SlideShare a Scribd company logo
1 of 4
Download to read offline
White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution
1
BLE PKI token for Wireless Digital Signature
White Paper
Contents
Executive Summary..................................................................................................................... 1
Challenges ................................................................................................................................... 2
Longmai Solution..................................................................................................................... 2
Why Digital Signature?............................................................................................................ 2
The typical usage includes:...................................................................................................... 3
About Century Longmai............................................................................................................... 4
Executive Summary
For the past two decades, technology has been growing so fast that life has become so much
easier hence business and operation are getting more effective and efficient.
Mobility has changed the way employees interact with their tools. Rather than using the
desktop PC to do everything, workers now have the option of doing portions of their work on
different devices, using the best device for the current task. A worker can get an email
notification on a smartphone, dash off a quick reply on a tablet, gather more facts via some
phone calls from the car, and then author a detailed document — with supporting spreadsheets
— once back at the office via a desktop PC. To certify the authenticity of any document,
handwritten signature must be applied to the document by printing it out. This practice is not
even environmental friendly and is old fashioned – there still exist redundancy in document
authentication procedures.
White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution
2
Challenges
The explosive growth in mobility, social media and cloud computing presents the enterprise
with enormous opportunities and challenges
1. Despite the security policies, procedures, and tools currently in place, employees
around the world put corporate and personal data at risk by engaging in risky
behaviors:
• Unauthorized application use.
• Misuse of corporate computers.
• Unauthorized physical and network access.
• Remote worker security.
• Misuse of passwords.
2. Many organizations use two-factor authentication to protect against intrusion by
illegitimate users. While OTP tokens, USB tokens and smart cards have long been
the de-facto standard for two-factor authentication, these technologies are not
fit for BYOD and Mobility, instead present challenges:
• Device loss
• Usability: users have to type long passwords and OTP codes every time
they time out
• Session security: when a tablet is left behind, anybody can access it
before it times out
Longmai Solution
Strengthening Authentication without Impacting User Experience
To reduce data leakage, businesses must integrate security into the corporate culture and
consistently evaluate the risks of every interaction with networks, devices, applications, data,
and of course, other users.
The certificate based Longmai mToken BLE solution solves all Mobility and security challenges
enabling users to secure virtual communications and transactions with advanced digital
signature and data encryption features.
Why Digital Signature?
Everyone knows handwritten signature was never safe because it is easily forged and there have
been so many fraud cases of forged signature. There are just no absolute method to verify
handwritten signature making it not capable to be non-repudiation and impossible to protect
White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution
3
the content which is a very serious threat not just to businesses but also individuals.
Digital signature is the most ideal solution to counter all the weakness and fraud concern of
handwritten signature.
Definition - Digital Signature is an electronic signature or binary or digital code attach to an
electronic transmit message or document to authenticates and executes a document and
identifies the signatory. In addition digital signature ensures no changes are applied after the
signature has been signed.
Century Longmai developed mToken BLE ecosystem portfolio of products strongly backed by
deep security and cryptography research and development, to provide reliable, versatile and
standard compliant solution.
The ecosystem consists of wireless bio-communication (supporting Bluetooth and USB)
smartcard chip based tokens specifically designed to meet users’ growing mobility and privacy
demands. Meanwhile it works with cross-platform operating systems, multi-vendor mobile
terminals and custom designed client software to provide secure connection to offline and
network based resources.
The typical usage includes:
- Network logon
- Computer access control
- Data protection
- Logical Access control (LAC)
- Trusted document exchange
- Secure Internet and remote access
- e-Commerce and online banking
Additional Resources - Bluetooth Low Energy in Wireless PKI deployments
White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution
4
About Century Longmai
Founded in 2003, Century Longmai Technology Co., Ltd is one of the most leading digital security
device manufacturers with over market occupation over 30 countries. Following the rapid
development of Internet and mobile devices, more than ever industries, enterprises and
government want fulfill their end-users dream of living a better, safe and enjoyable lifestyle
anytime anywhere.
Address
Century Longmai Technology Co., Ltd
3F, GongKong Building, No.1 WangZhuang Rd, Haidian District, Beijing, P.R China
Postcode: 100083
Telephone: (86) 10-62323636 Fax: (86) 10-62313636
Global Sales email Address: info@longmai.net
Website: http://lm-infosec.com

More Related Content

Viewers also liked

Bluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyBluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyLin Steven
 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsDavy Jacops
 
Versailles, Paris - Chateau
Versailles, Paris - ChateauVersailles, Paris - Chateau
Versailles, Paris - ChateauJerry Daperro
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
BTLE (Bluetooth Low Energy) and CoreBluetooth
BTLE (Bluetooth Low Energy) and CoreBluetooth BTLE (Bluetooth Low Energy) and CoreBluetooth
BTLE (Bluetooth Low Energy) and CoreBluetooth Zach Dennis
 
Introduction to Bluetooth Low Energy
Introduction to Bluetooth Low EnergyIntroduction to Bluetooth Low Energy
Introduction to Bluetooth Low Energyyeokm1
 

Viewers also liked (6)

Bluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyBluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technology
 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internals
 
Versailles, Paris - Chateau
Versailles, Paris - ChateauVersailles, Paris - Chateau
Versailles, Paris - Chateau
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
BTLE (Bluetooth Low Energy) and CoreBluetooth
BTLE (Bluetooth Low Energy) and CoreBluetooth BTLE (Bluetooth Low Energy) and CoreBluetooth
BTLE (Bluetooth Low Energy) and CoreBluetooth
 
Introduction to Bluetooth Low Energy
Introduction to Bluetooth Low EnergyIntroduction to Bluetooth Low Energy
Introduction to Bluetooth Low Energy
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

BLE PKI token for Wireless Digital Signature: A Game Changer for Mobility and Authentication

  • 1. White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution 1 BLE PKI token for Wireless Digital Signature White Paper Contents Executive Summary..................................................................................................................... 1 Challenges ................................................................................................................................... 2 Longmai Solution..................................................................................................................... 2 Why Digital Signature?............................................................................................................ 2 The typical usage includes:...................................................................................................... 3 About Century Longmai............................................................................................................... 4 Executive Summary For the past two decades, technology has been growing so fast that life has become so much easier hence business and operation are getting more effective and efficient. Mobility has changed the way employees interact with their tools. Rather than using the desktop PC to do everything, workers now have the option of doing portions of their work on different devices, using the best device for the current task. A worker can get an email notification on a smartphone, dash off a quick reply on a tablet, gather more facts via some phone calls from the car, and then author a detailed document — with supporting spreadsheets — once back at the office via a desktop PC. To certify the authenticity of any document, handwritten signature must be applied to the document by printing it out. This practice is not even environmental friendly and is old fashioned – there still exist redundancy in document authentication procedures.
  • 2. White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution 2 Challenges The explosive growth in mobility, social media and cloud computing presents the enterprise with enormous opportunities and challenges 1. Despite the security policies, procedures, and tools currently in place, employees around the world put corporate and personal data at risk by engaging in risky behaviors: • Unauthorized application use. • Misuse of corporate computers. • Unauthorized physical and network access. • Remote worker security. • Misuse of passwords. 2. Many organizations use two-factor authentication to protect against intrusion by illegitimate users. While OTP tokens, USB tokens and smart cards have long been the de-facto standard for two-factor authentication, these technologies are not fit for BYOD and Mobility, instead present challenges: • Device loss • Usability: users have to type long passwords and OTP codes every time they time out • Session security: when a tablet is left behind, anybody can access it before it times out Longmai Solution Strengthening Authentication without Impacting User Experience To reduce data leakage, businesses must integrate security into the corporate culture and consistently evaluate the risks of every interaction with networks, devices, applications, data, and of course, other users. The certificate based Longmai mToken BLE solution solves all Mobility and security challenges enabling users to secure virtual communications and transactions with advanced digital signature and data encryption features. Why Digital Signature? Everyone knows handwritten signature was never safe because it is easily forged and there have been so many fraud cases of forged signature. There are just no absolute method to verify handwritten signature making it not capable to be non-repudiation and impossible to protect
  • 3. White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution 3 the content which is a very serious threat not just to businesses but also individuals. Digital signature is the most ideal solution to counter all the weakness and fraud concern of handwritten signature. Definition - Digital Signature is an electronic signature or binary or digital code attach to an electronic transmit message or document to authenticates and executes a document and identifies the signatory. In addition digital signature ensures no changes are applied after the signature has been signed. Century Longmai developed mToken BLE ecosystem portfolio of products strongly backed by deep security and cryptography research and development, to provide reliable, versatile and standard compliant solution. The ecosystem consists of wireless bio-communication (supporting Bluetooth and USB) smartcard chip based tokens specifically designed to meet users’ growing mobility and privacy demands. Meanwhile it works with cross-platform operating systems, multi-vendor mobile terminals and custom designed client software to provide secure connection to offline and network based resources. The typical usage includes: - Network logon - Computer access control - Data protection - Logical Access control (LAC) - Trusted document exchange - Secure Internet and remote access - e-Commerce and online banking Additional Resources - Bluetooth Low Energy in Wireless PKI deployments
  • 4. White Paper - Century Longmai Breaks News Grounds In Wireless PKI Evolution 4 About Century Longmai Founded in 2003, Century Longmai Technology Co., Ltd is one of the most leading digital security device manufacturers with over market occupation over 30 countries. Following the rapid development of Internet and mobile devices, more than ever industries, enterprises and government want fulfill their end-users dream of living a better, safe and enjoyable lifestyle anytime anywhere. Address Century Longmai Technology Co., Ltd 3F, GongKong Building, No.1 WangZhuang Rd, Haidian District, Beijing, P.R China Postcode: 100083 Telephone: (86) 10-62323636 Fax: (86) 10-62313636 Global Sales email Address: info@longmai.net Website: http://lm-infosec.com