The release of the Java Card 3.1 specification has helped to simplify the implementation of Trusted Peripheral use cases and will enable trust and the exchange of sensitive data at the very edge.
Find out how Java Card secures the “last yard” between devices and attached peripherals
In a world of connected or even autonomously driving cars, privacy, integrity and confidentiality of the data exchanged must be paramount.
Find out how Java Card based solutions can help to protect and manage the identities of vehicles
Find out how Java Card provides the perfect environment to securely store credentials
IoT device manufacturers deploy embedded SIM (eSIM) modules for consumer and M2M use cases to provide a reliable, robust and trusted access to the IoT ecosystem.
The Security Functions (SF) introduced in this section realize the SFRs of the TOE. See Table 8.1 for list of all Security Functions. Each SF consists of components spread over several TOE components to provide a security functionality and fulfill SFRs