• No results found

Peter Lindström

N/A
N/A
Protected

Academic year: 2021

Share "Peter Lindström"

Copied!
132
0
0

Loading.... (view fulltext now)

Full text

(1)

!

"

#

! "# $ % " % " % & #" " ' % " "( )* + " , - "% "# " " ! "# $ % " % " % & #" " ' % " "( ." & "# ' % " "( & " , / 0 10 '

(2)

#

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

(3)

#

1 INTRODUCTION... 1.1–1 1.1 STRUCTURE OF THE REPORT... 1.1–2 1.2 CONVENTIONS USED... 1.2–2 2 BACKGROUND ... 1.2–4 2.1 OVERVIEW OF JAVA... 2.1–4 2.2 JAVA 2 PLATFORM, MICRO EDITION (J2ME)... 2.2–4

2.2.1 Overview of J2ME... 2.2–5 2.2.2 Advantages of Wireless Java... 2.2–7 2.2.3 Loading a Java application into a mobile device ... 2.2–7

2.3 SIM CARDS... 2.3–8

2.3.1 Basics about SIM and smart cards in general ... 2.3–8 2.3.2 Java enabled smart cards ... 2.3–11 2.3.3 Wireless Internet Browser WIB SIM card ... 2.3–19 2.3.4 SIM WIB with Java plug-in... 2.3–20 2.3.5 Over The Air (OTA) overview... 2.3–21

3 DEVELOPMENT AND EVALUATION ... 2.3–23 3.1 APPLICATION... 3.1–23

3.1.1 Basic Requirements... 3.1–23 3.1.2 Use Case examples ... 3.1–23 3.1.3 Limitations ... 3.1–25 3.1.4 Security ... 3.1–25 3.1.5 Evaluation technique ... 3.1–25 3.2 WIB EVALUATION... 3.2–26 3.2.1 Application design ... 3.2–26 3.2.2 Security design ... 3.2–28 3.2.3 Implementation and limitations ... 3.2–28 3.2.4 Evaluation ... 3.2–29 3.2.5 Evaluation Summary ... 3.2–42 3.2.6 Development: problems, environment & time ... 3.2–45

3.3 JAVA CARD EVALUATION... 3.3–46

3.3.1 Application Design... 3.3–46 3.3.2 Security Design ... 3.3–48 3.3.3 Implementation and limitations ... 3.3–49 3.3.4 Evaluation ... 3.3–49 3.3.5 Evaluation Summary ... 3.3–63 3.3.6 Development: problems, environment & time ... 3.3–65

3.4 JAVA IN THE PHONE EVALUATION... 3.4–68

3.4.1 Application Design... 3.4–68 3.4.2 Security design ... 3.4–69 3.4.3 Implementation and limitations ... 3.4–69 3.4.4 Evaluation ... 3.4–71

(4)

3.4.5 Evaluation Summary ... 3.4–85 3.4.6 Development: problems, environment & time ... 3.4–87

3.5 WIB WITH JAVA PLUG-IN EVALUATION... 3.5–88

3.5.1 Application Design... 3.5–88 3.5.2 Security design ... 3.5–89 3.5.3 Implementation and limitations ... 3.5–89 3.5.4 Evaluation ... 3.5–91 3.5.5 Evaluation Summary ... 3.5–98 3.5.6 Development: problems, environment & time ... 3.5–100

4 DISCUSSION/ANALYSIS... 3.5–103 4.1 PERFORMANCE... 4.1–103

4.1.1 WIB vs Java Card ... 4.1–103 4.1.2 Java Phone vs WIB with Java plug-in ... 4.1–106

4.2 DEVELOPMENT ENVIRONMENT/LEARNING THRESHOLD... 4.2–110

5 FUTURE WORK ... 4.2–113 6 CONCLUSIONS ... 4.2–115 7 REFERENCES... 4.2–118

(5)

$

FIGURE 2-1. JAVA 2 PLATFORM... 2.2–5 FIGURE 2-2. J2ME TREE... 2.2–6 FIGURE 2-3. DOWNLOAD PROCEDURE OF A JAVA APPLICATION... 2.2–8 FIGURE 2-4, THE DIFFERENT PARTS OF A SMART CARD [JAC02]. ... 2.3–9 FIGURE 2-5 THE HIERARCHICAL FILE SYSTEM OF A SMART CARD [JAC02]. ... 2.3–10

FIGURE 2-6, SHOW THE SEPARATION OF THE JCVM INTO ON-CARD ON OFF-CARD

PARTS [CHE00]. ... 2.3–12 FIGURE 2-7, THE LAYERS OF THE JCRE [CHE00]... 2.3–13

FIGURE 2-8, THE USE OF THE APPLET FIREWALL AND THE DIVISION INTO DIFFERENT

CONTEXTS [CHE00]... 2.3–16 FIGURE 2-9, THE USE OF SIOS [CHE00]. ... 2.3–18

FIGURE 2-10, THE INTERACTION BETWEEN THE WIB ON THE SIM AND THE WIG

SERVER. ... 2.3–19 FIGURE 2-11. IMPLEMENTATION OF THE SHAREABLE INTERFACE... 2.3–21

FIGURE 3-1 THE PROCESS WHEN A RESTRICTED PAGE IS REQUESTED AND PAID FOR. ... 3.2–27

FIGURE 3-2 THE TESTBED USED... 3.2–30

FIGURE 3-3 THE TOTAL EXECUTION TIME FOR A STOCK ANALYSIS SESSION DIVIDED

INTO IT’S DIFFERENT PARTS... 3.2–30

FIGURE 3-4 ESTIMATION OF PROPORTIONS WHERE TIME IS SPENT DURING A

TRANSACTION, DASHED AREAS ARE “ZOOMED” IN I.E. THEY SHOULD BE MUCH

SMALLER COMPARED TO THE OTHER. ... 3.2–31

FIGURE 3-5 TIME DISTRIBUTION DURING A SESSION USING PLAIN TEXT FOR THE

COMMUNICATION. ... 3.2–33

FIGURE 3-6 TIME DISTRIBUTION DURING A SESSION USING 3DES FOR THE

COMMUNICATION. ... 3.2–34

FIGURE 3-7 TOTAL EXECUTION TIME IN THE STOCK ANALYSIS EXAMPLE WITH USER

INTERACTION TIME REMOVED... 3.2–35

FIGURE 3-8. INCREASE IN EXECUTION TIME WITH 3DES I.E. WHICH PART HAS THE

LARGEST INCREASE IN EXECUTION TIME COMPARED TO WHEN PLAIN TEXT IS

USED. VALUES HAVE BEEN TAKEN FROM TABLE 3-3... 3.2–36

FIGURE 3-9. THE REAL DIFFERENCE IN EXECUTION TIME BETWEEN THE 3DES AND

PLAIN TEXT CASE. SEE TABLE 3-3 FOR WHICH MEASUREMENT THE DIFFERENT

NUMBERS CORRESPONDS TO. A POSITIVE VALUE MEANS THAT THE 3DES CASE

TAKES THAT MANY MORE MS AND A NEGATIVE VALUE THE OPPOSITE... 3.2–37

FIGURE 3-10 TIME TO ENCRYPT DATA ON THE SIM CARD AS A FUNCTION OF THE

NUMBER OF BYTES. ... 3.2–38

FIGURE 3-11 TIME TO ENCRYPT DATA WITH THE SECURITY CENTER AS A FUNCTION

OF THE NUMBER OF BYTES... 3.2–39

FIGURE 3-12 TOTAL TIME TO PUSH A WML PAGE THE WHOLE WAY TO THE PHONE

FROM A CLIENT CONNECTING TO THE WIG SERVER AS A FUNCTION OF THE

PAGE SIZE. ... 3.2–41

FIGURE 3-13 THE MOST CENTRAL METHODS AND ATTRIBUTES OF THE CLASS

(6)

FIGURE 3-14 PROGRAM FLOW WHEN ISSUING A BILL TO THE WIRELESS WALLET

APPLET. ... 3.3–48 FIGURE 3-15 THE TEST BED USED FOR THE EVALUATION. ... 3.3–50

FIGURE 3-16 THE TEST BED USED FOR EVALUATION. ACTIONS NUMBERED X-1 OR X

-2 MAY TAKE PLACE IN PARALLEL... 3.3–51

FIGURE 3-17 ESTIMATION OF PROPORTIONS WHERE TIME IS SPENT DURING A

TRANSACTION, DASHED AREAS ARE “ZOOMED” IN I.E. THEY SHOULD BE MUCH

SMALLER COMPARED TO THE OTHER. ... 3.3–51

FIGURE 3-18 TIME DISTRIBUTION DURING A SESSION USING 3DES FOR THE

COMMUNICATION. ... 3.3–54

FIGURE 3-19 TIME DISTRIBUTION DURING A SESSION USING PLAIN TEXT FOR THE

COMMUNICATION. ... 3.3–55

FIGURE 3-20. INCREASE IN EXECUTION TIME WITH 3DES I.E. WHICH PART HAS THE

LARGEST INCREASE IN EXECUTION TIME COMPARED TO WHEN PLAIN TEXT IS

USED. VALUES HAVE BEEN TAKEN FROM TABLE 3-3... 3.3–57

FIGURE 3-21 THE REAL DIFFERENCE IN EXECUTION TIME BETWEEN THE 3DES AND

PLAIN TEXT CASE. SEE TABLE 3-10 FOR WHICH MEASUREMENT THE DIFFERENT

NUMBERS CORRESPONDS TO. A POSITIVE VALUE MEANS THAT THE 3DES CASE

TAKES THAT MANY MORE MS AND A NEGATIVE VALUE THE OPPOSITE... 3.3–57

FIGURE 3-22 TOTAL EXECUTION TIME IN THE STOCK ANALYSIS EXAMPLE WITH USER

INTERACTION TIME REMOVED. ... 3.3–59

FIGURE 3-23 TIME TO ENCRYPT DATA ON THE SIM CARD AS A FUNCTION OF THE

NUMBER OF BYTES, USING BOTH A TRANSIENT ARRAY AS WELL AS AN

ORDINARY. ... 3.3–60

FIGURE 3-24 SERVER ENCRYPTION TIME I.E. BANK AND OR CONTENT PROVIDER... 3.3–62

FIGURE 3-25 TIME FOR THE APPLICATION NOCRYPTO IN THE GSM CASE... 3.4–74 FIGURE 3-26 TIME FOR THE APPLICATION NOCRYPTO IN THE GPRS CASE... 3.4–75 FIGURE 3-27 TIME FOR THE APPLICATION CRYPTO IN THE GSM CASE... 3.4–76 FIGURE 3-28 TIME FOR THE APPLICATION CRYPTO IN THE GPRS CASE... 3.4–77 FIGURE 3-29 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GSM CASE... 3.4–78 FIGURE 3-30 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GPRS CASE... 3.4–79 FIGURE 3-31 TIME FOR THE APPLICATION CRYPTOLONG IN THE GSM CASE... 3.4–80 FIGURE 3-32 TIME FOR THE APPLICATION CRYPTOLONG IN THE GPRS CASE... 3.4–81

FIGURE 3-33 TIME FOR THE APPLICATION CRYPTOEXTRALONG IN THE GPRS CASE... 3.4–82

FIGURE 3-34 THE TOTAL TIME FOR THE DIFFERENT APPLICATIONS. 1 = NOCRYPTO,

2= CRYPTO, 3=CRYPTOSHORT, 4=CRYPTOLONG... 3.4–83

FIGURE 3-35 THE TOTAL TIME FOR THE DIFFERENT APPLICATIONS. 1 = NOCRYPTO,

2= CRYPTO, 3=CRYPTOSHORT, 4=CRYPTOLONG, 5=CRYPTOEXTRALONG... 3.4–84

FIGURE 3-36 THE TIME FOR ENCRYPTION AND DECRYPTION FOR THE DIFFERENT

AMOUNT OF DATA WITH RESPECT TO THE TWO SCENARIOS SIEMENS SL45I

PHONE (GSM) AND SIEMENS M50 PHONE (GPRS). ... 3.4–84 FIGURE 3-37 THE PROCESS OF MAKING A PURCHASE. ... 3.5–90

FIGURE 3-38 DISPLAYS THE TIME OF PUSHING A WML PAGE FROM THE BANK SERVER

TO THE USER’S PHONE AS A FUNCTION OF THE BYTE CODE TO SEND. ... 3.5–93

FIGURE 3-39 DISPLAYS THE TIME OF SENDING THE RESPONSE TO THE BANK SERVER

FROM THE USER’S PHONE AS A FUNCTION OF THE BYTE CODE TO SEND. ... 3.5–95

FIGURE 3-40 DISPLAYS THE TIME AS A FUNCTION OF THE NUMBER OF BYTES TO

ENCRYPT. ... 3.5–96

FIGURE 3-41 DISPLAYS THE CONTRIBUTION FROM THE DIFFERENT PHASES TO THE

(7)

FIGURE 4-1 COMPARISON OF THE TOTAL EXECUTION TIME BETWEEN THE WIB AND

JAVA CARD CASES. ... 4.1–104

FIGURE 4-2 COMPARISON OF TIME SPENT SENDING SMS BETWEEN THE WIB AND

JAVA CARD CASE. MUCH MORE TIME IS SPENT SENDING SMS IN THE WIB CASE

SINCE MORE SMS ARE REQUIRED DUE TO THAT THE WIB IS STATELESS, WHILE

THE JAVA CARD HAS THE POSSIBILITY TO MAINTAIN A STATE... 4.1–105

FIGURE 4-3 THE TIME TO ENCRYPT A NUMBER OF DIFFERENT BYTES USING EITHER A

JAVA CARD OR WIB SIM CARD... 4.1–106

FIGURE 4-4 TOTAL EXECUTION TIME USING GSM NOTE THE HIGH STANDARD

DEVIATION. ... 4.1–107 FIGURE 4-5 TOTAL EXECUTION TIME USING GPRS. ... 4.1–108

FIGURE 4-6 COMPARISON OF THE TOTAL EXECUTION TIME BETWEEN USING SIEMENS

SL45I AND A DIALED UP GSM CONNECTION COMPARED TO A SIEMENS M50

WHICH USED GPRS FOR THE COMMUNICATION. ... 4.1–108

FIGURE 4-7 COMPARISON OF THE ENCRYPTION TYPE WHEN USING DIFFERENT

PHONES A NEWER SIMENS M50 (GPRS PHONE) AND AN OLDER SIEMENS SL45I

(GSM PHONE). ... 4.1–109

FIGURE 4-8 TRANSMISSION TIME AND HOW IT DEPENDS ON THE AMOUNT OF DATA

(8)

#

TABLE 2-1 SUPPORTED AND UNSUPPORTED JAVA FEATURES... 2.3–12 TABLE 2-2 SECURITY MECHANISMS IN OTA [G+02] ... 2.3–21

TABLE 3-1 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING

ENCRYPTED COMMUNICATION BETWEEN WIB AND WIG. ... 3.2–32

TABLE 3-2 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING PLAIN

TEXT COMMUNICATION BETWEEN WIB AND WIG. ... 3.2–32

TABLE 3-3 COMPARISON BETWEEN 3DES AND PLAIN TEXT EXECUTION TIME WHERE

3DES IS NORMALIZED TO PLAIN TEXT ALSO THE REAL DIFFERENCE IN MS IS

TAKEN BETWEEN THEM. ... 3.2–35

TABLE 3-4 MEASUREMENT OF ENCRYPTION/DECRYPTION TIME IN A SIM CARD,

THERE WERE 5 MEASUREMENTS MADE EACH SIZE. ... 3.2–38

TABLE 3-5 MEASUREMENT OF ENCRYPTION/DECRYPTION TIME AT THE SECURITY

CENTER SETUP TIME MEASURED SEPARATELY. ... 3.2–39

TABLE 3-6 TOTAL TIMES FOR PUSH COMMUNICATION I.E. THE COMMUNICATION

BETWEEN THE WIG AND EITHER OF CONTENT PROVIDER OR THE WALLET

SERVERS. NUMBER INSIDE PARENTHESIS INDICATES NUMBER OF

MEASUREMENTS... 3.2–40

TABLE 3-7 TIME TO PUSH A PAGE THE WHOLE WAY TO THE WIB PHONE. TEN

MEASUREMENTS WERE MADE FOR EACH PAGE SIZE. NUMBER OF BYTES SENT

WERE LESS THAN PAGE SIZE DUE TO TRANSFORMATION TO BYTE CODE AT THE

WIG SERVER. ... 3.2–40

TABLE 3-8 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING

ENCRYPTION BETWEEN WALLET APPLET AND THE BANK SERVER. ITALIC

VALUES ARE TAKEN FROM THE WIB CASE. ... 3.3–52

TABLE 3-9 MEASUREMENT OF TIMES IN STOCK ANALYSIS PROGRAM USING PLAIN

TEXT WALLET APPLET AND THE BANK SERVER.ITALIC VALUES ARE TAKEN

FROM THE WIB CASE. ... 3.3–54

TABLE 3-10 COMPARISON BETWEEN 3DES AND PLAIN TEXT EXECUTION TIME

WHERE 100 IS THE 3DES A POSITIVE VALUE MEANS THAT THE 3DES IS

FASTER THAN THE PLAIN TEXT VERSION AND A NEGATIVE VALUE THE

OPPOSITE. ITALIC VALUES ARE USED FROM THE WIB CASE AND SINCE NO JAVA

CARD WITH A SUBSCRIPTION WAS AVAILABLE. ... 3.3–56 TABLE 3-11. ENCRYPTION TIME ON JAVA ENABLED SIM CARD... 3.3–60

TABLE 3-12 TIME TAKEN FOR ENCRYPTION/DECRYPTION ON THE SERVER SIDE I.E.

THE BANK AND CONTENTPROVIDER... 3.3–61 TABLE 3-13 DATA SENT FROM AND TO APPLICATION (IN BYTES) ... 3.4–73 TABLE 3-14 TIME FOR THE APPLICATION NOCRYPTO IN THE GSM CASE... 3.4–74 TABLE 3-15 TIME FOR THE APPLICATION NOCRYPTO IN THE GPRS CASE... 3.4–74 TABLE 3-16TIME FOR THE APPLICATION CRYPTO IN THE GSM CASE... 3.4–75 TABLE 3-17 TIME FOR THE APPLICATION CRYPTO IN THE GPRS CASE... 3.4–76 TABLE 3-18 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GSM CASE... 3.4–77 TABLE 3-19 TIME FOR THE APPLICATION CRYPTOSHORT IN THE GPRS CASE... 3.4–78 TABLE 3-20 TIME FOR THE APPLICATION CRYPTOLONG IN THE GSM CASE... 3.4–79 TABLE 3-21 TIME FOR THE APPLICATION CRYPTOLONG IN THE GPRS CASE... 3.4–80

(9)

TABLE 3-22 TIME FOR THE APPLICATION CRYPTOEXTRALONG IN THE GPRS CASE... 3.4–81

TABLE 3-23 DISPLAYS THE TOTAL TIME IN THE GSM TEST AS AVERAGE AND

MEDIAN AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER

COMMUNICATION AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL

TIME. ... 3.4–82

TABLE 3-24 DISPLAYS THE TOTAL TIME IN THE GPRS TEST AS AVERAGE AND

MEDIAN AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER

COMMUNICATION AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL

TIME. ... 3.4–83

TABLE 3-25 DISPLAYS THE TIME FOR PHASE 1, WHICH REPRESENT CONTENT

PROVIDER COMMUNICATION WITH BANK SERVER AND BANK SERVER

EXECUTION BEFORE PUSH... 3.5–93

TABLE 3-26 DISPLAYS THE TIME TO PUSH A WML PAGE FROM THE BANK SERVER TO

THE USERS PHONE. ... 3.5–93 TABLE 3-27 USER INTERACTION (INCLUDING ENCRYPTION) ... 3.5–94 TABLE 3-28 SENDING RESPONSE TO BANK SERVER. ... 3.5–94

TABLE 3-29 NUMBER OF ITERATIONS OF ENCRYPTION DEPENDING ON THE SIZE OF

THE BYTES TO ENCRYPT. ... 3.5–95 TABLE 3-30 ENCRYPTION OF DIFFERENT SIZES. ... 3.5–95

TABLE 3-31 DISPLAYS THE TOTAL TIME OF THE APPLICATION’S EXECUTION TIME,

INCLUDING THE TIME FOR USER INTERACTION... 3.5–96

TABLE 3-32 DISPLAYS THE TOTAL TIME OF THE APPLICATION’S EXECUTION TIME,

WHEN ADDED THE TIME FOR ALL PHASES TOGETHER... 3.5–97

TABLE 3-33 SHOWS THE CONTRIBUTION PERCENTAGE OF THE DIFFERENT PHASES. ... 3.5–97

TABLE 3-34 DISPLAYS THE TOTAL TIME OF THE APPLICATION’S EXECUTION TIME,

WHEN ADDED THE TIME FOR ALL PHASES TOGETHER... 3.5–98

TABLE 4-1 COMPARISON BETWEEN WIB AND JAVA CARD EXECUTION TIME WHERE

THE WIB IS NORMALIZED TO JAVA CARD ALSO THE REAL DIFFERENCE IN MS IS

SHOWN. ... 4.1–103

TABLE 4-2 DISPLAYS THE TOTAL TIME IN THE GSM TEST AS AVERAGE AND MEDIAN

AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER COMMUNICATION

AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL TIME. ... 4.1–107

TABLE 4-3 DISPLAYS THE TOTAL TIME IN THE GPRS TEST AS AVERAGE AND

MEDIAN AND THE PERCENTAGE IN BOTH CASES OF HOW MUCH SERVER

COMMUNICATION AND ENCRYPTION/DECRYPTION CONTRIBUTES TO THE TOTAL

TIME. ... 4.1–107

TABLE 4-4 TIME TAKEN BOTH TO ENCRYPT A NUMBER OF BYTES EITHER USING A

SIMENS SL45I OR A SIMENS M50... 4.1–109 TABLE 4-5 ENCRYPTION OF DIFFERENT SIZES FOR THE WIB WITH JAVA PLUG-IN... 4.1–109

TABLE 4-6 TIME TAKEN BOTH TO SET UP A CONNECTION AND SEND THE ACTUAL

(10)

% & '$ "

9 "# 3 3" " 0 ' #" ( ( " " " " 3" "% ' " 2 " 3 "2 "%% 0 % " (" " " " " 3 " ( 3 ("" ( " " ( ( 3" 2 %" % 9 % (" " " # # 3 " 2 " " ( " " :';

(11)

<

(

'

' 3" 2 " 0" 0 ' ( " 3 " ( %" 2" " 2 " ! "# $ % " % " % & #" " ' % " "( ." & "# ' % " "( 10"% " 103 0 ' 3 " "3 2 "# 9 "2 " " 0" ! ( 0 ' %6 2" -% " 3 &! 13 % 3 # " %" ( %" -= 0 0 ' "# 3 " 4 " 3 &! -% " 3 " ' 2 "# " " " 0 ' " ( " "# # % "# 3 1 2 ( % % " 3 & " " " ( ! #" " % % 0$0 % " ( "2 % " '" 2 2 " ( % " " 2 2 " "2 % 0 ' " 5 & >5 & "3 ?1 3 % % # % " 2 % " 0&$ % # % % %" " 5 & " " % ' 5 & 3 % "3 2 ( " " " 0&$ % & 2 %" "" #" " " "" ( " 2 " "2 % % 2 9" " " " 2 2 " % " 3 5 & " 6 % " 2 " 0&$ "" 13 % " " " % 3" # ' " " % % 4" "# 2 % 2 " 4 % ( "# " 3 5 -2 " 3 @ .0 @ " %" " 6 " 0 ' " "3 % "2 % " 3 2 " # ) " (

" 0&$ % 2 3 5 & # # " 4" "# 0&$ %

" ' 6 " 3 " #"% " 5 & A5 &@ " " # " " ( " " " #" / 2 " &# % ( "# #" 3 " 2 " 6 " 3 2 # A 32 % % %" "# " ( " % #" 0 ' " % #"% " 0&$ ( % " ( 0&$ % 5 & ' # "# " 1%" % 2 1 #"% ( " " "# 5 & %" " / 2 0&$ % ' % ( #" 0 ' % / 8 %" ( " " "3 ( % ( " " 5 & " " ' "24% " %" ## % ( ( #" % 1 " " " ( % % ( " & %" "# " 1%" % 2 15 & 3 / ( 2 %" 3 "# / " % " ' " " " % / "4% " 5 - / " %

(12)

< " 2 % " " " 0&$ % " " " " " 5 - " %" " / " " " % " " 0 ' 2 13 % %" % 0&$ ( "" " % (

()(

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

()*

'

5 " ( # " 0$ " 2 0&$ '"" ( % 0 " $ (

(13)

< ' " "# ## @0$ ( @0$ 13 % % # 0&$ % @0$ D % # 0&$ '"" %" ' " @0$ @0$ D 13 % % # 7 ' - # % " 4 2 # " @0$ ' " " @ .03 % % % @0$ 3" 4 # " @ .03 B" C %" % " # " @0$ *

(14)

<D

* + %$

'

*)(

&

,

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

-*)* ,

* -

".

'

/,*

0

' / #" 1%" ( "# / ( ( 1/ $ % >/ $? / - &1 " 3 ( "# %" 3 1 ( # " % " 0 % ( " 3 / %" " 1 9( / #" E/- G, • / 10 ) " >/0)? ( #" " %" • / 1) ) " >/))? %" #" #" 1 3 % " • / 1$ % " ) " >/$)? "# % " "( % # % " " #" % % "2 " /$) 2 "# /0) %" " 1 % % - &

(15)

< $ *1() , * - "

*)*)(

&

,*

/$) " ( "# % 3 % ## " # " % " ' #" 3" " 2 ## % " "# 3 " % /$) " 2 # * 2 " %" 3 "2 "# ## % 3 %" # ( " 1 " "# % " "( #" % ( "# ## % " ' " /$) 3 % %" % " "# % " "( % # % " ( #" ## "# % & ( " 2 " % 2 #" " % ' "%' " ( %" ( "# / $ % >/ $?E/- GE8$! G ' / $ % " % /$) %" # ( " % " I " # % % E8$! G - %" # ( " % # % " # / 2 / $ # " % * % " # " "2 % ( % %" # ( " - %" # ( " 1#" * 1 ( 2 ( #" % : "# " 3" %" % " ' "# - & % " 2 "# /0) - & '" " 2 % " % ( 1%" # ( " % " %" " " # - "# 2 " %" # ( " 2 " % # % - & " %" " #" 2 ( % " #" % # % % 5 %" # ( " % 2 / $ 2 % "# - &1 " " 2 # % # " ( " 2 " " 2 %" % " "# % - & #" % " # % % 1 # % 1 " ( - % " 3 #" % # % "# % 2 " " % " "# E/- G ' ## %" # ( " "# " % 2 / 8"

(16)

<J >/0. ?' /0. 1 " ( " ( 1 3 # " %" # ( " "# ' ## %" # ( " "# "3 9( /$) & ( 1 # % # % " "3 3 " 2 % ( " 1 3 % # % " " "3 3 2 % ( " ' %" " ( /0. 2 " "3 $ *1*) ,* ' /$) 3" 2 % 8" % 1 ! % 8" # ( " 8" % ! % 8" # ( " "3 9( , '. " ' ! $ / ! 0 ' %" # ( " #" 3 % 3 3" %" % " 1 ( 1 "2 " 1 " ! ( - > !- ? ' % " 2 ( ( "# J "2 >: ? " : 0 % %" # ( " " 3 0 ' 1 #"% 3 2 " " ' 8 !8 % % # % " #" / $ 2 2 : $ % >: $?1 " 2 0=F ' 6 #" 8 !8 3 " # "3 %" " " " "# / % " "( " %" 2 % 2 " ## "2 % 1 " ( " 2 "# % " %" 2 3 ## "2 % ' I "# %" " "# 8 !8 >/ 2 % ? " 2 : ' 8 !8 " % # % " " 2 2 " : "# / % ' 8 !8 #"% " % 3 , "3 % % % 2 6 ( "3 " / % " % # # % " 1 % " " % # " % " 2 2 ( % " B 2"*C " % " % % ( % " 2 " 2 % " E8$! G

(17)

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

*)*)*

'

$

2

,

' " 3 / #" 3" 3 3 3 " ; 6 E/- G • ' / #" # 0 % / 2 * % / $1 % 2 %" " " " " " " I % " • ' / ( ( %" ( "2 "( (M "% " "# " 3 % % " • ' / %" ( " 2 - ( * % 2 2 % " % - $&! > $&! % " ?% " % $&! % # % " - " ( "# " 2 "# "3 " ( % " " %

*)*)3

' $ ,

#

'

'" 2 2 " "3 " / % " " "2 " 1 " " / % " ( >/-$? % " " " ' $&! "# "" % # ( "3 " " 3 %" % " 1 "3 3 " " %" "3 " 1 6 - % " "# "3 " # " 5 2 ( >" 5 - ( ?"# % " #" "3 (, ' % % " # " 5 2 ( - % " # 13 #" " 2" % " 1 " ' % " ( > " ?% % # " ( % # " " " "# % " " " &# % % " % " ( "3 " % " " " & " 2

(18)

< $ *13) ! & ' ' ,

*)3

'

*)3)( +

#

' "

'

$

' "# % 2 "2 " " % " % " % 0&$ >0 2 % 2 & # % " $" ?% 0 % ( " 3" ( " O " % % " "% " % E)99 G0 % " " 3 0&$ % " # " % (" "# % " "% " % " % 3 " 2 %" ' " " % 2 3 1 % ( " % % % - % B%" C3 " 2 " " " &7 " " " 0" 2 % 2 ( 2 "% % " "% " #" "% ( " %" "# )) .7$1.7$1.-$ 9 -0; E/-8 G ) % % "3 " % % # " % &# % # "3 2 " #" "# 2 " % & 9( D " % %" # ( " 3 " 0&$ % % " %

(19)

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

(20)

< $ *19 8 " " '5, 6*7) ' 3 ( # " 70"# % ( 4 "## ( " # * " 2 ( "# %" @0$ " '" 2 2 " # 2 " " % % 5 "3 " # " % % # " " 2 " % % # % E/-8 G ' "# # % # 2" "# # 3 % %% %" " " 6 "# # 6 " ' # " &F %" " # %% " % # ! ( " " ( ## "# %% %" " % 2 $" # ( " " * 2 2 % , • & 8 # % 3 2 %% • ' ' ( >8; ?1 %% " # 8; • ' ' * >8; ?1 %% " # 8; • '" # %" " 2 " 3 " " " % • 1 %% " # #" 2 ' &F %" " # # " 3 3 " ( &F %" " % 3 2 2 "% % " 2 2 "% 3 % 2 "% %" &# 3 " ( 2 "% %" " 3 " % 3 2 2 "% 0 " " %" # 3 "( %" % " " % 1 % " % " 3 % 1 "% % E/-8 G

(21)

< @0$ ## % % 2 3 " @0$ ## % " " % " # ( ( "# % 3 ' ## " ( " "## % 3 (" "## % @0$ " % 2 %" " 3 2" E=0' G" %" 2 " 3 " " " #" " % % &0- 2 #" % " % ' " "# ## % 2 3 ( " % % $" "# 3 " 2 %" % " 3 ( * " % " 2 " " ( 1 % 2 "3 " ( " #" % "( % ( " E/-8 G

*)3)* ,

# ' "

'

7 "# ( 2 # 3 / 2 8 77 ( /8 $ " 2 % % 3 3 % 3 "( 8 " 2 % 3 % 3 "( 8 " - 2 % %" " 3 " 3 " % " " %%" 13 / 8 % % " " " " %% % / 8 % " % " # 3 % " * % 3 " ( " %" " E/80 G / 2 % " /$) >/ $ % " ) " ? 0 % % % "# % % "# 3" " % " " 2 "# # & ' 2 " ## % " "( % % % % 2 "3 " # % % 3 " " 3 2 3 #" * 2 /$) " " # "# % " ( "# "( E8;) G

(22)

< # *1( ' ' ', 0 " / # = " / # • 0 , 2"" 12 1 " • 7 " • / % ( 1% 1 # % *% " • / "24% " # , % 1 " 1 " " ( % "24% % " 1 %% %" 2 ( • ' 3" 2 ( " " " • ( , " (1 " 2 1# " • 8 % ( • $ " • ! % % " ( • 0 % ( • @ 2 ( %" % " # I " • ' • 724% I " • 724% % " ( ' B" C/ $ /8 $ >/ 8 $ % ?2 " 3" " "## % " " % ' " 6 " * % 3 2 3" " 2 #" " "# % E8;) G ( " " 1 " " ( " 6 " ( * % " 7## % %" " 13 % " "% % % # / % ( " 8-8" - 9 ' 8- # " " " % * % 2 " % ;"3 8- # 2" 9( J #" "3 ( ( $ *1:. & , ; 1 ' 1 ' 5 667) ' / 8 . ) " >/8.)?%" "# # 3" % >- &?1 * " ( 6 #" # % " 1 " 8- # " % > # % % ?1 % " 2 #" " % ( 1 3" %" % " %1" 2" "

(23)

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

(24)

< D • - ' #= ' # "24% % " 2 2 3 " 9" % " "24% % 2 % .-$ " "24% " 2 ( " 2 3 " E8;) G • " ' /8 $ 3 " " #" " % ( 3 " " ' - & " " #" % " 3 ( 3 " " "# • & ' $ " " ' # 3 " " % ( % 0 % ( ( % * % * % " " " ## % " " 5 " #" " " /8.) " % /8 $ % # % " " ( % ( % % " &''" - " /01" #" " #" " ' / - & " % " 2 ( % 12 (" " % % * " ( - &#" &71%" % " @=&2 " E/-8 G' * " , • = ') " & %1 %" % ( 3 % # % % - 1 &F1- !=10 = # 2 ( 2 "% 3 " ( % • = '>) " & %1 % ( " "24% " ( #" &07 K J D %" 2 # & " # >)9?1 % # >!9? # " - != % # &07K J1 " % " 2" % % #" " #" " • = '>) 8 ' = '>) 81 " % "( 6 % 12 " # - & # % " % " & " " "# /8.) " 2% " 2 " 1 " =0 * " ( " ( ( % "( E8;) G & ( / "( % ( "( 6 # ( ( ( % " " & 13 " % # ( % " # >-&!?%" ( "# 3" , " % &!

.&! " # * " &P ' .&! 3 % 2" #"

% ( - " 2 2 ( &P % I # " " 2 12 " 3" -&! % 2 % " 6 # " % E8;) G ' " ## % 2 3 % 2 "3 " " % 2 " .7$ ( # % 1 % .7$ "3 " # A% " 3 " .7$ " "3 F " " %" " 2 /8 $ %" 2 % I ' " " ( % % "3 " " )) .7$ 2 #" % %

(25)

< 3 .7$ - "3 " 2 % " " "3 " % " % /8 $ % O%" " %" E8;) G '" " # % % 6 % "# - != >- % " " "%" ! = ?%" " % 1 %" 3 " % 2 "## % # " 8- # - 3 " % % - != %" 3 %" 8- # " )) .7$ % 8- # 3 % " % # % &# % ( 6 "% -% "# % 2 % " install " ,

public static void install(byte[] bArray, short offset, byte length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

(26)

< J " 3 " " %" * > % ( ?' /8.) " ( %" * # " /8.) %" * " %" * % 2 % 2 %" " " % " %% /8.) %" * $ *1?. & ' ' ' > 5 667) - " " % %" * " * % ( /8.) " %" * "# 5 3 "24% % ( "3 ( %" * 3 % % % %" * % % 2 %" 2 #" "3 " " % % %% 2 2 " % ( "3 ( %" * % ( 5 "24% %% %% %" " #" " ( " " % # " 2 % %" * " %" " %% ( "24% "3 " %% "24% # " %" * * % ( 1" 3 SecurityException "3 E8;) G 0 % " % "3 2 %" * " % 1 % # %% 2 2 " 12 "24% > % ( ? # % 2 " ( " %" * " " " % # # " % "# % %% # 5 % " % * % ( % O %" * "24% % 2 %" 2 "# %" * %% %" " 3 % " % %" * '" 2 2 " 2 3 %" * % 2 % " %" * 3 % % /8.) %" * 3 % " /8.)1 % /8.) % ( " 2 " %% - %" "# ## " " % %" * 3 % , /8.) ( 1/8.) " "24% 1( "2 2 # % % 2 " #" "3 ( ( , $ 1 ( 3 /8.) % - != %" % %

% Oselect1deselct " process " %" * % ( "

(27)

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get " % ( % O -&! % 2 " % 3 " ( % " " -# /8.) % 0&7 # " 2 1 /8.) 0&7 " % ( % 2 D &# " " ( 0&7 " # /8.) % " # -&! " % ( 0 % % %" ( 0&7 3 " " 1 % ( 2 % 2 % " " # O " % "3 - % ( %" 2 " % " % % % 3 % %" %

(28)

< $ *1@. 5 667) & /8.) % " 2 " /.) 1 % # 3 "3 SecurityException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

(29)

<

'-. >' ( - % " ? % " 3 % % "

" " & 3"

*)3)3 2

+ &

2 +

'

' 5 & >5 & "3 ?1 " "% " O0&$ % 1 "3

" ( % % 3 "2 % 2 "2 " " ! #" ( 0$0 %" % " % ' 5 & " % # % " " 2 0 ' 7 ## 0&$ % # % 5 & " " 0&$ % E0'5 G'" 5 & " #" 5 &@ "" 9( 1 2 3 " 5 &@ >5 & @ 3 ?" * 2 % %" 2 "## ( 2 % " % ' 4"2 "# 5 &@ " " 6 #" " " " $ *1(6. # & 2 + ' 2 ) '" " % 1 2 "# 5 $ 13 5 $ ( 5 &@ %" " %" 2 %" "" 2 5 & " 5 & " ( 0$0% - 2 %" 5 & #" " 0&$ "" %" " "2 " % > ? 0&$ "" )'0&A0$@) #" @0$ " 2 0&$ % " ( 2 % " 3 "## 2 ' " ( " 03 E8) G, - &F %" " % "

(30)

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

*)3)4

2 + &

,

- $1

5 & 3 / ( %" 2 " "# 3" % 6 / 8 " 5 & 1 % " 5 & ( " / 2 0&$ % - " / 8 % %% # % " # " % " " ( % " 0" % 13 % "3 %% " ( # 3 " * 2 3 % 9( "3 * "# " "# 0 2 # % 13 5 & ( & # % # % * ( 0 2 # %

5 & ( & # % %" " & %% 2 2 "

' % 5 5 * / 8 -# % 5 & ( & # % " ( 2 %" % 2 %% 2 " & &# " 3 " %% 5 5 % % " " &''" 0" " " & ) 02" 3 -&! %" " ( " 5 5 1 " 4 % # 3" /80 ' " "24% # 2 0 2 # % 0 % "3 3 # % " * % 4 " % "

(31)

< $ *1(() " " #

*)3)9

/

0

&

7'- "% " " " ( " 0&$ % 2 " ( " # % " " ( "3 " "# % " " 0&$ % " 2 " % " ( " 0&$ % 7'-( # " 3" " "2 % " %% " % " " 0&$ % #" B" C )0$0 >) % 0 " $ ( 0 % ? % 2 #" @0$ # " %" 1 % " ( 1 % " (( ( E@H G 0 % ( " % " 3 7'- )0$0 6 " #" "# % 6 " 2 # # %" 2 I ' 2 # *1* 8" " 5 A6*7 B " 63)4? " - % " 8 "( % % % $ ( ( . % % % . % " 6 % ( 8" ""# "# % * % " -% "3 ( $ ( %" # ) % " 8 % " %" 2 "# 2 " " % % %" % 2 "# 2 2 % % - B# C " % " 2

(32)

< "# % % % P7.13 % " % % !)0 !)02 ( ( " 5 )0$0 " 0&$ '-. >' ( - % " ? % " 3 % % " #" " " & 3" ' "% "# ( " " * ( " 0&$ % %" " 2 "2 " " "3 ( 0&$

(33)

<

3 !

"

'

' 3 " 3 " % % " " " * % " "# ## % " "( " B# 3" C#" " 2 % ( ' * % " % 2 % " $&'' " # % " " * " " " # ! "

3)(

' " ( " " "# ## % % " " "# % " 7 2 % " #" % " 6 " % 2 "# "% ( " 2 2 " "3 % % %" " % " ' % " % " % >3 3 ?#" % " > " % " ?1 % %" % ( % " ( % 3 &0- % %" " 2 " # % %" "" % #" % % " & % " % % 3 % " 2 5 % % % "3 %" #" % " 2 " #"

3)()( +

B

"

' # % " # " % " " 2 "# 3 3 ' # % " % , • 7 " 2 2 " 3 3 " # " %%" %" % " % " • ' " 2 # % " "# " " 3 3 # " %" % 3 • ' 3 " #" 6 ( " "3 " 2 3 3 • ' #" " 2 % " 2 % " " 3 %

3)()*

> "

' " 3 B % " C% " # " % " % A ( 2 "3 "# 3 ' % % 2 2 "3 " "# "3 3 %" 3"

(34)

< D % 8 ' "% % " " " 0&$ 3 " 3 % - 6 #" " %" " 13 % " "" 2 # & 5 & % #" "3 ( 3 6 "% , ( ( 6 1%" ( #" " 2" " " " 1 # " 2 " &# 3 " 1 A ( 6 " #" " 2" ( ( 2 % " # ( 7 % B2 C 2 3 % 0$ %" ( &# / 2 0&$ % 6 "% "% 3 % 3 3 13 % # ## % 2 % &# " ( " 3 6 &F # " 2 #" * % % " 5 % " %" #" " # " 3 3 " 2 " " %" 2 # " %" " ' 3 3 " #" "% " 2 3 3 " "% " 6 # " %" " & 5 & / ( % 3 1 # ( " %% % ( 1 % ( % / ( / 8 ' ( 3 % % " "2 "1" 1" ## % 2 % 3 6 &F # " 2 #" * % % " &# % " %" 1 #" " 2 % " ' % 3 % ( $ " ' ( A " "3 " " " "3 3 " " 3 & % "# / 8 % " " ( ( " " ( ' 3 % 3 3 / 8 2 ( " ## % 2 % 3 6 &F # " 2 #" * % % " &# % " %" #" " " 2 " " %" 2 # " %" " ' 3 3 " %" % 3 ( " 3 ( %% " 3 & % "# / % " 3 % ( " " ( 3 2 " ( ( &F ' ( ( &F 3 2 " " >( " 2 ?#" # % " ' % % " ( ( &F O % 2 ## % & #" " 2" 2 % " &# # % " 3 %% # 3 3 2 " #"

(35)

<

3)()3

"

'" " "2 " "# % " 2 %" "" ( 1 # " " % 1 #"% 3 2 " "2 % %" % " 2 3 7 B2 % 2"*C % 6 3 2 " % 1 % " " " 2 # 1 ( " % " 2 3 3 6 ( 3 " % & " "# " # % " 3 2 " 6 ( " # " 2 3 3

3)()4

8

'" " % 2 3 % " "# % " "# " 2 7 "# " %" " (" !)0 > % " ? % % " (" % 2" " % % !)0 " 2 "% % (" " I - " "# ( !)0 !)0 '" % ( 3 !)0 #" "3 ( #" *3 (4)(4($4555 3 ( #" % " )( % " % 2 ( * ' 2 ( % " % "3 " % 3 % 3 ( !)0 ' " 3 ( " 2 % " (" 2 #" % % !)0% % 3 "3 13 % %" % % ( !)0 '" 3" "2 2 2 # % E0'- GE0'- G " ("" ( " #" " % " " ( % " 1 ( ( % " 5 %" " % @0$ 3" 3 2 % % % D 1 @0$ 1 % ## % & " % # 2 " " " %" % 12 3" 2 " 2 # " " " ( % 3 " 9" # ( ( % # " @0$ # / " 6 " & /6& " " " "" " % # % " 2 # " )'0&>) " ' %" % " 0 & ?

3)()9

B

' " 3 3 # 3" #" " 1 % " "( 3 2 3 %" " " " ( ## % %" % " 1 % # 1 #" % 1 " " ( " "" ; #" "3 ( % 3 2 %" , % % O #" %" % " 1 #" %" % " % "3 %" % " " " ## " "# 8 0" "# % % " % " 1 ( ( ( % " % B C % % 13 3 " " 2 #1 # % " 3 2 %"

(36)

< J - " 0 % 2 ( ## % 2 3 ## % % #" % ( ( % " 3 %" % " 3 2 "" " ! " " ' 3 "2 2 2 ( # % ## % 2 3 % % 1 % " "## % " % " " 3 " "## " "# ## "" ' " " "# " " # % " 1 3 " 3 * % $ ' " " % 1 % ( ( %" " " " %

3)* 2 +

3)*)(

'

$

' 3 ( " " #" "# % >3 3 ? 2 # " % " ' % %%" 3 2 # %" " % 3 13 " 2 . " 2 "# 2 " # %% %" ( 2 # " ## " % ( %" " " & 0 %" " % 2 # " > ( %" " ? " 6 " " " %%" ( " 9 " % 2 %" 2 % " 2 # " " " ' 2 # "# 2 #" " A % " % " ' "% % 2 9( 3 6 " % #" " " #" # " %" " " #" 3 " % " &# % "" " " #" 2 6 " A " % 6 "% ( " 2 9( " ( 2 % " 3 ) " #" "# % " 2 " # 2 2 ( "" " ( " " % "" " ( 2 "

(37)

< K

Content Provider Server

WIB Phone

3. Once bill arrives it 's pushed to the user to be signed.

Wallet Server

2. Content provider sends a bill to the "bank".

4. Signed bill sent back 5. When the bill has been signed

the issuer is notified.

6. Requested information is pushed as a WML page once the content provider is

notified of payment.

1. User requests some information needed to pay for.

$ 31( & ' $ B ' ' ' ) ' " " % " " 4 #" " 2 " " %" "# " % " 3 " " " ( " " ( 2 "3 " " %" " % % 3 %" % " 3 " & ' 3 2 6 " " 7 % 2 2 ( % % #" "# % - 2 # " ( 6 # % 2 %" " %%" ( " % %" " # " ( " # "# 2 ) % %%" 3

# " ( O $0&0!F >$"2 0 2 % 2 & " &0!F

2 1 " 2 ? " " %%" 2 >$0&0!F? 2 % &F %" 13 % 2 ( 2 3 A 3 " 2 ;"3 " %" " "3 3 % 2 " 2 "Q; %" "# ## % " 2 ) " " #" %" " A ( #" % 3 % 2 " " 4 2 " " %" " # 9( - 2 " 3 "( 3 $0&0!F "# " " 2 6 # #" 2 - 3 % 1 " # %" " 2" 3 % 6 2 2 " %" " % " % " 0" #" " " 2 " 6 # "# 2 " ( 3 % " " A "3 3 " #" ' # % "" " 2 A &F 2 % " 3 "( 3

(38)

< 6 # "# 2 - ( %" "# ## 2 " 6 # " "3 3 % 2 " 2 19( 9" % % " 2 % 3" % % 2 #" " 3 3 #" " 2" 2 " "# 2

3)*)*

8'

$

' 2" * " "# "% % " " " 1 3 % % " #" 1 3" 6 # "# 2 13 %" % " 2 3 " 3 ) % " 2 3 5 & 5 !)0 $ " 2" E0'- G#" # 5 2 5 & " O 3" % " 13 % % % % 3 3" &! % &# 3" &! 3 % " 3 3 "# 2 #" "# ' % " % " " " 2 ( 0 ' " % "3 % % '" % " % " ( '8 %" % " " % % "# 6 > % A % ?1 $0&0!F " 2 % A % " %" % " " % 6 2 #" 2 % 0 % % " A % " " 2" "# %" % " " 2 " % " %" % " 3 " * %

& " " % "## 2 @0$ # / " 6 " & /6&

" " 1 5 & "## * % 2 ( ( " 2 " ( " % #" " ( K1 !)01 %1 " ( ("" % " ( ( "# " % 7 %" " " " # % # % 0&$ % # % % % 3 # % ( 2 % "# 0&$ % 9" % 2 % % # % % 2 # " $0&0!F ( " # % # % #" 0&$ % (" $0&0!F " % % 0&$ % O

3)*)3

"

"

' "

& 3" " 1 " " # "3 " %" " ( 3 %" # " #" % % " " %" " O %%" " " % 3 2 (( " ' " 2 3 2 2 " 2 " %" 2 " 2 " " * " % # " 2 3 ## %%" ' " 2 " 3 " 2" %" " 3 " 3 2 %" % " 2 3 " " ( % # % 12 3" 2 "

(39)

< " #" "# & "% 8" % " 2 3 ' %" % " 2 3 %" " O 3 2 " 3 " #" "# % " 1 % #"% "# " %" % " # " " " 2 8" % " 2 3 3 %" " %" 2 " 2 "# " " % 3 ( 00 1& 0 % " %" " #" % %" % " " & ; %" " 2 " "# 3 "# % " ( " "# 2 % 6 % "" 2 "

3)*)4

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

(40)

< - 2 2 # %" " #" " 5 & " # ' ' 2 2" #" #" % % " > " "# % # 2 A #" 5 & ?3 3 "% "( 2 ' " " % 2 9( " % "# 2 3 " " % ( 3 " " 2 " # " B C"# 5 & " 5 3 " " # " %" - " ( ( "# 0$ " 2 3 " % " 3 2 %" 2 # " %" Content Provider (Web server) Content provider Wallet (Web server) WIG server Communication between servers are done through a direct reference since they reside on the same web server.

Comunication over TCP between the Wallet and the WIG consists of bills that are pushed to the WIB phone and replies to those bills i.e. those bills that have been paid.

Security center used by wallet/ bank for encruption/decryption. Communication done over TCP.

WIB Phone

SM communication over GSM bill, password, analysis etc Communication over TCP between

the Content provider and the WIG server consists of stock analysis requests sent by the WIB phone and the analysis that are pushed back to the WIB phone once the issued bill has been paid.

$ 31* # ' ')

' " 3 " ## 9( "3

3

User interaction start application

SM from WIB to WEB server (Conent Provider)

Execution at Wallet and Content server

SM from WIG server to WIB phone

User interaction type password

SM from WIB to WEB server (Wallet)

Push bill to WIG server

Execution at Wallet and Content server

Push content to WIG server

SM from WIG server to WIB phone Transaction finished content at user Decryption of SM $ 313 > " % 8 ' ' ' C ' ) 9 " 3 " ## ( 2" !)0 * #" %" % " 2 3 5 &@ 5 & ' "# ## 3 " "3 I 3" ## % % " A % " 2" 0&$ % 1 " " ## I "# 5 $ ( " 5 & 3 (

(41)

< & #" "3 ( ( " 2 % " % 2 " " ' # & & '8 #" " 3 " " "# ## ( * % " "# "% "( 3 " "3 9( D ! " 2 % % % 2 " " 2 2 ( 0$ ( ( ( % " "( 3 % " A % " "# 0 % " ( % " A % " " " " 2 % ( ## % 2 3 ( * !)0 %" % " 2 3 3 5 & " User interaction start application

SM from WIB to WEB server (Conent Provider)

Execution at Wallet and Content server

SM from WIG server to WIB phone

User interaction type password

SM from WIB to WEB server (Wallet) Push bill to

WIG server

Execution at Wallet and Content server

Push content to WIG server

SM from WIG server to WIB phone Transaction finished content at user Decryption of SM $ 314 " & " ' $ .' ' DE " 'F ) ) 8 '# " " " ' ) 3! G- > > " $ 2" #" !)0 * % 3 " ( 2" "(( ( "# 3 "# # " %" ( " 2 % " 3 " * % " " " '" " 3 0$ 3 3 # 2 " % " 3 " 6 3 2 & 3 # " 3 2 " " 3 ( 3 3 2 ( " 5 &@ ( 3 " 3 ( 3 " " 9" 2" !)0 * % 3 " " $" %" 2 " # " 2 12 " " ( % " 3 " " "# " 0$ & 2 % 0$

(42)

< # 31( " " % 8 $ " $ 8 ' "" # & 2 + '2 ) # 31* " " % 8 $ " $ > "" # & 2 + '2 ) - ( " #" % " ( "# 0$ % 2 #" 2" * !)0% ' 2 ' 2 ' % " ( " " % ( % #" " 2 " % ' ( "# 0$ ( ( " " ( 3" " "# 0$08 > " 2 #" ( "# 0$?1 ## % 3" 1 % " 6 > " ?1 " ( ( % ## % 3" % " " " ' " ( % "# " #" % " 3 % " " % ( "# 2 " " * % ( 3 ( & " ("" " " % ( " 5 " ( % " ( %" " 2 3 !)0 % " % % % # % %" " " ( ( A 3" 3! / " " 0 -% " - ( $ * $ $ 0 ! " = % " D J J D K J D 5 & 0$ " 8" " K J K J 5 " "% ( >8" + ? D D D >5 ? K D J 0$ # " 5 " 5 & D K K JJ DK = % " 3" DK J J DDDJ 5 & 0$ " 5 K D KJ J 5 " "% ( > + 8" ? D J D D J ! % 0$ # " = JJ DD K K 8" >8" ? D 0$ # " 8" " " 5 & D JDJ J KD '" #" % " K K J D D J '" #" % " % " DDJ J D D D D D - H / " " 0 -% " - ( $ * $ $ 0 ! " = % " K JD J K K 5 & 0$ " 8" " JK JJ JJK 5 " "% ( >8" + ? J D >5 ? J D 0$ # " 5 " 5 & J KD K = % " 3" DJK D D D K J 5 & 0$ " 5 J K K K JK J D K 5 " "% ( > + 8" ? D D J 8" >8" ? 0$ # " 8" " " 5 & K KD JK KJ K '" #" % " K DD J D '" #" % " % " DKJ DD KKDK

(43)

<

Time Distribution Plain Text (Avg.)

User interaction start app.

WIB send SM to Content provider Whole processing (Content & Bank) Push Bill (Wallet server) SM from Wallet to WIB User interaction type in password

WIB send SM to Wallet server

Whole processing (Bank & Content)

Push Content (Content server) SM from Content provider to WIB $ 319 " ! # ' $ $ > "" ) 9 " 2" 9( 9( J % 2 ( %" 2 " " " * % " %" % " ( "# 0$ ' % " " %" 2 # % " " 12 " * % % 3 ( % " ( " (

(44)

< D

Time Distribution 3DES (Avg.)

User interaction start app.

WIB send SM to Content provider Whole processing (Content & Bank) Push Bill (Wallet server) SM from Wallet to WIB User interaction type in password

WIB send SM to Wallet server

Whole processing (Bank & Content)

Decrypt SM from User Push Content (Content server) SM from Content provider to WIB $ 31: " ! # ' $ $3! " " ) & ' 2 %" " 2 3 * !)0 % 1 3 #" 2 " I ( !)0 " * ( 6 " !)0A> * ?#" ( & " I % * # # 2" " 3 ( 2 "3 % " 4 ## % 2 3 " ( 3 " 2 ( #" "3 ( 2 % " !)0> * ?#" ( 1 " !)0% % " ( " " !)0% #

(45)

< # 313 " # & 3! ' > > " & 3! " E ' > ' " % # & ") " " 3! I- H F" !)0A * . ## % > ? -% " - ( $ - ( $ = % " 104 92 346 -611 5 & 0$ " 8" " 118 113 1227 872 5 " "% ( >8" + ? 115 100 5 0 D >5 ? 103 100 1 0 0$ # " 5 " 5 & 91 98 -1437 -381 J = % " 3" 101 90 57 -481 K 5 & 0$ " 5 194 193 6196 5889 5 " "% ( > + 8" ? 906 1028 361 371 8" >8" ? 68 65 -11 -11 0$ # " 8" " " 5 & 102 111 176 881 '" #" % " 113 109 6623 4367 '" #" % " % " 116 116 6220 6147

Total time without user interaction

0 10000 20000 30000 40000 50000 60000 0 2 4 6 8 10 12 Measurement number x T im e ( m s ) 3DES Plain Text $ 31< > " % 8 > " & " " ' 9 " 9( K % 2 !)0 " ( 2 "% % &# 4 "" ( " " " 9( # "" 2 (( %" 2 " !)0% % " "# % ( # " 5 & 1 % * % " 2 %" " " " ( * % "" ( %" 2 " 9( "" 2 (( %" 2 " ( "# # 0$ # " 5 & > " "# % " ?1 0$ " 5 & > ( "# %" " 5 & ? ( "# % 0$ # " 5 & " 3 ' " ## % 2 3 0$ 3" % 3 %"

(46)

< J " " 0$ " ## % " 0$ ## =. 1 3 % D 2 " ( - # 2 ( " ## % 12 * " %" "# * # % ## % #" 2" % ## % "# ( "# % 0$ # " 5 & " 3 2 %" " 2 * 3 % ( 3 " J %" " ( " % " & % 2 % "# 0$ 1 " ( #" 2 !)0 (

Increase in execution time with 3DES (Avg.)

User interaction start app.

WIB send SM to Content provider Whole processing (Content & Bank) Push Bill (Wallet server) SM from Wallet to WIB User interaction type in password

WIB send SM to Wallet server

Whole processing (Bank & Content)

Push Content (Content server)

SM from Content provider to WIB

$ 31?) > " & 3! ) ) & $

(47)

< K

Real time difference between 3DES and Plain Text

-2000 -1000 0 1000 2000 3000 4000 5000 6000 7000 8000 1 3 5 7 9 11 Measurement T im e ( m s ) Average Median $ 31@) ' > " # & 3! ' > ) # 313 & " " ' "# ' ) " 3! % " 8" " ' $ ) - * % 3 " ( ## % 2 3 * !)0 % 3 "" ( #" " * % " 3 % " " 1 % "" " JR " ( " % " " "* J %" " ( ' " 2 #" " 3 2 (( %" 2 " !)0% 3 (" ( " 2 %" % " 3 % % 3 %" % 3 ( %" 2 " 12 3 % " ( %" 2 " ( "# % ( # " 5 & ( ' 8 G' 8 " ' # #" 3 " " # " % " 3 " ( % " " 0&$ % & 3 " 2 # % ( " ( % %" 2 " % & 3 %" % " A % " 3 # " " 2 2 " %" % % " 3 " " % " 3 2 " % % #" ( % " % "# % % " 3" 0$ %" 2 # " 5 & % % %" " 2 ' 3 " % " # " " 2 " " 2 1 " " "# % 2 " % " A % " #" ( ( I # & 3 " 2 " ( " "# # " " " %" % % " 0" % " 3 " 4 #" % " " 2 % 3 (" ( " 2 " " % %

(48)

< # 314 " 8 G' 8 " '. & 9 " " " ' E ) ' 8 / " " 0 - " " % - ( $ * $ $ 0 ! " 2 K JD 2 JD K J 2 K D

SIM Card Encryption

0 50 100 150 200 250 0 50 100 150 200 Bytes to encrypt T im e ( m s ) Average Max Min $ 31(6 " 8 ' ' "# #8 ) 5 "" ( #" % " " 0&$ % "" % % " 3 " ## % # * % " % ( "# I " % - % 2 2" 9( ' 2 D " % 3 " " % 12 % " 3 2 %" " 3 %" % " ! " " "3 % 0&$ % 2 " % 3 2 " ( " ( % 2 8 G' 8 " ) % " A % " " 3 " ( 0 ' " % % 0 % 8 13 % %" % 3 3 " '8 %" % " ' %" % " 3 3 "" #" ( "# % " A % " 6 3 2 % ' 3 % 3 " "# 2 ' 3 " ( J 2 3 " " ( J 2 2 " 5 & %" " 3 " "%% " " %" " E5 -@ G#" # ( ( "

(49)

< # 319 " 8 G' 8 " 8 " " ' 8) 8 / " " 0 -% " - ( $ * $ $ 0 ! " % " 2 % " 2 K J K KJ J % " 2 JDK K K JK % " 2 J JJ J J % " JD 2 K K % " JD 2 K J KD KJ % " 2 D D % " 2 % " J 2 K K JD % " J 2 J K 0 %" % " D

Encryption Security Center

0 200 400 600 800 1000 1200 1400 0 50 100 150 200 250 300 Bytes to encrypt T im e ( m s ) Average Max Min $ 31(( " 8 ' & 8 "# #8 ) - % 2 # " ' 2 K % " A % " "# " > % ( %" % " ?%" 2 * % ( "# " "# " % % 9 " 9( % 2 % " %" 3 " "# " % 3 %" % " "# 0&$ % 2 " 5 " " ( " " % 3 ( " "# " % A % & ' 2 % 2 %" % " %" 2 " " #" % " A % " 3 " " 0" "" " ## % " ( % " A % " " " % * % " 3 2 " " %" ( "# I " % 1 % ## % 2 3 % (A % ( 2 %" " J ( % 2

(50)

<D - " " '" ( ## % " I "# ( " 2" 5 &@ 3 " 3 " 5 & " %" "# 3 " #" ( I J 2 3 1 % " 5 & 0&$ % 2 " 2 0$ % % ( " 2 ! " E5 -@ G ' ( ( "% 5 $ ( "# D 2 2 3 % ( #" " " 2 %" 3 % " " 2 # 31: " "" ) ) "" # & 2 ' ' & ) "# ' ' "# " " ) " "" & 2 ' $ / " " 0 - ( $ * $ $ 0 ! " 2 , >? D 2 # , >? D 2 , >? 2 # , >? D J J 2 , >? J J 2 # , >? J K ' " "# 2 " ' 2 J I "# 5 $ ( 1 % ( #" " 2 %" 5 &@ % 2 "#

2 " 5 & % " 5 &@ 5 & 3

## "%% " #" ## % 2 "# ! ( 3 %" 0&$ % %" " 2 "# " 0$ 1" # 3 3 " 2 " " % * " % 1 % ( " %" "# " 2 $ "# " 5 $ ( 3 " 3 " 5 & " 2 ( 2 ( ( "# " 5 &@ 3 ( 3 "

# 31< " $ & & 8 2 + ) " " &

" ' $ E ) "# #8 & $ E ' " #8 ' 2 ) " 2 $ & & 8 / " " 0 5 $ IA2 - ( $ * $ $ 0 ! " J A 2 K J K KK J A 2 K JK D A 2 D KK J K K D K D

(51)

<D

Time to push a WML page to the WIB phone

0 5000 10000 15000 20000 25000 30000 0 100 200 300 400

WML page size (bytes)

T im e ( m s ) Average Max Min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

(52)

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

3)*)9

"" 8

5 %" " %" " 2 3 ( !)0 * 6 % % * % 2 3 ( !)0 ' % " J R " J %" #" !)0% %" 2 4 # 2 ( ( "# % ' % %" # " 3 % 3" " " J %" " ( ( 3" * ' % %" # " ( "# " 0$ ' "# " # % " % I "3 , ) % " 0&$ % % " 3 " "# " % 12 % ( % 2 %" " " * % " 1 % " "3 % 0&$ % " 2 " 5 % " % " A % " " " " %" 3 4 % 3 I 3 %

(53)

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

References

Related documents

Therefore, the objective of this paper is to contribute to the literature on equity market integration through examining a relationship between the leading stock

Utif rån detta har vi kommit f ram till hur k onku r ren smed len ve rka r va ra utf ormade i den nya ekon omin.. Detta samma nf attas avs lut nings vis i en eg en

Faktorer som förhindrade att fysisk aktivitet hade effekt på depressiva symtom kunde vara brist på uppmuntran, att bli avskräckt från träning och att ha för hög förväntan

Internet : www.bth.se Phone : +46 455 38 50 00.. Stock market prediction is an active yet challenging research area. A lot of effort has been put in by both academia

While there are many promising forecasting methods to predict stock market movements based on numeric time series data, the number of predicting methods

[r]

Concept space The concept space dialog is a simple dialog which lets the user output the document concept vectors (for vector space models) and probability distributions (for

Astrid Hilbert, Linnaeus University Bernt Øksendal, University of Oslo Ghazi Shukur, Linnaeus University Haidar Al-Talibi, Linnaeus