1 / 9

JVM Tehnologic

JVM Tehnologic. Company profile & core business Founded: February 1992; Core business: design and implementation of large software applications mainly for financial market. Areas of specializations Platforms: Windows (95, NT, 2000,2003);

burtd
Download Presentation

JVM Tehnologic

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. JVM Tehnologic • Company profile & core business • Founded: February 1992; • Core business: design and implementation of large software applications mainly for financial market. • Areas of specializations • Platforms: Windows (95, NT, 2000,2003); • Technical expertise: MSSQL Server, Sybase, Oracle, C, C++, Visual C++/Basic/C#, MS Interdev, ASP, IIS, BC++, Delphi. • Microsoft business partner (product integration partnership member) • Compaq/HP business partner

  2. System Security • The most advanced security systems used nowadays : Public Key Infrastructure • SSL 3; • RSA public keys modulo 1024 bits; • Sha1 algorithm for thumbprint; • Digital Certificates (with time stamp); • Dynamic key exchange; • 128 bits – Cipher Strength; • Client and Bank authentification … so we know with whom we talk and you also … • Network protocol separation; • SQL Protection steps

  3. BusinessLogic DataLogic Web based forms Data Stores The Concept ofThree - Tier Architecture Used by our Internet Service • Benefits • Common interface to heterogeneous data stores; • Software and hardware scalability without affecting system performance; • System reliability and maintainability; • Increased data security; • Business logic sharing. Application Server

  4. Internet Banking Architecture Web Servers SQL Servers BackOffice Database BackOffice Application Browser Customer databases : : Clients Bank’s Database

  5. Data flow • One information unit named “electronic message”; • flexible structure with <field-value> pairs; • easy and fast transfer; • Two-phase data transfer; • Import of incoming messages from customer database; • Export of outgoing messages from bank’s database system; • Flow control and monitoring done by BackOffice application.

  6. request URL SQL query Web page Query results Presentation layer Browser Web Server Customer database • Only an Internet browser is required; • Enhanced security mechanism through Secured Socket Layer protocol; • Dynamic Web pages through DHTML and ASP technology; • Full customization.

  7. Business layer Customer side BackOffice Application Bank Side • Provides services to the presentation and data layers • Bi-directional transfer of electronic messages; • Deployment of basic banking information to customer database; • Customer registration and access control; • Enforces customer business rules • Data checking and validation; • Signature mechanism for customer operations; • Enforces bank business rules • Data checking and validation; • Acceptance mechanism for customer transactions; • Translate transaction data to and from specific formats.

  8. Electronic Message Processing Logic • Chain of states to control message evolution • Uncompleted: not successfully transferred; • Unprocessed: completely imported; • Refused by user : rejected by authorized bank personnel; • Accepted: accepted by authorized bank personnel; • Refused by app : not successfully processed; • Transferred : successfully processed; • Special authorized mechanism to change manually message status; • Configurable mask of valid states for a message.

  9. Internet Banking Conclusions • Full access to bank services with minimum hardware and software configuration for customer; • Total location independence for the customers; • Maximum security through access control, encryption and authentication; • Customizable application core; • Customizable user interface through Web power.

More Related