " " % " " 4 #" " 2 " " %" "# " % " 3 " " " ( " " ( 2 "3 " " %" " % % 3 %" % " 3 " & ' 3 2 6 " " 7 % 2 2 ( % % #" "# % - 2 # " ( 6 # % 2 %" " %%" ( " % %" " # " ( " # "# 2 ) % %%" 3
# " ( O $0&0!F >$"2 0 2 % 2 & " &0!F
2 1 " 2 ? " " %%" 2 >$0&0!F? 2 % &F %" 13 % 2 ( 2 3 A 3 " 2 ;"3 " %" " "3 3 % 2 " 2 "Q; %" "# ## % " 2 ) " " #" %" " A ( #" % 3 % 2 " " 4 2 " " %" " # 9( - 2 " 3 "( 3 $0&0!F "# " " 2 6 # #" 2 - 3 % 1 " # %" " 2" 3 % 6 2 2 " %" " % " % " 0" #" " " 2 " 6 # "# 2 " ( 3 % " " A "3 3 " #" ' # % "" " 2 A &F 2 % " 3 "( 3
< 6 # "# 2 - ( %" "# ## 2 " 6 # " "3 3 % 2 " 2 19( 9" % % " 2 % 3" % % 2 #" " 3 3 #" " 2" 2 " "# 2
3)*)*
8'
$
' 2" * " "# "% % " " " 1 3 % % " #" 1 3" 6 # "# 2 13 %" % " 2 3 " 3 ) % " 2 3 5 & 5 !)0 $ " 2" E0'- G#" # 5 2 5 & " O 3" % " 13 % % % % 3 3" &! % &# 3" &! 3 % " 3 3 "# 2 #" "# ' % " % " " " 2 ( 0 ' " % "3 % % '" % " % " ( '8 %" % " " % % "# 6 > % A % ?1 $0&0!F " 2 % A % " %" % " " % 6 2 #" 2 % 0 % % " A % " " 2" "# %" % " " 2 " % " %" % " 3 " * %& " " % "## 2 @0$ # / " 6 " & /6&
" " 1 5 & "## * % 2 ( ( " 2 " ( " % #" " ( K1 !)01 %1 " ( ("" % " ( ( "# " % 7 %" " " " # % # % 0&$ % # % % % 3 # % ( 2 % "# 0&$ % 9" % 2 % % # % % 2 # " $0&0!F ( " # % # % #" 0&$ % (" $0&0!F " % % 0&$ % O
3)*)3
"
"
' "
& 3" " 1 " " # "3 " %" " ( 3 %" # " #" % % " " %" " O %%" " " % 3 2 (( " ' " 2 3 2 2 " 2 " %" 2 " 2 " " * " % # " 2 3 ## %%" ' " 2 " 3 " 2" %" " 3 " 3 2 %" % " 2 3 " " ( % # % 12 3" 2 "< " #" "# & "% 8" % " 2 3 ' %" % " 2 3 %" " O 3 2 " 3 " #" "# % " 1 % #"% "# " %" % " # " " " 2 8" % " 2 3 3 %" " %" 2 " 2 "# " " % 3 ( 00 1& 0 % " %" " #" % %" % " " & ; %" " 2 " "# 3 "# % " ( " "# 2 % 6 % "" 2 "
3)*)4
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ontent Provider (Web server) Content provider Wallet (Web server) WIG server Communication between servers are done through a direct reference since they reside on the same web server.
Comunication over TCP between the Wallet and the WIG consists of bills that are pushed to the WIB phone and replies to those bills i.e. those bills that have been paid.
Security center used by wallet/ bank for encruption/decryption. Communication done over TCP.
WIB Phone
SM communication over GSM bill, password, analysis etc Communication over TCP between
the Content provider and the WIG server consists of stock analysis requests sent by the WIB phone and the analysis that are pushed back to the WIB phone once the issued bill has been paid.
$ 31* # ' ')
' " 3 " ## 9( "3
3
User interaction start application
SM from WIB to WEB server (Conent Provider)
Execution at Wallet and Content server
SM from WIG server to WIB phone
User interaction type password
SM from WIB to WEB server (Wallet)
Push bill to WIG server
Execution at Wallet and Content server
Push content to WIG server
SM from WIG server to WIB phone Transaction finished content at user Decryption of SM $ 313 > " % 8 ' ' ' C ' ) 9 " 3 " ## ( 2" !)0 * #" %" % " 2 3 5 &@ 5 & ' "# ## 3 " "3 I 3" ## % % " A % " 2" 0&$ % 1 " " ## I "# 5 $ ( " 5 & 3 (
< & #" "3 ( ( " 2 % " % 2 " " ' # & & '8 #" " 3 " " "# ## ( * % " "# "% "( 3 " "3 9( D ! " 2 % % % 2 " " 2 2 ( 0$ ( ( ( % " "( 3 % " A % " "# 0 % " ( % " A % " " " " 2 % ( ## % 2 3 ( * !)0 %" % " 2 3 3 5 & " User interaction start application
SM from WIB to WEB server (Conent Provider)
Execution at Wallet and Content server
SM from WIG server to WIB phone
User interaction type password
SM from WIB to WEB server (Wallet) Push bill to
WIG server
Execution at Wallet and Content server
Push content to WIG server
SM from WIG server to WIB phone Transaction finished content at user Decryption of SM $ 314 " & " ' $ .' ' DE " 'F ) ) 8 '# " " " ' ) 3! G- > > " $ 2" #" !)0 * % 3 " ( 2" "(( ( "# 3 "# # " %" ( " 2 % " 3 " * % " " " '" " 3 0$ 3 3 # 2 " % " 3 " 6 3 2 & 3 # " 3 2 " " 3 ( 3 3 2 ( " 5 &@ ( 3 " 3 ( 3 " " 9" 2" !)0 * % 3 " " $" %" 2 " # " 2 12 " " ( % " 3 " " "# " 0$ & 2 % 0$
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
<
Time Distribution Plain Text (Avg.)
User interaction start app.
WIB send SM to Content provider Whole processing (Content & Bank) Push Bill (Wallet server) SM from Wallet to WIB User interaction type in password
WIB send SM to Wallet server
Whole processing (Bank & Content)
Push Content (Content server) SM from Content provider to WIB $ 319 " ! # ' $ $ > "" ) 9 " 2" 9( 9( J % 2 ( %" 2 " " " * % " %" % " ( "# 0$ ' % " " %" 2 # % " " 12 " * % % 3 ( % " ( " (
< D
Time Distribution 3DES (Avg.)
User interaction start app.
WIB send SM to Content provider Whole processing (Content & Bank) Push Bill (Wallet server) SM from Wallet to WIB User interaction type in password
WIB send SM to Wallet server
Whole processing (Bank & Content)
Decrypt SM from User Push Content (Content server) SM from Content provider to WIB $ 31: " ! # ' $ $3! " " ) & ' 2 %" " 2 3 * !)0 % 1 3 #" 2 " I ( !)0 " * ( 6 " !)0A> * ?#" ( & " I % * # # 2" " 3 ( 2 "3 % " 4 ## % 2 3 " ( 3 " 2 ( #" "3 ( 2 % " !)0> * ?#" ( 1 " !)0% % " ( " " !)0% #
< # 313 " # & 3! ' > > " & 3! " E ' > ' " % # & ") " " 3! I- H F" !)0A * . ## % > ? -% " - ( $ - ( $ = % " 104 92 346 -611 5 & 0$ " 8" " 118 113 1227 872 5 " "% ( >8" + ? 115 100 5 0 D >5 ? 103 100 1 0 0$ # " 5 " 5 & 91 98 -1437 -381 J = % " 3" 101 90 57 -481 K 5 & 0$ " 5 194 193 6196 5889 5 " "% ( > + 8" ? 906 1028 361 371 8" >8" ? 68 65 -11 -11 0$ # " 8" " " 5 & 102 111 176 881 '" #" % " 113 109 6623 4367 '" #" % " % " 116 116 6220 6147
Total time without user interaction
0 10000 20000 30000 40000 50000 60000 0 2 4 6 8 10 12 Measurement number x T im e ( m s ) 3DES Plain Text $ 31< > " % 8 > " & " " ' 9 " 9( K % 2 !)0 " ( 2 "% % &# 4 "" ( " " " 9( # "" 2 (( %" 2 " !)0% % " "# % ( # " 5 & 1 % * % " 2 %" " " " ( * % "" ( %" 2 " 9( "" 2 (( %" 2 " ( "# # 0$ # " 5 & > " "# % " ?1 0$ " 5 & > ( "# %" " 5 & ? ( "# % 0$ # " 5 & " 3 ' " ## % 2 3 0$ 3" % 3 %"
< J " " 0$ " ## % " 0$ ## =. 1 3 % D 2 " ( - # 2 ( " ## % 12 * " %" "# * # % ## % #" 2" % ## % "# ( "# % 0$ # " 5 & " 3 2 %" " 2 * 3 % ( 3 " J %" " ( " % " & % 2 % "# 0$ 1 " ( #" 2 !)0 (
Increase in execution time with 3DES (Avg.)
User interaction start app.
WIB send SM to Content provider Whole processing (Content & Bank) Push Bill (Wallet server) SM from Wallet to WIB User interaction type in password
WIB send SM to Wallet server
Whole processing (Bank & Content)
Push Content (Content server)
SM from Content provider to WIB
$ 31?) > " & 3! ) ) & $
< K
Real time difference between 3DES and Plain Text
-2000 -1000 0 1000 2000 3000 4000 5000 6000 7000 8000 1 3 5 7 9 11 Measurement T im e ( m s ) Average Median $ 31@) ' > " # & 3! ' > ) # 313 & " " ' "# ' ) " 3! % " 8" " ' $ ) - * % 3 " ( ## % 2 3 * !)0 % 3 "" ( #" " * % " 3 % " " 1 % "" " JR " ( " % " " "* J %" " ( ' " 2 #" " 3 2 (( %" 2 " !)0% 3 (" ( " 2 %" % " 3 % % 3 %" % 3 ( %" 2 " 12 3 % " ( %" 2 " ( "# % ( # " 5 & ( ' 8 G' 8 " ' # #" 3 " " # " % " 3 " ( % " " 0&$ % & 3 " 2 # % ( " ( % %" 2 " % & 3 %" % " A % " 3 # " " 2 2 " %" % % " 3 " " % " 3 2 " % % #" ( % " % "# % % " 3" 0$ %" 2 # " 5 & % % %" " 2 ' 3 " % " # " " 2 " " 2 1 " " "# % 2 " % " A % " #" ( ( I # & 3 " 2 " ( " "# # " " " %" % % " 0" % " 3 " 4 #" % " " 2 % 3 (" ( " 2 " " % %
< # 314 " 8 G' 8 " '. & 9 " " " ' E ) ' 8 / " " 0 - " " % - ( $ * $ $ 0 ! " 2 K JD 2 JD K J 2 K D
SIM Card Encryption
0 50 100 150 200 250 0 50 100 150 200 Bytes to encrypt T im e ( m s ) Average Max Min $ 31(6 " 8 ' ' "# #8 ) 5 "" ( #" % " " 0&$ % "" % % " 3 " ## % # * % " % ( "# I " % - % 2 2" 9( ' 2 D " % 3 " " % 12 % " 3 2 %" " 3 %" % " ! " " "3 % 0&$ % 2 " % 3 2 " ( " ( % 2 8 G' 8 " ) % " A % " " 3 " ( 0 ' " % % 0 % 8 13 % %" % 3 3 " '8 %" % " ' %" % " 3 3 "" #" ( "# % " A % " 6 3 2 % ' 3 % 3 " "# 2 ' 3 " ( J 2 3 " " ( J 2 2 " 5 & %" " 3 " "%% " " %" " E5 -@ G#" # ( ( "
< # 319 " 8 G' 8 " 8 " " ' 8) 8 / " " 0 -% " - ( $ * $ $ 0 ! " % " 2 % " 2 K J K KJ J % " 2 JDK K K JK % " 2 J JJ J J % " JD 2 K K % " JD 2 K J KD KJ % " 2 D D % " 2 % " J 2 K K JD % " J 2 J K 0 %" % " D
Encryption Security Center
0 200 400 600 800 1000 1200 1400 0 50 100 150 200 250 300 Bytes to encrypt T im e ( m s ) Average Max Min $ 31(( " 8 ' & 8 "# #8 ) - % 2 # " ' 2 K % " A % " "# " > % ( %" % " ?%" 2 * % ( "# " "# " % % 9 " 9( % 2 % " %" 3 " "# " % 3 %" % " "# 0&$ % 2 " 5 " " ( " " % 3 ( " "# " % A % & ' 2 % 2 %" % " %" 2 " " #" % " A % " 3 " " 0" "" " ## % " ( % " A % " " " % * % " 3 2 " " %" ( "# I " % 1 % ## % 2 3 % (A % ( 2 %" " J ( % 2
<D - " " '" ( ## % " I "# ( " 2" 5 &@ 3 " 3 " 5 & " %" "# 3 " #" ( I J 2 3 1 % " 5 & 0&$ % 2 " 2 0$ % % ( " 2 ! " E5 -@ G ' ( ( "% 5 $ ( "# D 2 2 3 % ( #" " " 2 %" 3 % " " 2 # 31: " "" ) ) "" # & 2 ' ' & ) "# ' ' "# " " ) " "" & 2 ' $ / " " 0 - ( $ * $ $ 0 ! " 2 , >? D 2 # , >? D 2 , >? 2 # , >? D J J 2 , >? J J 2 # , >? J K ' " "# 2 " ' 2 J I "# 5 $ ( 1 % ( #" " 2 %" 5 &@ % 2 "#
2 " 5 & % " 5 &@ 5 & 3
## "%% " #" ## % 2 "# ! ( 3 %" 0&$ % %" " 2 "# " 0$ 1" # 3 3 " 2 " " % * " % 1 % ( " %" "# " 2 $ "# " 5 $ ( 3 " 3 " 5 & " 2 ( 2 ( ( "# " 5 &@ 3 ( 3 "
# 31< " $ & & 8 2 + ) " " &
" ' $ E ) "# #8 & $ E ' " #8 ' 2 ) " 2 $ & & 8 / " " 0 5 $ IA2 - ( $ * $ $ 0 ! " J A 2 K J K KK J A 2 K JK D A 2 D KK J K K D K D
<D
Time to push a WML page to the WIB phone
0 5000 10000 15000 20000 25000 30000 0 100 200 300 400
WML page size (bytes)
T im e ( m s ) Average Max Min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
3)*)9
"" 8
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