Java Magazine, May/June 2019
ORACLE COM JAVAMAGAZINE MAY JUNE 2019 64 java card An EventSource that represents any peripheral or I O interface in the device host or the secure element itself Sources of events could be for example a GPIO pin or port a UART interface memory mapped I O an I2C bus a watchdog timer and so on An EventListener that enables code to handle peripheral or I O events coming from a given source The specification provides the default base interface which is extended by platform implementers An EventRegistry which is a class used by applications to register listeners with a source of events The javacardx framework nio package contains classes for parsing and extracting structured information from raw data in an eficient way These classes enable access to those data items from the heap and also from external memory such as from a peripheral Numerous use cases can benefit from this I O framework For example a Java Card application can directly read and verify fingerprint data from a biometric sensor There is no need to go through the host device to transfer data from the biometric sensor to the main processor of the secure element nor is there a need to tunnel data into application protocol data unit APDU commands to overcome associated constraints such as bandwidth timing ordering priorities execution context and so on In IoT solutions the enforcement of security policies can benefit from access to device peripherals and from collection of their data for decision making at the edge For example the secure element application in a smart meter could use localization or a motion sensor to detect abnormal situations and react accordingly The application could also be used to securely configure attached peripherals and ensure the integrity of the control plane Security Services Security services in Java Card 31 include the Certificate API the Key Derivation API the Monotonic Counter API and the System Time API Lets look at these in more detail Certificate API Cryptographic certificates are critical for security and serve as a basis in a public key infrastructure PKI to establish trust between diferent entities A notable example of a
You must have JavaScript enabled to view digital editions.