You are on page 1of 325

ΜΥΣΤΙΚΟ ΟΠΛΟ ΡΑΔΙΕΝΕΡΓΣ ΑΚΤΙΝΟΒΟΛΙΕΣ 1

PANAGIOTIC LIAPIC

SECRET WEAPON
RADIATIONS

ATHENS 2010

ΜΥΘΙΣΤΟΡΗΜΑ ΑΠΥΘΜΕΝΗΣ ΠΡΑΓΜΑΤΙΚΟΤΗΤΑΣ

ΜΥΘΙΣΤΟΡΗΜΑ ΑΠΥΘΜΕΝΗΣ ΠΡΑΓΜΑΤΙΚΟΤΗΤΑΣ. ΔΕΝ ΠΩΛΕΙΤΑΙ. Η ΓΝΩΣΗ ΔΩΡΙΖΕΤΑΙ.


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 2
Novel of NON DEEP REALITY – FANTASY PRODUCT

With lots of love dedicated, to my parents, to EL_lines in Natalia, Olga,


Onder, and of course to my colleagues
                                                                                          By Price
                                                                              LIAPIS Panagiotis

With lots of love dedicated, to my parents, to EL_lines in Natalia, Olga,


Onder, and of course to my partners
                                                                                  By Price
                                                                          LIAPIS Panagiotis

При большом количестве посвященный, любви мои родители


        Греки, В Наталья, Οльга, и Ондер, к моим коллегам
                                                
                                                                    По цене
                                                      LIAPIS Panagiotis

Συγγραφέας ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ


Τίτλος
Δ/νση Κ.Βάρναλη 12, 15121 Πεύκη, Αθήνα
Τηλ. 210-6149149
Κιν. 6937097443
Ε-mail real_estate_liapis@yahoo.gr
ΔΙΑΘΕΣΗ 210.8065618 6937097443

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 3
Author LIAPIS Panagiotis
Title
Addr K. Varnali 12 15121 Pine Athens
Tel 210-6149149
Mob. 6937097443
E-mail real_estate_liapis@yahoo.gr
SUPPLY 210.8065618 6937097443

A few words from the author


My Friends in this textbook, take the
knowledge that until now store it in
dusty Greek manuscripts of Plato,
Aristotle and other ancient fotodoton
in damp basements monasteries and
private libraries disekatomyriouchon. We revealed through
masterfully blended events of economy, religion, Greek history
and mythology, the confirmations of Medicine and the
multidimensional social structures, the Greek discovery of
ether for which spoke Platonas and Aristotle, the mineral
krystalyka and electrical properties, their initiatory secret
caves, history, radiation and their effects on human health,
MIND CONTROL is the technical control of the mind legends
and myths, travel guides, the history of Russia and Mongolia,
Dynasty RURIC, the Greek supremacy, The Secret of the
Living Water, forecasts in recent days, the establishment of the
4th Reich, well read, and its organization, methods of
prevalence of the 4th Reich, Geostrategic, The Secrets of the
Parthenon, The stolen works of art, naturally leads business
survival in difficult times. There are missing from my literary
work of literature, prayer and research on photovoltaic
technology in whose threshold of energy is free. Also
presented a series of investigations on a series of error events
for the signs, and possible manipulation of cosmogony,
incidents involving the Nazis and the possible bases in space,
President Obama, and the new doctrine Panthriskeias
launched in conjunction with the Worship infernal beings are a
new mirror through which can be seen the current scene of the
enormous progress in the areas of MIND CONTROL, the chip
EMV of Bill Gates on bank credit cards, the emerging banking
system in relation to economic crashes of America The
SIONISMOS and the New World Order of the 4th Reich, and
PEOPLE CLONES - Men in Black, and the CIA in connection

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 4
with the anti-government slogans and reactive walls define a new reality, which
leads to control police forces in Use of Sound for centuries hidden weapons
ancient Greeks developed from the Greek National Nuclear epistimoina C.
Gkiolva. The creations of the Plan "Arrow" (sound rule) and the sound "Artemis",
as are sources on the web are presented in detail below in relation to biological
warfare aircraft from the US-spray from chemical and microbial air over cities.
Trying to minimize the harmful effects that using genetics Industry, extensive
fires, building new towns in the concentration camps of D Reich, apply
geostrategic implementation plan new war in the Balkans because of Kosovo,
where the project "Blue Ray" at the upcoming mayhem by the end of 01/2010 will
chrisimopoiithoun new weapons bass Police with physical effects of radiation on
the human organism KARKINOUS
                                                                                                          By Price
                                                                                   LIAPIS Panagiotis

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 5
CAUTION - SIGNIFICANT MARKINGS TO READER

1. This project is a bottomless MYTHISTORIMA Reality


2. Clarifies Developed Fiction
3. Any resemblance to actual persons, locations and events are
imaginary, purely accidental, not existing in the present reality and past it.

4. Copyrights on works protected by the current constitution, laws and


jurisprudence
5. Prohibited the reproduction and distribution of all or part of the
document without the prior written permission of the author and an award
identifying figures and in words of the author's remuneration, rights and
remuneration of the Greek state, the duration of the contract and the
parties.
6. The document bears a registered trademark
7. The project is only available for private use, prohibited the reading
public all or part of it.
8. The work donate to the library of the Greek state request and complied
with the legislation providing for the process.
9. For Greek citizens: To book not sold through bookstores and other
retail outlets. KNOWLEDGE donors.
10. The book takes seeker typing costs and expenses of this mission.
11. The Writer LIAPIS Panagiotis receive no remuneration (money)
making a work available
12. The book has no subversive of the system concept, but instead Net
conglomerate of all the Greeks of Planet Earth, 120,000,000 Greeks to
create well-governed society as defined by the democratic, elected
Parliamentary Antiptosopous People (primary form of power)
13. The GREECE Fri all the problems exist because of the scandalous
EVNNOIA OF MARY. The Greeks GYIOS DEFKALIONOS OF, THE
LIGHT, AS NO ONE GREEK even no hope, no justice. Amen.

Copyright by Panagioti Liapi

THE BOOK IS NOT FOR SALE

I GIVE THE KNOWLEDGE FREE – NO COST

AT THE BEGINNING ON EARTH FROM TITHIS WAS ONLY TWO


AUTHENTIC RACES, GREEKS and DRACONIANS.
GREEKS HAVE THE MARK OF SUNNY SOUL IN THE
EYES
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 6
DRACONIANS HAVE THE MARK OF KNIFE IN THE BACK BUT
ONLY THE MEMBERS OF THE CIRCLE KNOWS THAT.

(From Dialogues of Diomidis with Alexander the Great )

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 7

Have you ever thought what accounts for the rapid deterioration of your
health; You rat, not the society that says the Communist Party, however,
but surely you do. Welcome to the nightmare of hidden
pragmatikotitas.Skeftikate what ever you are free to eftnomoumenig
democratic society, how many square meters ze'ite true; 100sq.m
apartment; Work 600; Come 1500 and put other places; Pass is all your
life in two acres of comfortable personal cell and die there; And everyone
else; Someone who will never see and die in his own ekainos
corresponding two acres or more with fewer amenities; And are they
really comforts or guards marksmen adeialeipta put on you; And what
these shooters; Those who worked hard to get close to ask you to name
a status symbol on the other prisoners, and eventually you normally
whipped until fall ikmada without power. Are your electrical appliances.
Did you ever go to any electrical appliances when we think that "die"
when not working?
• What happened to your old tileotasi; old microwave oven fly away; Your
first cell; The old your labtop;
Did you know ...
... Each device when the throw garbage charge save the environment
and our health in ways you never imagined?
Or that ...
- Each computer monitors are 1.36 to 3.6 pounds of lead and that lead
can cause damage to kidneys, liver, blood, dermatitis - allergies, damage
to lungs - permanent breathing problems and carcinogenesis. Leave
around your apartments snipers shoot you with their comfort and every
day to very accurately
- 22% of the mercury consumed each year worldwide is used in electrical
and electronic equipment. Mercury can be easily accumulated in living
organisms and into the food chain through fish. Causes chronic problems
and brain injuries.
- Asbestos found in electrical appliances (toaster, irons, electric coffee
maker) older technology - electric heaters and other heating devices, are
carcinogenic material, causing contamination of the gas horizon and a
strong toxicity when in contact with eyes - Skin Who came; Hello,
Eseis.Kalosirthate in your nightmare

Cities, Chambers of exhaust gases


Suspended particulate matter, benzene and ozone threatens the
inhabitants of large cities without breath at risk of becoming residents of
the basin of Athens due to air pollution, which shows the explosion of the
snail's pace at which the withdrawal goes old cars, daily traffic jams and
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 8
the large number of new vehicles coming into circulation. Mark with the
Fourth Reich bring much smarter than C. If there is no such thing; Of
course you were born to this, live each day, up by ar.prot. document the
final days of 1944, and indeed works very successfully as a Hitler to
exterminate the population had teratio oikonomko costs for both the
poleiki the machine and for srtratopeda concentration, now, see Chapter
urbanization, the inmates of the camps by erring the propaganda of the
media go in their own cities, working to sxklira apokltisoun all means kill
them every day and alienate socially. You start to see things from
another perspective and to feel uncomfortable; You're right, something
like this happens. The most recent incidents involving pollution in
particularly high concentrations of ozone and particulate matter, while
there is a problem with the carcinogen benzene as shown by
measurements of the National Observatory of Athens. More specifically,
on Tuesday evening from 17.00 to 20.00 exceeded the ozone
concentrations at Eleusis: Prices touched the 207 micrograms per cubic
meter of air exceeding the threshold of public awareness by 27
micrograms. Moreover, breaching the specific pollutant for long-term goal
of health identified in the New Smyrna (128), Maroussi (129) and Agia
Paraskevi (133).
On the same day the concentrations of particulate matter PM10 in
Patissia reached 79 micrograms and the average daily price in
accordance with European Directive should not exceed 50 micrograms
over 35 times a year. Feature is that in 2008 recorded in Aristotle
overshoot in the fine 163 days in Likovrisi 147 days, 124 days in
Maroussi, Koropi 45, 21 and in Thrakomakedones Agia Paraskevi 20.
Particularly Eleusis noted that while the average annual ozone levels
appeared stable at 44-48 micrograms from 2004 to 2007, last year
amounted to 64 micrograms. Other areas identified increase in average
annual ozone concentrations compared to 2007 is Liosia, Agia Paraskevi,
Likovrisi, Piraeus, New Smyrna and nbspThrakomakedones where there
are higher prices, according to official data of the Ministry. "I live in
Athens" Bravo!, Nice environment you choose, come and good soul!
"One of the air pollutants considered especially dangerous and which is
seriously the EU is benzene, which is one of the carcinogens linked to
leukemia. Comes from old technology cars that are damaged in the
catalysts due to congestion recorded high concentrations in many
districts of Athens, "says" new "Dr.. Michalis Petrakis, director of the
Institute for Environment and Sustainable Development National
Observatory of Athens.
How about you guys, my car is the pride and my future better than my
wife is one who kills Judah;
My friend and Judas kiss beautiful, yes to kill you and your children there
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 9
is no doubt about it
C then change it to get a new one.
My poor friend, you who afis4s the Sun Medio volodernei to the village,
the new that will get jeopardize your life on other banks for five years,
even when the pay back will have to buy new again. Vicious circle.
But this is slavery.
Am think, welcome lirthes the slave society of Athens today in the annual
report of the Division of Control of Atmospheric Pollution and Noise of the
Ministry in 2008 stating that "the limit established by the Directive on
benzene will take effect from 1/1/2010. Until then placed indicative limit
values per year, gradually reduced in order to achieve compliance with
new limits on 1/1/2010. It has exceeded the target limit value (7
micrograms) in 2008. Note that the only station in Athens which made
measurements of concentrations of benzene found in Patissia and,
according to the Ministry, the average annual value for 2008 amounted to
5.4 micrograms. Measurements of concentrations of benzene in the Redi
last year between July and September, "said Dr.. Petrakis and
supplements that these measurements using the DOAS special body of
the Institute of Environmental Research. The results of this record
showed that the average price of benzene in the Redi in the period of
measurements in up to 10 micrograms, the maximum value reached 21,
ie three times higher than the indicative limits for 2008. BENZENE
considered especially dangerous pollutant, is one of the carcinogens and
comes mainly from vehicles obsolete.
http://www.tanea.gr/default.asp?pid=2&artid=4522524&ct=1

Manager architectural design


"I create in my mind as the ideal, I want to touch, the picture of a beautiful
giraffe. Why has four legs rest on the earth. It flies to manage to absorb.
Sometimes it might look like is still some instability. But it stands firmly.
He has time to absorb the substance of the earth, the needs and realities,
be it mud or anthosparto the prairie, without razed by weight.
Furthermore, it has its head high in the sky. This is also its food, has no
need to bend. He looks away, has a vision, as we should have we, and
our food is more spiritual, more intangible. And finally, somewhere in
between has a heart. Why architecture without a heart I do not think it
can be. Alexander Tombazis stop global warming gathering against
waste incineration plant. What is this; In two words poisonous gases in
atmosfaithra you kill and cause cancers. Enjoy it. The company
"ILEKTOR" proceeds to build a plant burning waste at Thebes.
Mobilization on Tuesday organized by the party organization Thebes of
the Communist Party organized the gathering next Tuesday, July 21, the
party organization Thebes of the Communist Party's central square, on
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 10
the promoted construction waste incineration plant in the already
overcrowded area by a private company. In a region saddled with
hexavalent chromium, heavy metals, etc. is an ongoing crime, even
attempted to build a plant burning waste. Application for the Energy
Regulatory That company "ILEKTOR" subsidiary "Aktor" intends to
proceed with the construction of waste incineration plant, according to its
application to the Regulatory Authority for Energy (RAE). This confirms
the complaints of Thebes Party Organisation of the Communist Party,
and the relevant articles of the 'P' (6/6/2009 and 10/6/2009). Evolution,
which is in contrast to the claims of the company by letter (10/6/2009)
states: "We state categorically that our company does not intend to build
a waste incineration plant in the area of Thebes, let alone plans to build"
Factory Hazardous Waste Combustion. " Instead, our company intends
to create a unit of energy use of biomass residues that agricultural
production and raw secondary fuel-rich (more than 80%). "These fuels
contain no toxic substances, heavy metals and free from contaminants
and not have aggravating health products. However, these materials are
now burning with no protective measures in the fields or thrown out of
control in streams and other public areas, creating along with other
materials, contamination of groundwater and environmental damage in
the region.
From the time of Christ even the Zionist Jews had devised a plan to
throw off and destruction of the Roman Empire and then the subjugation
of the entire planet under Jewish kyriarchia.Kai This will be achieved by
the number 666 was applicable in each world to mark absolute
obedience to the commands of Zion and the expected king of the Jews is
the antichrist. Nowadays BAR CODE SYSTEM entered into every single
product. Strained these days to plan a little time for the system to invade,
and in our personal lives and even our bodies. Initially, the method of
linear numbering. Then a bug to track satellites. The incredible reason is
this: even if you get lost, we will save

Plot Microsoft: HealthVault + VeriMed =


Cancer;

Plot Microsoft: HealthVault + VeriMed =


Cancer;
H database of medical records to
HealthVault Microsoft, will be upgraded
to include VeriMed human-embedded
tags RFID, allowing physicians to have
direct and quick access to medical
records of the unconscious patient with a
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 11
quick scan of the arm.
The VeriMed consists of an RFID tag embedded in the human arm and
responds with a 16-digit identification code to the digital frequency of
134KHz. This code can be identified through the website VeriChip will
soon be able to be linked to medical records that are stored in the system
HealthVault from Microsoft.

Microchips-battery
The microchips require electricity to operate.
They are powered by battery life diminished
by them and made them virtually useless.
The team at MIT but has managed to create
microchip that works with the body heat. The
new construction is very low voltage and
battery can be recharged by the heat of the
body. Thus an implantable microchip will
have virtually unlimited operating time

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 12

Microchip and diseases


Companies that promote the use of
microchip accused of concealing a
'dark' elements for micro-construction.

It is said that the microchip can cause


cancer and other diseases. Already in
the 90s series X-Files dealt with this
issue. It would not have made such a
reference if there was no evidence on the
issue. Such lines as they are fiction, they
support the hypotheses in science. It is
natural that companies fail because this
could be harmed financially by the uproar
that broke out. Objected saying that this is
all Bogus, and that is a figment of
imagination of those involved with
"conspiracy theories".

Microchip and benefits


Proponents of the use of Microchip from people saying that there are
advantages:
1) Search lost children via satellite.
2) Monitoring of chronic patients. The chip transfers data such as
temperature, heartbeat, etc. in the patient's doctor.
3) The chip can play the role of identity cards for bill payments and
shopping. So it's not likely anyone to steal since they will carry with him
cards or money.
 
Microchip and disadvantages
Those who argue that the implantation of microchips in humans only
positive results may be there is a reply. Based on the rapid development
of a microtechnology chip could do the following imaginary (?) Things:
1) may indicate the position of a continuously monitored in order to ease
his movements. Thus violating privacy. 2) Make, through the stimulation
of nerves, electronic manipulation of the individual. There is already
technology that causes dizziness, headaches, hallucinations, panic
attacks, anxiety and many other psychological problems in healthy
people.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 13
 3) To cause physical health problems of deliberate interference with the
nervous system.

4) To cause health problems with the continuous emission of even low-


intensity electromagnetic radiation

The Fourth Reich

Secret report shows how the Nazis planned fourth Reich (7 November
1944) ... The EU paper is old and fragile typing while they are highly
visible and fading. But the U.S. secret service documents EW-128 Pa
has kept cold, almost from the time drawn up in November 1944. The
document, also known as the Red House and a detailed report on the
balance of the secret meeting at the Maison Rouge Hotel in Strasbourg
on 10 Avgoustou1944. There, the Nazis talked to an elite group of
German industrialists plan for Germany after the war, and the
(preparation of the Nazis) to return to power, and work for a strong
German Empire. In other words, the Fourth Reich

Repression THROUGH LAWS

London) Powerful governments and armed groups deliberately incite fear


to erode human rights and create an increasingly polarized and
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 14
dangerous world, said Amnesty International is presenting the 2007
Annual Report, the annual assessment of human rights throughout the
world. Today, after 2 years
nothing has changed

theory formulated in 1992, several days after the


marketing of Windows 3.1.
This is because I noticed that if someone wrote
the NYC using Wingdings, it would appear on the
screen of a skull, the star of David and a raised
fist with the thumb. The symbols are then
interpreted as approval to the murdered Jews living in New York.

Mind control and technology

Our brain, although extremely complex, it is still a "computer" that works


with electricity. If you speak to
a computer creating a short
circuit then the computer will
stop working correctly. With
the right technology can
produce micro-currents in the
"wiring" of brain synapses
leading to illusions as to the
part affected. This is to be
"heard" the voice of a god! Or
is uncontrollable panic, etc.
The technology developed
under a "non-lethal technology" which allows the handling "of the people
especially when they complain about things imposed on them by their
governments. The victims of the attack did not prove to have been
attacked with such technology. Of course demonstrations and protests

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 15
can be dissolved easily "without opening tip. A more straightforward Mind
control is the one caused by a government propaganda. With proper
manipulation of words and images can create a false idea of reality. So
people will not respond to an unpopular and perhaps the very welcome.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 16

Devices to record a lifetime

Within a decade we will have the opportunity, through a device


would have the matchbox size to store each transaction and our
word. It is a discovery of Roy Want, a former researcher of Intel,
and the name has been given is "valet". As stated Want: «The
storage capacity of computers increases al-matodos. By 2012 you
can have a device that you can tape recorder discussions
throughout your life.

Currently on a trip I made in the region of Attica Pine visiting banks


seeking to issue a credit card WITHOUT THE EMV CHIP defpirxe
not a one that tells me everywhere as a guide and decision of
VISA and axairetos applied everywhere without distinction
ILLEGALLY one that

KATASTRATIGONTAS already signed contract EKDOSEOS


CARD

Ratifies THE OLD CARDS IN ALL THE GREEK Territory

ADOPT NEW BOARD OF Corey to record Personnel YOUR


DATA

NOT YOUR OPTIONS FOR inform or grant MANUAL OF USE

The preliminary NEW CARD WITH THE TECHNOLOGY IS NOT


EMV SYMORFOSI TO STATE LAW
 
The "valet"-SPY will consist of a storage unit of high capacity,
which has a powerful processor. It will also have wireless
communication devices and can even be plugged into any PC or
mobile phone. As for the space it occupies is very small and could,
for example, the whole device has the appearance and size clock.
Apart from recording capabilities, this amazing device can inform
the holder about things that interest him, as commodity prices,
equities, various services and news, and even be able to print to
wireless printers.
However, something of concern is whether its use will ensure the

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 17
confidentiality of personal data of the holder. This is because in a
lawful manner that would require any authorities to examine the
data containing the device, on the pretext of resolving a legal
dispute, in solving a crime or anything else.
The devices will be delivered to market in the coming years, said
Want: «I would have felt surprised if you do not see these devices
in stores over the next five years.
Most customers use a credit card for payment of the value of
products purchased. The card is but one secret to fiendishness
brown stripe on the back. Can be written there 5Mv or 100,000
words that the whole volume. This will tell progress but
What We write the magnetic MY BOOK 1.3 x 7.6;
WHO WILL BE A WRITER;
And the hours are still flowing to the cardholder to pay a large part
of the value of each product in each transaction, roughly 20% of
the issuer of Visa MasterCard American Express, and information
on sysorefontai brown tape - disk.
you capture the image;
WHAT IS THE NEW MONEY SYSTEM;
They have money, we have the system, with good; Spoof first
grade. Another striving, and other benefits from a sweat about it. I
will continue to write books with the machines of the enemy until
they blow them and causing increasing damage to their classes.
Knowledge is not imprisoned. Instead have the privilege, after an
initial number of people who must be taught, creating a "critical
mass" as they say in physics and starts the automatic distribution
without the slightest attempt to conveying it. The true always adds
a little extra lie. If you fight the rise and ignore the damage your
systems. If you fight the rise and ignore cancer leading to a slow
death you. Irreversible.
We are all registered as numbers in computers and automated
teller machines, vending machines operate 24 hours anywhere in
our service and filing. I almost escaped, the new system will
operate without cash and undocumented, come to prove anything.

Even today we impose conditions, have the right to withdraw a


certain amount at a certain time. But when we do not deposit
above the roof. LAMOGIA. My friends suddenly closed for a week
of your accounts to show the faces of the bankers to stretch carpet
to the press. The Government, on the other side has withdrawn its
high-value banknotes and withdraw gradually becoming smaller.
Do not kill the mosquitoes, others drink your blood
"The diplomas copies ktontai"
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 18
(On the wall near Gizi)
"The best school that illuminates what is burning"
(4th Lyceum, Kalamata)
"Christ taught and died. Teachers what they expect? "
(NTUA, Athens)
"Lifestyle is the magic of zero makes number"
(Gazi, Athens)
"Keep Athens clean. Throw your garbage in Piraeus "
(Metaxourgio Athens)
"Participate, participate, participate, participate, participate,
decide"
(Sinope Street, Athens)
"Those who think they know everything, irritate us who
know"
(Alexandras Avenue, Athens)
"If mistakes teach, then I have great literacy
(Street Benaki, Athens) "The walls have ears and ears
walls"
(Psirri, Athens)
"Do not expect everything from the Police. Hit yourself "
(Papasotiriou, Stournara Street, Athens)

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 19

“ The country is destroyed by indifference, but what I care about


me? "
(Hill Strefi Athens)
20.000 conditioners - cancers with 35% subsidy and signing
Hatzidakis

* They have already sold 25,500 devices (16,650 at Athens) and the
adoption of new funds from K. Hatzidakis offered a "breath" in the
business and additional opportunities for consumers Column Chris
conditioners 20.000 Other new technology will have the opportunity
to get consumers Attica 35% subsidy given by the Ministry of
Development. The Minister Hatzidakis decision approved the
allocation of additional funds 5 million to cover most needs people
to replace old air conditioners with new appliances. "I change the C
goes very well," noted Mr. Hatzidakis announced the decision to
allocate more money. According to available data (through 17 June)
the agency administering the program have so far sold 25,500 air
conditioners nationwide, including 16,650 in Athens. In the eight
poorest regions (Thessaly, Crete, Epirus, Eastern Macedonia and
Thrace, North Aegean, Crete, Western Greece and the Peloponnese)
4618 devices sold in Central Macedonia, 2825, in St. Greece 1008, in
N. 297 Aegean Macedonia and D. 102. With the approval of
additional funds being offered a "breath" on the industry, and
additional opportunities for consumers who want to change their
old air conditioners advantage of the subsidy of 35%. Note that the
initial program's budget totaled 15 million, of which around at 5 to
5.5 million related to Attica. 80.000 In addition, before granting an
additional 5 million, estimates wanted to replace a total of 55,000 to
60,000 devices. So now the number climbs to 75,000 to 80,000.
option to allocate more money in Athens was because of increased
demand. Consumers across the benefit of the subsidy will be (35%
of the price and not more than 500 million) hitting the market air
inverter technology and energy-saving class from 31 to 140 per
year. Note that every citizen has the right to withdraw a grant of up
to two air conditioners and the necessary documents for
participation in the production of identity card and a copy of a
recent electricity bill. The consumer can choose and buy a new air
conditioner if it is:
* DC Inverter Power Class A / A for devices up to 16000 BTU.
* DC Inverter Power Class A / A A / B B / A B / B devices over 16000
BTU
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 20
But you know that freon containing carcinogenic. What happens
when you start diarrhea; And let you will not, or will you sleep;;
Many substances such as strong detergents, oils, pesticides, etc.
are directly toxic to several species and many of them causing
serious damage to ecosystems, contaminating air, water or soil.
Division of these substances are heavy metals (mercury, lead,
cadmium, etc.) and organic compounds (such as pesticides) that do
not biodegrade, but transferred through the food chain and
accumulate in higher consumer who belongs to the man. This
accumulation causes many problems as thin shells on the eggs of
birds, poisoning and even death in humans, etc. This phenomenon
is called bioaccumulation. But the phenomenon is on the rise in
recent years, reducing the amount of stratospheric ozone, is
directly related to household substances. Various sprays and
liquids in refrigerators and air conditioners contain freon, which
predominantly involved in this phenomenon. The reduction of the
ozone layer causes the increase of harmful ultraviolet radiation
reaching the earth and this is devastating for many single-cell
organisms and leads to increased incidents of skin cancers and eye
cataracts in humans.

Microwave

Microwave oven careful when you cook or reheat meat, poultry,


eggs and fish! Often the microwave does not heat up evenly,
leaving some places completely cold or uncooked, which can create
dangerous microbes.
MIPOS CAUSES CANCER?
● Do not stand for long periods in front of the bakery at the time of
operation. Hold a distance of about 0.5-1 m from him when you put
the running.
● children and women during pregnancy, contrary to what is often
heard, there appears to be most at risk from exposure in front of the
microwave. Applicable here is keeping a safe distance from the
oven (0.5-1 meters).

● previously there were fears that the microwaves could cause


interference to electric pacemakers used by people with heart
disease. In these pacemakers are suffering "electromagnetic
compatibility", due to the effects of minor leakage of
electromagnetic radiation from the microwave while the children are
able to manipulate microwave ovens from the age of 7 years, do not
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 21
let anything without supervision an adult. It is preferable not to earn
themselves the pan from the oven, to prevent minor mishaps from
egkafmata.NA REMEMBER THAT ... ... The noise continues to make
the microwave when the door opens does not mean that
microwaves produced. When you put off the stove, oven stops
producing the sound due to the fan. .www.fda.gov / cdrh / consumer
/ microwave.html. www.medlook.net. www.prevention.com
Now on to heat, be careful that you destroy heavily vitamins and
nutrients in foods. Finally, it is clear that foods that are heated in a
regular oven has been slightly better sense of what has been heated
in a microwave so what to do;
Eating a well-warmed garbage in best;
Morea U.S. WHAT you say, what about for the following
Microwave

How do you say;


It is safe;
And the microwave ovens.
1. Take any one microwave.
2. Be careful not to plug it in and has power
3. Open the door and put through a mobile service shall
4. Close and lock the oven door
5. Call your cell phone you have in
IF I have heard it ringing, radio waves coming into the OVEN
Think how much radiation comes out when CARCINOGENS OPEN!
Are mobile increases the risk of brain cancer?
Yes, recent studies have raised concerns that long-term exposure
to electromagnetic fields (ELF) from mobile phones may increase
the risk for cancer in the brain and other nervous system tumors,
according to Ron Pawl, a neurosurgeon at Lake Hospital Forest. He
calls for collaborative initiatives in research, which will determine
whether the relationship between mobile phones and brain cancer
is real.

Hazardous and other devices


Unfortunately, within our homes are both electrical devices - such
as microwave ovens and hair - and new technology wireless
devices that cover everything with an electro-smog. And they say
some of the magnetic and electric fields developed during the
operation of these devices may not be so innocent, why rather
incriminating act on the human body, according to recent
measurements and surveys. On the other hand there is a large
group of scientists believes that there is no reason for concern,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 22
because the tensions in these areas is low. the most dangerous
devices in order of priority:
1. the basis for wireless phone
2. the microwave oven,
3. The WiFi and
4. the hair.
Lower the risks from the use of electric kitchen
5. the hood and
6. electronic alarm.
The second group says that so far there is insufficient evidence to
secure that we can safely say that health problems associated with
these devices. Measurements of the Laboratory of Cellular Biology,
University of Athens, a wireless base creates a landline phone
within a few centimeters magnetic field intensity miligkaous 50. Can
the limit adopted by the World Health Organization a decade ago to
reach 1,000 miligkaous However, many say that the existing limits
are considered "obsolete". A report titled EP Vioinitiative report
refers to studies which show that the magnetic field intensity above
4 miligkaous may cause children and adults, serious health
problems and associated with malignant tumors, leukemia, nervous
disorders, DNA lesions and lesions immune system. The report also
calls for reducing the limits for electric fields ranging from 28 to 61
volts per meter, depending on the devices, at 0.6 or less. In the
Laboratory of Cellular Biology for six months now conducting
experiments on mice with pregnancy, which glitters with bases
wireless phone every night for eight hours. The researchers say that
they found problems in bone development of embryos. These bases
of wireless phone radiation miligkaous to 50, while the radio waves
emitted by reaching up to 8-10 volts per meter, ie within the
established limits, but up to 13 times greater than suggested by the
report "Vioinitiative report» which puzzled MEPs .
However, the traditional home appliances radiate as measured: for
example, an old-style cathode ray tube television creates a
magnetic field intensity up to 100 miligkaous just a few centimeters
to 2 meters, while the intensity falls to 10. Furthermore, when
operating the dryer, depending on the strength of the magnetic field
can reach up to 500 miligkaous. When his eye lit cooker radiation
reaches 100 miligkaous also within walking distance - the same
applies to razors (no battery), toasters, hoods, electric alarm clocks
and vacuum cleaners. So it is good that children can not very close
these devices when in operation, has not adequately explored the
way in which the influence of low-intensity areas in the human body.
Particular attention should be paid to the microwave, which when
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 23
placed in kitchens are at the head height of children who look in
them the disk spins, experts say. Source: ScienceDaily, 21 October
2008. The head of a prominent research institute for cancer at the
University of Pittsburgh, Ronald Herberman warned both the faculty
and staff, to restrict the use of mobile phones because of the
likelihood of developing cancer - particularly when it comes to
children whose brain is still under development. The warning by
Herberman, based on unpublished data of a first investigation and
concluded that despite numerous studies which have found a link
between the growth of tumors and the use of mobile phones. He
believes that the world must now take appropriate measures,
especially children. "We should not expect a definitive study on the
subject, but prefer the safety of our indifference now," said
Herberman. Statistics from the Research Institute for Cancer show
how deeply rooted in our daily lives cell phones. 78% of all adults
own a cell phone, and has 86% of young people from 18-29 years
and 55% of Americans over 65 years. There are statistics about
young people under 18 years. No other scientific institution has not
made similar warnings about the use of mobile phones. In pleading
sent 3,000 workers of the institute, says that children should not
use mobile phones because the brain is still in its developmental
stages and adults should have the device as far as he is head and
using headphones. However, many studies have found a link
between cancer and mobile phone use, and note that there are still
no sufficient evidence to prove such a hypothesis in the case of
long-term security holders. "If there is a risk from these products -
and at present we have no such evidence - it is too small," said
Commission spokesman Drug Administration.
Parents should eventually build their own rules for their children -
but this is difficult when the social pressure is so strong, says Lisa
Bain, editor of Parenting magazine. "The age is creeping," he says.
"Girls tend to have a cell phone from a young age. It has become a
symbol - the use of mobile makes them feel they have grown up."
After the recent medical warning, Bain says: "They go so many
terrible trials. They will make many parents to think twice. But,
unfortunately for the vast majority will not mean much. After all,
says Bain, "It's like to object to a tidal wave."
Associated cancer of the salivary glands with heavy use of mobile
Source: BBC, 25 Φεβρουαρίου 2008
 Heavy mobile phone use may be associated with an increased risk
of cancer of the salivary glands
Dangerous to weak signal
Dr. Siegal Sadetzki, who led the investigation, said that because
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 24
mobile phone use in Israel is much more severe than what many
other parts of the world, this gave him the opportunity to study
long-term use and the cumulative effect have. "Compared with other
studies, the amount of radiation exposure to the securities in Israel
are much higher," he says. One of the main conclusions of this
study was that users with heavy use in rural areas had an even
higher risk than those who were in the cities, which is, as suggested
by the team, the fact that mobile phones in areas without strong
signals need to emit more radiation to work properly. Certainly Dr
Sadetzki said that a study is not enough to prove such a link for this
and need some more research. However, until there is more data, it
is better to have a "preventive" approach, he said, especially when
used by children.
The cell and cause insomnia
Using a mobile phone before bedtime might prevent the proper
sleep, according to new research. And I thought my otio insomnia
due to my little passion, everyday I frapedakia. Now ysichasa,
another is the culprit, so it would look in my eyes frappe prosecutor
anymore. There 's a good thing I saw from the mobile phone for so
long anathematize, at least, was crucified for my insomnia. The
research, funded by mobile phone companies, suggests that
radiation from the handset can cause insomnia, headaches and
confusion. Also, it may reduce the amount of deep sleep, which is
associated with the body's ability to be renewed. The survey was
conducted by the Swedish Karolinska Institute and Wayne
University, USA. The researchers studied 35 men and 36 women
aged between 18 and 45 years. The research suggests that
exposure to the laboratory at 884 MHz signals have been adversely
affected "ingredients" of sleep is important for recovery from daily
tiredness. Source: Reuters survey showed that mobile phones
increase the risk of cancer of the salivary glands Source: Yahoo
News, 7 Δεκεμβρίου 2007
The microwave radiation emitted by mobile phones clearly increase
the risk of cancer of the parotid - the largest of the salivary glands,
according to a survey conducted by Israeli researchers.
DNA damage
The NRPB report repeats concerns that the first caused by a study
on the effects on health of mobile, published in 2000 by an
independent expert group on mobile phones. This committee was
established, also by the British government and led by William
Stewart. However, the new report adds that scientific research
published since 2000, provides new evidence that radiation from
mobile may be dangerous to users.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 25

DESTRUCTION OF DNA & PROLKISI STEIROSEOS


The picture shows the brain was exposed to a two-hour irradiation
of a cell at various intensities. In this seems a significant break of
blood vessels and large areas of significant damage to neurons.
Indeed, the greater was the exposure to radiation, the greater the
zimia.Ta findings have caused a new twist in the lengthy
discussions between scientists and manufacturers of mobile
phones over the safety of securities. NTUA through Bioiatrikon
Laboratory Simulations and Imaging Technology in a multi-part
research project COST 281 - in cooperation with institutions from
six other countries. First, the calculation of Pythmou Rollover
Aporrofisis radiation from the tissue (SAR) (this is the size in
measuring the radiation received by the head) gave results that are
above the limits adopted by the United States, U.S. limit is 1,6 w / kg
SAR instrument in that process came to 2,2 w / kg for juveniles and
2.4 for adults. Notes the Konstantina Niki, coordinator of Greek
participation in the program, "the power deposited in the sensitive
tissues of the head in the mobile phone can exceed safe limits for
absorbed by biological tissue effect. He continues "it is not possible
to be absolutely sure that exposure to radiation of mobile
telephones, even at levels lower than those proposed in the
standards" But he Lioliousis Costas, Assistant Professor of
Electronic Physics, University of Athens highlights "The brain User
illuminated and heated, and absorb up to 70% of the power emitted
by mobile phone. The negative effects now emerging as a statistical
certainty. "The cell phone increases the probability of volume in the
ears from the BBC, 14 Οκτωβρίου 2004
Using a mobile phone for at least 10 years quadruples the risk of
volume in the ears, scientists believe, according to a survey by the
Karolinska Institute in Sweden.
Mobile radiates and kills ...
Source: Nation, September 23, 2006

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 26
Deadly health effects can have use of mobile phones as shown by
much research in the Department of Biology, University of Athens. H
inquiry was launched 8 years ago and is still ongoing, but scientists
have already concluded that the excessive use of mobile can cause
cancer auditory nerve to a decrease in fertility, alteration of genetic
material and accelerating the "death cells.
How to protect most usually put the phone in your pocket and even
in such a direction that the rear of the cell is opposite to the body -
usually the side on which most mobile phones (including non-
folding) emitting a maximum radiation intensity . In such cases we
must be away from the cell body, at least forty inches, which is not
always feasible. To this end the team in Tomea Kyttarou Biology and
the Department Biofysikis Biology at the University of Athens,
Biology designed "special protective case" that reduces the
electromagnetic waves and protects the user from the radiation of
mobile
Mobile and child go instead STOP the electromagnetic pollution!
HEALTH U.S. is more valuable than the profits of corporations

Risks posed by electromagnetic fields according to a parliamentary


report     Source: European Parliament
A cocktail of electronic field ... More and more people expressing
concern about the impact it can have on their health this constant
exposure to microwaves, which Ms. Ries calls the "cocktail ...
electronic fields. The health risks are still unknown, especially as
mobile phones, chargers, credit cards tripakia the current of which
passes, computers and other wireless communication devices
causes cancer

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 27

Low frequency electric and magnetic fields


The term low frequency electric and magnetic fields mean fields
generated by the electricity transmission system, such as lines and high
voltage substations, the network medium and low voltage used for
distribution of electricity and electrical wiring and devices found in homes
and in our workplaces.
What are the electric and magnetic fields?
The electric and magnetic fields characteristic of the electromagnetic
forces that interact with the electrically charged, particles of matter,
electrons and protons. The most immediate experiences, related to the
occurrence of these forces is the appearance of lightning during the
storms and the deviation ratio of the magnetic compass.

Static and fluctuating fields.


The electric and magnetic fields that grow in nature is static, ie no change
or change very slowly over time. The voltages and currents used in
implementing provisions of the electricity is alternating with frequency
50HZ, ie change polarity 50 times per second. The electric and magnetic
fields generated by these provisions are therefore also variable with
frequency 50Hz. In other countries like the U.S., 60HZ used to transport
electricity. Very rarely used direct current for transmission of electricity.
Electrical appliances using batteries creates the environment static fields.
The devices connected to sockets create varying fields in the frequency
of 50Hz.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 28

Extremely low frequency fields.


The varying electric and magnetic fields generated by electric power, and
fields are called extremely low frequency fields or ELF (Extremely Low
Frequency). ELF fields are different from radio waves emitted by radio
and television broadcasts, and mobile phone masts.
ELF fields and radio waves, with infrared, visible and ultraviolet radiation
making up the range of non-ionizing radiation. In contrast to ionizing
radiation (radiation), including X-rays, c, etc., non-ionizing radiation can
break chemical bonds, to extract electrons from atoms or molecules, that
cause ionization of matter

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 29

BIOLOGICAL EFFECTS OF ELECTRIC AND MAGNETIC FIELDS


The known effects of electric and magnetic fields in humans caused by
induced fields and currents inside the body during exposure to these
fields (direct effects). There are also indirect effects, such as annoying
spark that can be created by contact with objects in the presence of
strong fields.

Direct effects

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 30

What fields and currents induce magnetic fields in


humans?
Each alternating magnetic field B, applied to a
conductive
medium induces electric fields in turn generate
electrical currents in the medium. From electrical
point of view inside the human body is quite
conductive permits, ie, the flow of electricity. Thus,
within human induced electric fields and electric
currents are created. Fields and currents have the
form shown
Because the conductivity, the body, when a man
inside an electric field, E, disturb, so the surface is
an equipotential surface. This is done in the
presence of surface electrical charges to offset the
electric field inside the body. As the field is altered,
changing the distribution of surface loads, creating
currents inside the body

What are the effects of induced currents in humans?


If the currents induced inside the body of the fields are very strong,
produce the same effects in humans are created when the
currents enter the body by contact conductors under tension
(shock). These effects depend only on the size of the induced
current inside the body

Indirect effects
When a person electrically insulated on the land lies within a
strong electric field and comes into contact with a grounded
object is displayed in the spark point of contact. If the electric field
(before the presence of humans) more than 5kV / m, is very likely
that this phenomenon is disturbing. Similarly, when a person
touches a large object ageioto presence of electric field is likely to
result in a spark. The size of the disturbance in these cases
depends on the size of the object.
Effects on pacemakers
Particularly important may be the interaction of electric and
magnetic fields with the operation implanted cardiac pacemakers

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 31
or other implants in the human body. Although previously reported
interference in some types of pacemakers in electric fields higher
than 2kV / m and magnetic fields larger
of 20mT at 50Hz, no problems usually expected at such low
prices. The values of the fields that interfere vary depending on the
construction of the device, but is usually much higher than those
normally appear. Modern pacemakers are thus designed to ensure
the operation even if they were strong electric or magnetic fields.

Effects on monitors
The magnetic fields, often affecting the picture quality on computer
screens of cathode ray tubes. This can occur in magnetic fields of
the order of IMT. The liquid crystal display, plasma and other
modern technologies do not exhibit such problems.
There are long-term effects of electric and magnetic fields of
extremely low frequency in humans?
To investigate the effects of electric and magnetic fields in the
human species out of many investigations (epidemiological,
laboratory, clinical). The results of these surveys are evaluated by
special committees of the competent international bodies like the
World Health Organization (WHO), the International Commission
on Non Ionizing Radiation, (ICNIRP), as well as national bodies
such as National Research Council (NRC) of the U.S. National
Radiological Protection Board (NRPB) of Great Britain etc. The
views of these converge on the following general conclusions

Laboratory and clinical investigations


Laboratory and clinical studies do not indicate any harmful effects
in humans beyond the known effects mentioned above. From
experiments in animals or cell and molecular studies has revealed
a biological mechanism acceptable carcinogenic effects of electric
and magnetic fields ELF.

Epidemiological studies
In epidemiological studies considered exposure to magnetic fields,
people have become ill with a particular disease and compare with
the report of those who have become ill from the disease. These
investigations, as a whole, showed no link between exposure to
electric and magnetic fields, ELF and the induction of long-term
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 32
biological effects
other than childhood leukemia for which a patient appeared
statistical correlation for the magnetic field. Although in general the
exposure of children who became ill was the same as those who
are not ill, about 2% of children who became ill were exposed to
average magnetic field greater than AMT, while the percentage of
children who were not ill about 1%. This is interpreted as a
statistical doubling of the incidence of childhood leukemia in
children exposed to daily average values of magnetic field higher
than AMT. We obtained corresponding figures for adults or for
other long-term effects.
For the statistical correlation does not currently exist valid scientific
explanation. There may be other reasons, such as bias in the
selection of children or the existence of an unknown carcinogenic
agent which was used in the studies and distort the results. For
this reason, questioning the assumption that the relationship is
causal
If the causal relationship was what you meant for Greece?
Childhood leukemia is a rare disease. Annually appear about 4
new
cases of childhood leukemia per 100,000 children. Even if we
assume that magnetic fields with an average value above 0.4
mTprokalousan certainly a doubling of cases, this in a country like
Greece means that we also recorded about a new case every two
years.
The value of O, AMT is a level of protection?
The value of 0.4 MT in epidemiological studies showed a mean
exposure of children during a 24 hour basis. The distribution of
fields in space and time variation, it is very easy to find points
anywhere with magnetic fields larger than 0.4 MT. 0.4 MT are not,
say, a threshold or limit for the magnetic field, since even when the
mean exposure is much lower than 0.4 MT are several moments
during the day the report is greater than 0 , 4mT.
Sort by IARC
The International Committee for Research on Cancer (IARC),
World Health Organization has defined a classification system for
chemical and physical agents on the karkinogennitikotita them. In
June 2001 examined the static and ELF electric and magnetic
fields and concluded that ELF magnetic fields are classified as 2B
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 33
as "possibly carcinogenic" (possibly carcinogenic) to cause
childhood leukemia. Static and ELF electric fields and static
magnetic fields were placed in Category 3, "Unclassified" on the
karkinogennitikotita. The ELF magnetic fields were classified by
IARC in category "possibly carcinogenic" based on "limited"
evidence from epidemiological studies of childhood leukemia.
Epidemiological data on other cancers, and those from laboratory
studies in animal tissues and cells were considered "inadequate"
and thus the ELF magnetic fields are not classified in the
categories of the most dangerous players as "carcinogenic"
(carcinogenic), or "possibly carcinogenic" (probably carcinogenic).
As an indication that there are many other factors that have been
classified by IARC in the same category as the magnetic fields of
ELF. The most famous of these is coffee, gasoline exhaust and
vegetables preserved in brine

Exposure Limits
There are limits for safe exposure to electric and magnetic fields?
The International Commission on Non Ionizing Radiation,
(ICNIRP), issued the 1998 guidelines for human exposure. These
guidelines are based on the proven effects of electric and
magnetic fields in humans. Compared with the lengthy and
uncertain effects of magnetic fields above where no known
mechanism of creation, it is impossible to set limits on them.
The ICNIRP guidelines consist of basic restrictions and reference
levels.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 34

The main constraints


related to the induced currents inside the human, resulting from
the threshold levels that cause adverse biological effects. Indeed,
they have established taking into account large safety factors. For
the general population, the main restrictions are set 50 times lower
than prices resulting adverse effects. For the protection of the
basic restriction on induced current density in the human body is
set at 2 mA/m2 the frequency of 50HZ.
Reference levels are measured sizes of electric and magnetic
field, derived from the basic restrictions by considering the worst
case coupling of fields with the body. The use of reference levels
introduced, ie, in practice an additional safety factor.
Prices for the general population is significantly below those for the
professional workers, whereas in the general population included
people with sensitivities, like the elderly, young children suffering
from diseases, etc.
What happens in the European Union?
In 1999 the EU Council adopted the recommendation "on limiting
public exposure to electromagnetic fields 0 Hz - 300 GHz" (L199,
1999/519/EC). The recommendation proposes the same limits as
those in the ICNIRP guidelines for the protection of the general
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 35
population.
2004 E. E. adopted Directive (2004/40 / EC) "on the minimum
health and safety requirements regarding the exposure of workers
to risks arising from physical agents (electromagnetic fields). The
Directive was adopted the ICNIRP limits for occupational
employment.

What limits apply


to our country?
In our country, has issued the Joint Ministerial Decision Nos 3060
(FOR) 238 (GG 512/BV25-04-2002) on "Measures to protect the
public from the operation of emission of electromagnetic fields at
low frequencies. In this specified reference levels and basic
restrictions for protection of the public and static electric and
magnetic fields of extremely low frequency as they were defined in
the Recommendation of the European Union.
Greek Atomic Energy Commission
Polaplasiaste that apply to 100
First we must say that literally the planet, hence the locals,
swimming in any kind of radiation or natural or human origin.
Starting from cosmic rays and background radiation (a remnant of
the creation of the universe according to the prevailing theory of
Big Bang) and solar radiation, reaching the radiation emitted by all
kinds of electrical and electronic devices. We should also
emphasize that the discovery of electricity and its use by Edison in
1879 for lighting the city, especially during the 20th century,
exposure to artificial radiation sources has increased rapidly
because of demands for electricity, coupled with the exponential
growth of wireless technology and applications.
In this case we employ the radiation from natural and artificial
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 36
sources, known as electromagnetic radiation from power lines and
morodiakous radios from radio and television transmitters, from
stoves and refrigerators from phones and computers, anything
else running stream but the radiation emitted by radioactive
materials as the phenomenon of radioactivity.
 
Electromagnetic Spectrum
 When we say electromagnetic radiation, especially mean energy
spread (radiated) electromagnetic waves, which in turn consist of
an electric field and a magnetic field (electromagnetic field), which
run both vertically between them, the source which produced in all
directions in space and not need a distribution medium, as eg with
sound waves

 
 
A common characteristic of all electromagnetic waves is the
speed, 300,000 miles per second, while that which differentiate the
frequency (or wavelength). The frequency is practically the number
of waves passing a given point per second, and coincides with the
frequency of pulsing a dipole, which is the cause - a source of
electromagnetic waves. Generally any vibration caused by electric
charges produce electromagnetic waves of the same frequency.
The frequency, measured in Hertz (1Hz = 1kyklos per second) and
multiple KHz (= 1000 Hz, kilocycle per second), MHz (= 1.000.000
Hz, megacycle per second) and GHz (= 1.000.000.000 Hz) , is the
extent by which electromagnetic waves are classified into different
categories, ranging from industrial and small waves telephone
frequencies produced by moving electric charges (electric current)
to hard X-rays and c very high frequencies, produced by

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 37
redistribution of building blocks of matter, as shown in the figure
below. All of these frequencies is called the electromagnetic
spectrum.

Instead of frequency can be used to distinguish the


electromagnetic wave wavelength, ie the distance traveled by a
wave at a time so as long as oscillation, measured in meters, or
aliquots thereof. The frequency or wavelength is saying that the
identity of the radiation. Each color has its own wavelength. More
specifically a narrow range of about 10 nanometers (billionths of a
meter) say that it corresponds to monochromatic radiation.
Perfectly monochromatic light, ie a single frequency is idealization,
which is close but the laser radiation.
The human body does not readily understand all frequencies of
electromagnetic radiation because they possess the appropriate
sensory organs. The visible light, a narrow range, as perceived by
the retina of the eye are special cells (called rods and cones)
which are excited by visible radiation and give the appropriate
information in the brain to create a sense of vision. Something
similar happens with specific cells in the inner ear to create the
sense of hearing is with an appropriate stimulus frequency, again
restricted area, but acoustic waves. The other electromagnetic
radiation thus neither shown nor smell, nor hear, nor else how you
feel, and that makes it possibly the most insidious and most
dangerous. However, there are proper equipment with which to
trace the judge.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 38
A fundamental distinction of all these frequencies, is whether or
not cause ionization of matter, so-called corresponding to ionizing
radiation and non-ionizing, respectively.
As shown in Figure stagger is non-ionizing radiation at low
frequencies including radio, television, communications (mobile -
fixed), microwaves (microwave), until the ultra-busy. Because of
these and the huge spread is a probationary term electromagnetic
smog, which is in tight embrace with the Earth.
At the other end of spectrum are ionizing radiation, namely
ultraviolet high-frequency X-rays, and gamma rays, which are
widely used in medical and other fields of technology.
What does that ionizing and non ionizing radiation? The first cause
ionization of matter and the latter are not, a phenomenon which is
to be understood, should look more to the structure of matter 
It is known that matter consists of
eminent persons prosokratikon natural
philosophers Democritus and Leukippos
course with diversified properties. These
people are thumbnails of the solar
system since the center is the nucleus,
while wandering around it and rotate the
negatively charged electrons, in defined
orbits that define and energy. The
nucleus consists of positively charged
particles, protons, and neutral, the
oudeteronia or neutrons. The number of protons called the atomic
number and is equal to the number of electrons peripatetic, and
since the loads of these particles are equal, people are neutral. If
for some reason, eg radiation effects, or impact with another
particle, an electron leaves its orbit and moving to other track
higher energy level, as we say, by employing energy, then the
person is excited. In this situation the person does not remain for
long, but reverts to the previous stable state (decay), while the
electron returns to the path of providing the energy that previously
hired. The efficiency of this energy is in the form of a photon.
These photons, which somehow escape the people are what they
perceive as light. The following illustration shows the stimulation of
a person effect (absorption) of photons and decay by the emission

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 39
of photons and electrons return to their original stack.

  

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 40
Thus born the building blocks of electromagnetic radiation, namely
photons. Where even the energy attributed to resigning photon,
this corresponds to a particular frequency or wavelength. Now, if
this wavelength is such that it can also stimulate the retina of the
eye talking about visible light, otherwise we have the invisible
(ultraviolet or infrared) region of the electromagnetic spectrum. In
other words, all frequencies may result from the decay of the
people is the spectrum of electromagnetic radiation, a portion of
which is the light. Specifically, the light is very small region
corresponding to the visible and looks like a color film, as shown in
the picture below, where the area is isolated and measured even
in nanometers, ie millionths of a meter.
If the electron does not return to its original trajectory, but with the
energy they hired failed to leave the man, then we say that man is
ionised converted into a positive ion (now redundant because the
positive charges of protons) and the phenomenon is called
ionization. When ionization is fundamentally changing the structure
of matter and that certainly has its effects as will be seen in the
cells of organisms. The radiation then that when acting on the
atoms manage to extract electrons are called ionizing.
Is ionizing and particulate radiation (item Helium nuclei) and b
(positive and negative electrons)
emitted in the event of radiation type
A or B, as it is called, respectively,
but is also dominated by cosmic
radiation at high altitudes.
 

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 41

 
 

Non ionizing radiations


 
Metrology
 
The main figures of such radiation are measured with units of
radiometry, ie the power P of the radiation measured by W, the
electric field strength E in V / m, the magnetic field H in A / m, and
the greatest density of these power S in W/m2 or more commonly
in mW/m2. The valuation but the effects of exposure of living
organisms, including humans, in a non-ionizing radiation for time t,
is determined by the rate of absorbed dose SAR, why is that SAR
= sE2/2r. Where to and r is the specific conductivity and density of
tissue, respectively.
The International Commission for the Protection of Non - Ionizing
Radiation Protection (International Commission on von Ionizing
Radiation Protection - ICNIRP) is a non-governmental
organization, recognized by the World Health Organization (World
Health Organization - WHO), evaluates the scientific results in
epidemiology, medicine, biology, physics and engineering around
the world and gives instructions and tables for acceptable levels of
prices of these items of radiation.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 42
 
Consequences of non-ionizing radiation in human vaccines
In the human body circulating electric current, which is necessary
for normal function. All structures of the nervous system eg
operate by passing pulsed electrical signals, while nearly all
biochemical reactions from digestion to brain function, including
electrical processes. It is also known that these tissues contain
70% water, the molecules which are like electric dipoles.
Reasonable, therefore, that the penetration of an electromagnetic
field in the body and its interaction with the dipoles are, or natural
areas of the body can cause complications, even long term. It
must be noted that the absorption of a radiation from the human
body depends on the frequency of radiation. Thus, the microwave
radiation is absorbed near the skin, while the waves penetrate
deeper into the body and absorbed by the organs are inside.
In general, the electromagnetic radiation is thermal effects in
humans. As it penetrates to shallow body of course, is absorbed
and causes movement of molecules that the friction and the
shocks then cause warming of tissues. The testicles and even the
eyes are the most vulnerable points because kidnap a lesser
extent the accumulated heat, the less circulation. The thermal
effects occur for frequencies above approximately 100 KHz and
damage caused if the body's thermoregulatory mechanism fails to
restore the normal temperature. To be an observable increase in
temperature, power density must be very large (1mW/cm2) or the
average energy absorbed by the whole body (SAR) is above 5 W /
kg. When the amount of heat generated is relatively small, the
thermoregulatory mechanisms can kidnap this heat while
maintaining constant temperature at 36-37 0C. Conversely, when
the amount of heat exceeds a value, then these mechanisms can
not function properly and there is an increase in temperature in
tissues or organs where it exceeds 37 degrees.
But they also have non-thermal effects, which refer to the
biological effect of radiation on the operation of components of
cells, although it is unknown mechanism where the radiation acts
on cells. Might affect the flow of calcium through the cell wall,
which means that either facilitate progress already exist for other
reasons, cancer, or reduces the capacity of resistance of a cell in
the genesis of cancer.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 43
The non-thermal effects were considered to be more important
than biological / medical point of view and not covered by the safe
limits established because they are not directly measurable with
an instrument.
Clearly, the implications, whatever they are, depend both on
whether strong or weak radiation, the time over which an agency
out there, and how is it the source of radiation.
Besides the energy absorption of electromagnetic fields of
radiation, there has been a mechanism for coupling electric field at
low frequencies with living matter, which leads to current flow and
electric dipole polarization of the tissues, and mechanism of
coupling of magnetic fields at low frequencies, which induce
electric fields and electric currents round the tissues.
Sources of non-ionizing radiation and related effects
 
Radiation (ELF)
Radiation ELF, extremely low frequency, 50 - 60 Hz, generated by
the electric cables for low and high voltage transformers of all
types, electrical wiring, electrical household equipment and
electrical motors. It has been proven unhealthy effects of electric
and magnetic fields of these frequencies in humans. Besides the
tensions in these areas remain in positions of people, is much
smaller than the permissible limits.
 
Radiation frequency (RF) and microwave (MW)

Radiation sources include RF and MW antennas for radio and


television stations, radars, wireless networks, systems, microwave
links, satellite communications systems, communication systems
police, army, fire, aviation, navigation, mobile phones and mobile
stations.
At high enough intensities of both radiation damage tissues
primarily on account of the heat they generate, although the
estimate of health effects from electromagnetic fields, is highly
uncertain.
 
Infrared (IR)

IR radiation are the ovens, light bulbs heat, lasers and IR. This
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 44
radiation is perceived mainly by the heat created. So the skin and
eyes absorb infrared radiation as heat.
 
Visible radiation

Ο Sun is the major source, but the number and variety of light
bulbs, fluorescent lamps and is not insignificant. The different
frequencies of visible electromagnetic spectrum "as" our eyes as
different colors. Even the visible radiation, known as light, can
damage eyes and skin when it is strong.
 
Ultraviolet (UV) radiation

The sources of UV radiation include the sun, black lights, welding


devices, and UV lasers. The photons of UV radiation are high
energy, due to the high frequency and is very dangerous, not
limited only to heat the body to absorb, but can cause damage to
skin cells that can lead even to cancer. Besides a range of UV
radiation is the ionizing.
 
Laser radiation

This radiation is produced by the homonymous devices, which in


fact act as amplifiers corresponding monochromatic radiation.
Lasers emit UV, visible and IR radiation and can be particularly
damaging to eyes and skin, or by heat action, so degenerate
protein, either by photochemical activity, so changes made to the
characteristics of molecules.
 
Cell phones
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 45

Sun is the major source, but the number and


variety of light bulbs, fluorescent lamps and is not
insignificant. The different frequencies of visible
electromagnetic spectrum "as" our eyes as
different colors. Even the visible radiation, known
as light, can damage eyes and skin when it is
strong.
  
Ultraviolet (UV) radiation

The sources of UV radiation include the sun, black lights, welding


devices, and UV lasers. The photons of UV radiation are high
energy, due to the high frequency and is very dangerous, not
limited only to heat the body to absorb, but can cause damage to
skin cells that can lead even to cancer. Besides a range of UV
radiation is the ionizing.
  
Laser radiation

This radiation is produced by the homonymous devices, which in


fact act as amplifiers corresponding monochromatic radiation.
Lasers emit UV, visible and IR radiation and can be particularly
damaging to eyes and skin, or by heat action, so degenerate
protein, either by photochemical activity, so changes made to the
characteristics of molecules.
  
Cell phones

 
As I said mobile phones and base stations, emit radiation in the
range of frequencies. Given the widespread use of millions of
people (men, women, children) who are exposed to it, it is
appropriate detailed reference to them. Moreover, the effects of
mobile phone radiation on human health has occupied many
researchers for many years and not without reason, since no other
radiation is not the massiveness of this. In Greece there are more
active mobile phones from its citizens, while 80% of children under
12 years are users! All other radiation mainly small groups of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 46
people who assumed they will be aware and take protective
measures in the field report

The mobile phone acts as a radio transmitter formed by


transferring the voice of the user's way when he speaks, and radio
receiver, when he hears, in a radio broadcast from the transmitter
base. The antenna of a base transmitter is usually located on the
roof of high buildings, often in residential areas to allow cellular
coverage possible wider areas. The base stations forming cell (the
geographical area covered is divided into smaller areas, ie cells)
Referring to connect to one another, when changing the position of
the mobile phone during the conversation.
More specifically, when someone calls someone else with a
mobile initiates a base station (usually the closest), which in turn
recognize and after the call, sends him call sign. When you answer
what is called, then enter the interactive communication between
two mobile phones with the insertion of the base station, when the
three of them can function as both receivers and transmitters.
In relation to the hazards of radiation of mobile phones should take
into consideration the following:
 
• the wide range and specific features of mobile phones
 
• the flexibility of transmitting power depending on the quality of the
signal received from the base station. When the phone receives a
strong signal, then emits a small effect on developing
communication with the respective base station and vice versa,
weak signal reception means great power emitted from cell phone
radiation.
 
• the different physiology of each individual, which varies
depending on age, with their vulnerable younger ages
 
• the use of different durations
The following figure shows the attenuation of radiation as the
antenna away from a base station and also shows the preference
for certain directions depending on the orientation of the antenna.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 47
 In fact, the antennas are manufactured and have been widely
used directional radiation lobe, and this is visible in the picture
above. It is apparent imbalance of power density in different
directions and therefore the obvious difference in the radiation
suffered by residents of surrounding areas, even if it is equidistant
from the keraia.Sto chart below shows how important is the role
away from the mobile head. The weakening of the radiation
increases as the distance aftieinai eντυπωσιακή.

For years, therefore, are epidemiological studies in which


researchers try to determine if a statistical analysis of certain
diseases or any symptoms are more frequent in a sample of
people who have cell phones, compared with an equivalent
sample not using these devices. In the first sample found memory
loss and frequent headaches.
In other surveys studied the brain functions as the region closest
to the antenna of the mobile, with EEG for detecting disorders of
brain electrical waves, but the results are unreliable.
Recently, in investigations where irradiated with RF mobile and
intensities very close to safety limits, laboratory animals and cell
cultures have been identified impacts associated with the passage
of ions through cell membranes, and tumor growth, and loss of
cache. But in all cases recorded by the riposte and swinging
questions about the reliability of statistics.
In conclusion, none of the recent studies have not led to certain
conclusions as to whether in fact the radiation they cause adverse
effects on human health. The only proven adverse impact is
causing traffic accidents by careless use of a mobile phone while

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 48
driving!
The diagram below shows the absorbed dose (SAR) in relation to
the distance of the mobile head. Again we see the collapse of the
absorbed radiation with increasing distance from the head.
Therefore would say that you called "hands free" is very useful

 
Limits and standards of protection
 
Whether there are limits, above which there may be adverse
effects, relevant bodies to provide information and instructions are
mostly the ICNIRP, the World Health Organization and the
European Commission.
In our country the mobile broadcast at 900 MHz, 1800 MHz to
2100 MHz and to prevent interference between different radio, and
mobile phone companies operating in Greece is COSMOTE
(GSM900, DCS1800, UMTS), the Q -TELECOM (DCS1800), the
TIM (GSM900, DCS1800, UMTS) and VODAFONE (GSM900,
DCS1800, UMTS).
The following figure shows the level of risk the power density of
radiation, which has been adopted by international

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 49
telecommunications operators and health

Law 3431/2006 imposes restrictions on terms of mobile phone


antenna even as setting limits 70% limits of ICNIRP, and if less
than 300 meters are nurseries, schools, nursing homes or
hospitals, the exposure levels public is prohibited to exceed the
60% limits of ICNIRP. That applied even more stringent limits than
those prescribed by the ICNIRP, as shown in the table below. In
parentheses are the values corresponding to 60%.
 
 
 
 The following table is the limit adopted by our country about the
size of SAR, in various parts of the body, which is again 70% or
60% of the limits proposed by the ICNIRP.
Body responsible for monitoring compliance with limits public
exposure to electromagnetic radiation is the Greek Atomic Energy
Commission (GAEC) and the radiation measurements made by it
or his / her players.
 
  

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 50
Conclusion and directions
 
Although the scientific research so far has not shown very least,
that non-ionizing radiation event caused damage to living
organisms, though the folk wisdom of the proverb "Better than
gaidourodene gaidourogyrefe" finds this case the ultimate
application. The minimum and it is shown that the future is the
impact of radio, and other non-ionizing radiation, the health of
people, safer doses can get one of these are zero, especially since
the doses are additive, or each is added to previous ones. So until
you "prove absolutely that the radiation is not harmful to our
bodies, we should be sparing in their use of devices that generate
and lamvanome appropriate protective measures, especially for
growing organisms such as embryos, newborns and children.
Mention some practical advice on the use of mobile phones.
 
• Do not use any mobile phones by children of primary school or
less.
 
• To be used, if necessary, with great caution, however, the
children of high school.
 
• Women, especially during the first months of pregnancy to avoid
them as much as possible.
 
• Similarly to avoid using mobile users of pacemakers.
 
• The vulnerable situations (children, pregnant women, users of
pacemakers) to avoid staying near antennas.
 
• Be the preferred fixed phone, if available, to the mobile.
 
• To minimize the talk on mobile.
 
• give preference to messages if they are able to communicate.
 
• use hands free, blue tooth and open hearing.
 
• Avoid placing the phone near the heart, brain and genitals.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 51
 
• Do not place the phone near the pillow, where we sleep and we
have to we have enabled.
 
• Avoid using a mobile phone while driving. Moreover, it is the only
case to prove that the phone is bad by causing accidents and not
the radiation course.

 
 

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 52

 
 
 

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 53
Ionizing radiation
 
As already mentioned characteristic of radiation that cause them to
ionize matter and create ions by electron attachment of the people
of.
The ionizing radiation can be naturally or are manmade. The first
category includes the radiation from the environment (soil, air,
water, food) and the cosmic radiation, whereas the latter are
primarily medical devices (x-ray machines, scanners, gamma
devices, applications of radioisotopes, etc.), nuclear reactors,
nuclear waste, nuclear weapons testing, and many building
materials.
In all these cases the ionizing radiation emitted in the category of
which are high-frequency X-rays and c, and particle radiation are
helium nuclei (alpha particles), electrons (b), protons and
neutrons, and cosmic rays. Almost all of these radiation produced
when the phenomenon of radioactivity

To facilitate understanding of the effects of radiation to be listed


some necessary concepts and terms. This Activity is called the
radiation emitted during radioactive decay (disintegration) of
unstable nuclei (nuclides) to stable nuclei. The break is followed by
emission of particles and (not always) electromagnetic radiation.
The particles and radiation are the radiation. The activity is in the
nature (physical activity) since the creation of our planet, but can
be caused artificially by 'bombing' of some heavy nuclei (with
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 54
many neutrons and protons that is) with fast-moving particles
(projectiles). Physical activity was discovered in 1896 by Bq and
then looked to Peter and Marie Curie, Nobel Prize-winning
physicists and three. One way to express how fast a radioactive
element decays, is called the half-life. Precisely half-life (or half-
life), T1 / 2, is the time required to split half of the initial quantity of
radioactive material. The half-life is a measure of stability of the
radioactive substance is, the higher the value, the more stable is
the core component. The intensity somewhat of radiation reflected
the size we call active. This is calculated by the absolute value of
the rate at which a broken nuclei of radioactive material.
 
Units of radioactivity
 
A. Plants that express a level of radioactivity of radioactive
material
The most common unit is the Curie (Ci). A Curie is equivalent to
3,7.1010 radioactive disintegrations per second.
Another unit of activity (activity to be precise) is the Becquerel
(Bq), corresponding to one radioactive decay per second. That is
true that 1 Ci = 3,7.1010 Bq
B. Units expressing radiation absorbed by a body
To quantify the results of the effect of radiation was originally a unit
of radiation, which is called the rad (radiaton absorbed dose). This
is the radiation dose (or amount of radiation in general) which affix
0,01 J of energy per kilogram mass of tissue absorbs.
Another unit is the Gray (Gy), corresponding to absorption of
radiation energy 1 J per kilogram of tissue mass. Ie, 1 Gy = 100
rad.
C. Units reflect the radiation absorbed by an organism in relation
to the biological effects caused
The absorbed radiation dose does not in itself a measure of
biological effects, because the biological effects depend on both
the type of radiation. For example, a given dose of radiation
causes a ten-fold more biological damage than an equal dose X-
rays 1 Gy radiation also causes a 20 times greater disaster in
human tissues from 1 Gy radiation c.
To be thus comparable doses to their biological effects, using the
size equivalent dose unit of the 1 rem, and in particular aliquot of 1
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 55
millirem. The rem (radiation equivalent mass) is a unit of activity
that does not depend on the type of radiation, and reflects the
biological damage caused to humans by the absorption of various
radiations. Ie, 1 rem of radiation is a quantity which causes a
specific biological effect. The accuracy is 1 rem = q • 1 rad. Where
q is the quality factor of the biological effects of different types of
ionizing radiation on the biological system. The values of this
factor are shown in the table below.
q = 1 For gamma rays and electrons
q = 10 a for particles, protons and second
q = 20 for heavy nuclei
2 <q <10 For neutrons, depending on the kinetic energy
Apart from the rem used unit Sievert (Sv) (pronounced Sivert),
which is that 1 Sv = 100 rem.
Here are some indicative prices attenuation as examples.
A chest radiograph deposits of around 20 - 40 millirem per 5 kg of
tissue. Equivalent dose of 500 rem in a short period and
throughout the body usually leads to death within a few days.
Localized dose of 10.000 rem cause complete destruction of
tissue. Finally, cosmic rays and natural radioactivity in soil
represent an equivalent dose of 0,1 rem per year to sea level. At
higher altitudes the cosmic dose increases.
 
Types of ionizing radiation
 
The divisions of nuclei in the activity, natural or artificial, are three
species and correspondingly, three types of radiation:
Splitting a: in this type of radiation emitted by the unstable parent
nucleus of the element Helium nuclei, which are called alpha
particles, and the initial core becomes a core element of another
(subsidiary). We say that we have transmutation, as the filial heart
represents another element. Thus, as shown in Figure adjoining
the nucleus of unstable uranium-238 emits alpha particles and
converted to thorium-234 nucleus.
Split B: in this case we have electron emission (beta) or positron (b
+), antiilektroniou That is, the parent nucleus with the
simultaneous conversion of neutron to proton proton or neutron in
its interior. And in this case we have transmutation. Thus in the
following forms of bromine nucleus is transformed into a center
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 56
Krypton while eksfendonisi electron (left) or selenium core while
eksfendonisi tomography (right).
 

    

Gamma: in this case emitted electromagnetic radiation from


extremely high frequency, and hence the energy from the unstable
initial nucleus, which thus comes into steady state without any
transmutation

All three types of radiation find extensive application in medicine


mainly to a scientific discipline, the Nuclear Medicine, but also
because of the great danger the developed and the new Science,
Radiation Protection. Radiation are controlled can be used to
destroy unwanted tissue (radiotherapy of cancer cells) and is
known for operating the radiation to produce electricity in nuclear
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 57
plants. Also used to measure and control the thickness of metal
and plastic surfaces for leakage pipe to measure the level of
liquids or solids in the tank, still in use and maintenance of certain
foods due to the bactericidal action of radiation.
The illustration below shows the difference in the penetrating
ability of a particle radiation, particulate radiation b and c. The
electromagnetic radiation absorbed by a first sheet of paper, the
second foil thickness of several centimeters, while the latter is
absorbed by thick cement several centimeters. There are other
and particles produced in nuclear reactions much more invasive.

 
Radiation soil
 
The radiation from the ground due to the phenomenon of natural
radioactivity is the spontaneous decay of unstable nuclei of some
radioactive elements, which are components of the earth's crust.
These are the radioactive elements radium, uranium, thorium,
potassium, radon, etc., which are found in soil, water, air, living
organisms in food and building materials. This physical radiation is
most intense in underground spaces such as caves, mines, and
the underground buildings. The main naturally occurring
radioactive isotope potassium-40 which has a half life of 1,28 • 109
years. That is an initial amount of potassium to leave the half must
pass 1280 billion years. This item 89% decays by emitting beta
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 58
radiation (electrons) metastoicheioumeno calcium, and 11%
initially decays by emitting beta + (antiilektronia) and subsequently
converted into gamma rays slow.
Potassium-40 is bananas, potatoes and carrots, and therefore also
in the human body, but in cement. Radiation is particularly
potassium, and the average temperature in the depths of the

oceans 
 
Cosmic radiation
 
This electromagnetic and corpuscular radiation of high energy that
reaches the upper atmosphere coming mainly from the sun and
other celestial bodies. Therefore, the one in the intense activity of
the sun and this accentuated, while increases in height.
When it enters the atmosphere, cosmic rays interact with nuclei
people in it and cause secondary production of other fast-moving
particles (electrons protons, neutrons, mesons, muons, etc.),
which together with high energy electromagnetic radiation, reach
to the ground. During this interaction, cosmic radiation and
atmosphere, also produces radioactive nuclei of helium-3,
Beryllium-7, carbon-14, sodium-22, etc., which they contribute to
the increase of radiation affecting agencies and natural. However,
the cosmic radiation and passes through the layers of the
atmosphere is absorbed to some extent, the intensity decreased
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 59
gradually and finally it reaches the level where the surface of the
sea is hundreds of times weak.
As shown in the figure below the average dose rate from cosmic
radiation at sea level is 0.03 mSv / h to 15 km and reaches 10
mSv / hr. It is obvious that residents of cities and villages where
they are at high altitude absorb multiple doses of cosmic radiation,
although the residents of coastal areas. But the altitude of 10km,
where routine flights travel the radiation dose rate is about 5 mSv /
h, while the 15km when flying large aircraft, type Jumbo and the
Concord dose rate reaches 15 mSv / hr. Thus a traveler during a
long haul flight overseas absorb tens of mSv of cosmic radiation,
while the crew of the airlines apparently accepts major annual
installments, which is appreciable and should be checked. And
indeed there is a directive of the European Union (96/29), which
requires airlines to systematically measure the doses absorbed by
the air crew. It is understood that the cosmic rays are the strongest
out of the atmosphere, outer space, and therefore the dose
absorbed by astronauts are multiple, so it should be no special

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 60
protection measures.

 
X-rays
 
X-rays are invisible electromagnetic radiation of a wavelength
much smaller than that of visible light, and comparable with the

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 61
dimensions

individuals. The energy transferred to the radii are much greater


than that of ultraviolet rays, particularly the so-called harsh rays,
which makes them capable of penetrating the human body and for
this reason be exploited mainly for various medical diagnoses.
This radiation, which was accidentally discovered by German
Nobel laureate natural Rentgen in 1895 and has since received
widespread use because of the different absorption of the tissue or
bone. Almost all people need ever to undergo a chest radiograph.
X-rays are mainly produced artificially by appropriate devices (X-
ray tube) and their use is so widespread, especially in medicine
(X-rays, X-ray computed tomography), as a medical specialty, that
of medical physicist. Indeed, the rays, combined with the other
used for medical reasons ionizing radiation, necessitating the
existence Aktinofysikon various scientific laboratories, responsible
for many documents, from simple record keeping to research. Also
used in industrial X-rays, to detect voids, cracks or other defects
within the metal. Also mention that with the help of cosmic X-ray, ie
natural origin investigated qualitatively and quantitatively the
existence of the famous dark matter in the universe.
From the above it is obvious that indeed the planet, and there
upon him or within him at the mercy of the continuing
bombardment of all kinds and from all sources of radiation.
The figure below shows the contribution of different sources of

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 62
ionizing radiation.
 
 
Effects of ionizing radiation
 
In contrast to non-ionizing, the effects of ionizing radiation is
known to be harmful. Since the 30s the Curie and other famous
physicists mentioned in writings of their comments on the effects
of radiation on humans, then the irradiation devices used and their
applications in medicine for diagnostic and therapeutic purposes.
Besides the actual Marie Curie fell ill and eventually died from
radiation such as before, with exactly the same radiation has
helped thousands of sick and wounded during the First World War.

Took to fall but the atomic bomb on Hiroshima and Nagasaki


(1945) to become conscious of the danger of radioactivity and the
nuclear accident at Chernobyl (1986) vindicated the concerns
about the effects of radioactive radiation on human health and
more. When X-rays and other ionizing radiation absorbed by the
tissues, breaking molecular bonds and create free radicals
(charged groups of individuals), which in turn can disrupt the
molecular structure of proteins and specific genetic material (DNA,
RNA). Also hamper the action of enzymes and affect the
metabolism drastically in influencing biochemical processes.
It is possible that the cell is damaged by radiation to survive, but
can provide many generations of mutant cells. If changes in the
DNA for genes that control the proliferation rate of cells can cause
cancer. Perhaps excessive exposure to such a body radiation
cause genetic changes in cells, so that he ranks as the body is
likely to remain healthy, but symptoms of illnesses such as cancer
(eg thyroid, lung, breast, leukemia), or cascade of eyes will certainly
express his descendants.
What makes it worse, but more insidiously various radioactive materials,
are long the action after half-lives are enormous, so as to cease to be
dangerous must spend centuries or even millennia. Also implicated in the
radiation caused by the dropping of atomic bombs 63 years ago by
Japan, to show still many diseases. The same goes for the escape of
radiation during the Chernobyl accident.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 63

Despite efforts to control nuclear tests and even made "underground"


(India and Pakistan have in recent tests in 1998), their derivatives, but
dissipated in the soil and the atmosphere will accompany us for many
years. Besides, the soaring price of fuel oil, artificial or real reasons,
favors the development of nuclear reactors for energy production thereby
increasing the nuclear waste and proliferation of natural hazards of
radiation for several reasons.
The following table, which was borrowed from the practical business
conference on "radiation man" of Greek Physicists, shows the levels of
radiation doses to get various medical tests, the time in which we would
take the same doses of the environment and the incidence of fatal
cancer.
 
 
 
Type of diagnostic test standard price effective dose (mSv) equivalent
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 64
values years background radiation * Prices likelihood of fatal cancer **
X-ray
Chest radiograph (single-OD) 0.02 3 days 1 per million
Skull X 0.07 11 days 1 per 300,000
Cervical spine radiograph 0.08 2 weeks 1 per 200,000
Hip X 0.3 7 weeks 1 per 67,000
Lumbar spine X 1.3 7 months 1 per 15,000
Mammography 0.2 1 month 1 per 100,000
CT skull 2 1 year 1 per 10,000
Computed tomography of the chest 1 8 3.6 years per 2500
CT abdomen / pelvic 10 4.5 1 per 2000 years
With radioisotopes
Lung ventilation (81Kr) 0.1 2.4 1 weeks per 200.000
Perfused lung (99Tc) 1 6 months 1 per 20,000
Bone scintigraphy (99Tc) 4 2.3 1 per 5000 years
Dynamic heart scan (99Tc) 6 2.7 1 per 3300 years
Myocardial scintigraphy (TL) 18 1 8 years by 1100
Doses received by a passenger airplane in flight
Athens - New York 0.09 2 weeks 1 per 200,000
London - Chicago 1 0.06 1.5 weeks per 400.000
* This figure shows the time needed to obtain one the same dose if
exposed only to background radiation (an average). The mean radiation
environment for the UK, from which they came and values in the above
table is 2.2 mSv per year. Local rates ranging from 1.5 to 7.5 per year.
** Approximate values likelihood of fatal cancer for the entire life of man
by 16 to 69 years. For younger patients these values must be multiplied
by 2, while for older patients to be divided by 5.
Following table showing various situations increase the likelihood of
death by one in a million.
 
Status Reason
Chest X-ray Radiation
2 months stay in Denver Radiance
300 km driving a car accident
2000 km flight in an airplane accident
Smoking 1.5 cigarettes per day cancer
Living with a smoker 2 years Cancer
100 meals eating grilled meat grilled Cancer
Drinking diet soda drinks 30 Cancer
Drinking 500 ml wine Cirrhosis
 
The following table shows the symptoms that have certain doses of
radiation absorbed by the body.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 65
 
Dose (rem) clinical results
25 decrease in white blood cells
25 -100 Nausea, fatigue, blood changes
100-200 Nausea, vomiting, fatigue, possible death
infection because of reduced white
cells
200 to 400 lethal dose for 50% of arguments,
especially if left untreated. Lesions in the spleen and bone marrow.
> 600 fatal even with treatment.
 
The table below shows the key characteristics of ionizing radiation. As we
observe the gamma rays and X are substantially more harmful if they
penetrate deep into the body The neutrons also cause harm to a depth
through secondary operations, which produce radioactive products. For
example a neutron capture reaction, it is possible to change the structure
of amino acids and thus proteins.
 
nature of radiation load average penetration
                                                                                  in air at body
gamma E / tion - unlimited passes
X-ray electric / tion - no limit deep
a particle 2 4-10cm clothing, leather
beta particles m -1 some few mm
neutron particles from particles bound 0
 
Scan that shows blood flow to the heart with the help of isotopes 99Tc.

 
 
 

Υγιής  Ασθενής

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 66

  
Ta bass new weapons are the first to grill the Police in the microwave

How do you say; It is safe;


And the microwave ovens.
1. Take any one microwave.
2. Be careful not to plug it in and has power
3. Open the door and put through a mobile service shall
4. Close and lock the oven door
5. Call your cell phone you have in
IF I have heard it ringing, radio waves coming into the OVEN
Think how much radiation comes out when CARCINOGENS OPEN!

. France recently banned cell in primary schools and is considering to


ban mobile ads targeting children under 12 • UK, Germany, Israel,
Russia, India, Finland also officially discouraged from using mobile
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 67
children
.
The manuals warn of mobile phone users to keep the phone off even
when not in use.

 VlackVerry in 8300 warned that they should be kept at least 25 mm


away from the body;
 But few users read the manuals.
 The warning from the U.S. Federal Communications Commission (FCC)
for wireless phones. The warning attach the FCC's most common
technology of wireless telephones, the Digital Enhanced Cordless
Technology (DECT), states that equipment must be installed and
operated with a minimum distance of 20 cm between the base and the
human body. Because the DECT base-emit radiation similar to that of
mobile, 24 hours in 24 hours.
The radiation from mobile phones harm male fertility. A survey showed
that men who use mobile phones for at least 4 hours a day have lower
sperm count up to 59%. Other research has shown increased risk of
testicular cancer and 80% of men who hold the phone in his pocket.
 
Protection Measures
           The best is the KADOS Rubbish
Use a wired headset or hands-free operation to speak, or send SMS.
Hold the phone away from your body - never put it in pockets. Avoid
using mobile while traveling by car, train or bus, and when in the
countryside, away from antenna: in each of these cases increases the
power of radiation. Use your phone as voicemail. Have closed until you
want to see who has called. Then, and if necessary call using steps 5 or
1. Using, wherever possible, fixed wired appliance instead of a wireless
phone, fixed or mobile. Avoid using the phone inside buildings, especially
those with metal frames. Do not let children sleep with the phone under
the pillow or nightstand. Do not allow children under 18 from using cell
phone, except in an emergency.

SPY DEVICE NEW VISA CARD


The economy is not money, is cash, which is not controllable and gives
effect to the owner. The VISA from 3 / 8 canceled all its cards and sent to
recipients with the new built-in EMV CHIP comprising memory EPROM,
sufficient to write, the writer lists some tilefonikous3 data and to store
images and video, microprosecor antena. Is constructed and planted on
the card, a computer without your written permission, of course not give
you either a manual on how they can make this computer
Spy TO YOUR PERSONAL LIFE
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 68
Your cell phone may even closed to broadcast your conversations and if
there enabled camera transmits video images, sound that is
Spy TO YOUR PERSONAL LIFE
The new plasma TV is preparing to exit the market with a Trojan horse
touchscreen mobile phones which doiathetei hard disk katalavenetai
microphone and camera that is not to decorate a huge screen in your
living room, but to spy on you completely through it especially if you To
make shopping combined with your credit card that is just
Spy TO YOUR PERSONAL LIFE
The new mobile phone that is worn like a watch, I almost lost this rascal,
you know what it really is, another device
Spy TO YOUR PERSONAL LIFE
But what nice is that allocating and bluetooth scanner, when you buy the
pass as the scanning of the sales over the product and reads the
barcode automatically transferring the charge to your account only all
these girls sitting on the funds if bend beneath the bench has installed
scanners will see a small label that says "CAUTION RADIOACTIVE
release" Think about how quickly and surely getting cancer.
You will proudly wear the new mobile clock in the left hand is the hand
that all roads LEADING TO HEART and began to fill YOUR BODY
RADIOACTIVITY that you
Killing me release RADIATION
Possible side effect concerns with epilepsy is simply attacking stroke
centers are attempting to check and make CHANGES IN DNA, ie each
birth and ... more stupid kids. We thank the Society

THE SAME FOR IDCHYEI


• Wireless computer networks
• Asymati Television
• Cordless Phones
• Microwave oven
• Cell Phones
• GPRS navigation systems
• GIS Mapping
• Any device receives and sends data wirelessly via infrared or radio
waves
 

CERN

The head of CERN wants to build the next accelerator


No sooner begun the historic experiment in the Large Hadron Collider
(LHC) at CERN, which will be in November, the Executive Director Rolf-
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 69
Dieter Choier said that it would strive to build at CERN and the future
"Linear Accelerator, "the next big experiment in the field of particle
physics world. As Choier said in an interview on physicsworld.com, the
creation of new large accelerator (more linear and not circular as that
which exists today in the underground tunnel length of 27 km beneath the
Franco-Swiss border), is included in plans to internationalize further
CERN. But for the linear accelerator, known as «CLIC», which will collide
electrons and anti-electrons (or positrons) is expected tough competition
from alternative applications for the hospitality, especially from the U.S.
Fermilab, where is the accelerator Tevatron, The main competitor of the
Hadron Collider at CERN. The CERN started to develop a paper model
of a future linear accelerator and a competing project, known as the
International Linear Collider ", already developed by the California
Institute of Technology (Caltech). The Choier (whose mandate expires at
the end 2013) confirmed that the existing Hadron Collider will resume in
mid-November this year after last year's severe damage that placed him
outside the "battle" for over a year has elapsed and after the repair or
replacement of 53 magnets. The first particle collisions (proton) will begin
a few weeks later, in late 2009 or early 2010. The first proton collisions
will be conservative, only the energy 450 GeV per beam, before resorting
fiercest clashes with energy 3,5 TeV per beam. According to Choier the
accelerator will work with this energy force for several months and then,
depending on the findings and, sometime in 2010, the particle collisions
will become even stronger, at 5 TeV per beam, giving a total of 10 TeV at
the meeting point of two beams from opposite katefthynsi.Mesa in 2011 if
everything has gone well, the conflict will reach a maximum energy of 7
TeV per beam. The great hope of the world community of individuals is
that these conflicts will reveal the "Higgs boson the" other "exotic" matter
particles. Although the planned linear accelerator will operate at a lower
energy level than the current Hadron Collider will be able to make
accurate measurements, because electron-positron collisions are
considered 'cleaner' than the collisions of protons of the LHC.Molonoti
CERN was founded in 1954 as a purely European scientific
establishment allows other non-European countries to join and many
physicists from other countries (notably the U.S.) have helped greatly in
creating the Large Hadron Collider. Almost a year when the Large
Hadron Collider (LHC) at CERN started its functioning, many had
expressed concern that it would create a black hole that would devour
the planet. As some point today, the accelerator itself can be a black
hole. What does that mean the prophecy "cold breath of the beast inside
the circle;" Does talking about the enormous circular accelerator СΕΡΝ
and a ton of sun you are using a refrigerant;
The largest scientific instrument in the world has so far cost about 10
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 70
billion U.S. dollars, has served a total of nine ime3res not yet made any
experiment. The 27 km long underground tunnel of the accelerator on the
border of France and Switzerland built with the participation of scientists
from many countries and thousands of physicists are waiting for the start
of operation. According to the announcement by CERN, the accelerator
will resume its operation in November, using half the energy, despite the
pressures of scientists to full power, which will allow experiments hoping
to unlock some of the biggest secrets of the universe . Even at half
power, but the accelerator will be closed again in early 2010 to complete
the repairs, so finally some time to operate at full power ilektrovolt 7
trillion, seven times higher than any similar machine in the world.
Because of the injury, 53 in total electric magnets to be cleaned and
repaired, while a series of lengthy operations should be repeated to
ensure the state of subatomic particles into the accelerator at speeds
approaching that of light and a temperature near absolute zero . The
Mitsio Evil, professor of physics at City University of New York supports
the accelerator of CERN, as a critical investment. "Europeans and
Americans will invest ten billion U.S. dollars a barrel for anything," he
said. "We explore the origins of physics and cosmology with the
accelerator because we want to create a window to play a small part of
the Birth to unlock some of the deepest secrets of the universe." The
experts at CERN calculate the cost for repairs and additional security
systems to reach 37 million U.S. dollars, which will be covered by the
companies participating in CERN. The LHC is the largest accelerator in
the world, after cancellation of the superconducting Large Hadron Texas
because of high manufacturing costs and increasing questions about the
value of its contribution to science. Upon restart of the accelerator in
November, the Rays subatomic particles will run into force ilektrovolt 3.5
trillion (TeV). Is half the power compared to the potential of the
accelerator, but still much stronger than any accelerator in the world.
Scientists believe that the data generated by the collisions within the
accelerator will show the conditions that existed one trillionth of a second
after the Big Bang. Some have expressed fears that high energy
collisions will cause small black holes, subatomic versions of collapsed
stars and are so strong that "swallow" other planets and stars.
The essential function of the accelerator becomes a factor for the
development of the science of molecular physics. "If there are other
surprises, delays and failure to satisfy the design specifications, scope of
physics can not be developed for more than a decade," said Neal Lane,
former science adviser to Bill Clinton.

Because I see here a repetition of the Philadelphia Experiment


exafanisytike Eldridge the aircraft which "possess" the Greek Armed
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 71
Forces, and Full House which was the radiation;;;;

The accelerator at CERN will resume in November preservatives CERN


is made clear that after nearly a year, no longer need other repairs, and
inspections were completed and 10,000 electrical connections of the
accelerator. The largest machine in the world, the experiments are
expected to have historic significance for science, was forced to shut
down last year in September, nine days just after the inauguration
because of a serious electrical fault. The CERN, according to news
agencies Reuters and French, announced that it intends to restart the
accelerator with energy monster 3.5-electronvolt (TeV), "to allow
operators of the accelerator to gain experience in handling the machine.
The lowest energy will prevent the overloading of the electrical
connections and allow for monitoring the operation. Experiments will
continue with that less energy, "until it has collected a large sample data
and the group of operators have gained experience on the operation of
the machine. Then, the energy level of particle collisions will gradually
increase the level of 5 TeV per beam emitted. By comparison, the
"competitive" the Fermilab Tevatron accelerator in the USA working in the
energy level of one to two TeV. The Director General of CERN Rolf
Choier assured that this time everything will go smoothly, because, he
said, "we understand the throttle much more than a year ago.
Experiments in large circular underground tunnel length of 27 km near
Geneva, will be held at a temperature just above absolute zero and will
recreate the conditions that are believed existed in the original "Bing
Bang" before the universe 13.7 billion years. The first scientific data are
expected to gather a few weeks after "firing" of the first beam in the
tunnel. At the end of 2010, scheduled in accordance with CERN, the
accelerator to work with lead ions for the first time. After this, the
accelerator will be shut down and will reopen at even higher energy level
of 7 TeV per beam, which would allow the collision of particles in
opposite directions by action seven times higher than ever achieved
before. Physicists hope that these conflicts, among others, will reveal for
the first time, new "exotic" matter particles or even opening up new
dimensions of space

Measures of radiation protection at CERN

In research laboratories, such as the European Laboratory for Particle


Physics, CERN, the presence of radiation in the workplace is something
everyday. Therefore strict measures to avoid unnecessary and
maintained at a minimum the unavoidable exposure to radiation.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 72
The CERN strictly follows international accepted principle ALARA (As
Low As Reasonably Achievable), which means that each report is kept as
low as reasonably acceptable. Below explains what radiation is and how
it is measured. Describe the procedures used at CERN in order to ensure
the protection of workers and visitors from radiation and to avoid any
danger to the environment.
Besides accelerate electrons and positrons at CERN and operate
machines accelerate protons, ions and antiproton lead. The proton
beams, antiproton and high energy lead ions interact much more
dramatic way than the material the electrons or positrons, leading to the
creation of radionuclides, and neutrons. The neutrons have much higher
penetrating ability of protons to the same action. At CERN created a
much greater variety of particles, but because of the relatively small
numbers do not matter as regards the effects of radiation. These muons,
however, an exception. Interact with matter in the same way as electrons,
but because they are heavier are much more invasive and require careful
use of shielding. Neutrinos are produced also in almost all particle
interactions. There are only produced at CERN and in great abundance
in the sun. The interaction of neutrinos with matter is so weak that they
can penetrate the earth as if it was not their way. Therefore, passing
through the human body has no biological effect

New problems in the operation of CERN's Large Hadron Collider The


new problem presented and its operation is interrupted, said spokesman
CERN in Geneva. To repair the defective component is expected to take
at least two to mines.To new problem occurred just one day after the
reopening of the LHC by replacing a defective transformer evdomada.I
this anomaly was recorded at 12.27 GMT on Friday, when the
temperature to 100 of the huge superconducting magnets rose by up to
100 degrees Kelsiou.Enas ton liquid helium used as coolant, leaked into
the circular tunnel, the LHC and had to ask the pyrosvestiki.Olokliros
sector 3-4 of the tunnel 27 km will now be heated to start the repairs.
"The investigation is ongoing but the most likely cause seems to be a
faulty electrical connection between two magnets which probably melted,
leading to equipment failure," said James Saturday Gillies, spokesman
for Representative of the European Organization for Nuclear Research.
The magnets of the LHC must be maintained at a temperature just 1.6
degrees Celsius above absolute zero to operate in a superconducting
state and steer beams of protons to move through the tunnel.
The frontal collision of two beams moving in opposite directions at near
light speed, will allow physicists to recreate conditions that existed a few
microseconds of the Big Bang. The experiments may confirm the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 73
existence of Higgs bosons in, a theoretical particle that explains why
matter has mass. You might also shed light on mysterious dark matter
and dark energy and respond to questions about extra dimensions that
might be hidden in the universe.
Hackers managed to breach computer systems at CERN
Hackers managed to breach computer systems of the Large Hadron
Collider, confirmed Saturday officials at CERN. The esvoleis who claim
that they had bad intentions, to themselves as "Greek Security Team»
(Greek Security Team). As revealed by the British newspaper Times and
Daily Telegraph, the hacker left behind a counterfeit website that scoffed
makers of computer security as " schoolboys. Confirmed that it had no
intention to disrupt the major LHC experiments, and only wanted to show
how ... "Black hole" in network security. "We bring down his trousers
because they want to see you run naked trying to hide when he comes
panic" they write in their message. "I do not know who they are but we
have done harm. Obviously these are people who wanted to emphasize
that CERN may be compromised, "said the Times, James Gillies,
spokesman for the European Organization for Nuclear Research.
Hackers claim to have obtained access through a site hosting the
scientists for the inauguration of the facility Wednesday.
Computers that have invaded the system is connected to CMS, one of
the four huge detectors LHC.Ta experiments on the largest accelerator in
the world are expected to begin in about a month, recreating conditions
that existed a few microseconds after the Big Bang. Perhaps give
answers to "the Higgs particle, dark matter, the antimatter, and the extra
dimensions that might be hidden in the universe. The most complex
scientific instrument ever built will be completed in the summer of 2008. It
sits in a quiet area filled pastures, bordering Switzerland and France. The
reason for the LHC (Large Iardon Collider) at CERN in Geneva, an
underground ring 27 kilometers in length, buried at a depth of 100
meters. Inside Pass will be accelerated particles to reveal the ultimate
laws of nature, what some consider to be 'thought of God. "
Chill magnets for building the facility took twelve years of hard work. The
project was approved in 1996 with a budget of 6 billion and is almost
complete. The 1232 metal cylinders forming the ring have been put in
place. Now we need to link up and to cool the
-271.25 ° C (ie 1.9 degree above absolute zero). This extreme
temperature, which is even lower than the temperature of interstellar
space (about -270 ° C) is necessary for the operation of the 1232
superconducting magnets (one for each cylinder). The magnets will
produce a field 180 times stronger than Earth's, so as to maintain a
circular orbit sets of particles that move within the accelerator. The
particles will close at 99.999999% the speed of light (300,000 km / sec).
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 74
The magnets have been partially tested and should be operating by the
end of May, when the LHC comes into operation as planned. Then you
follow a few weeks of tests and measurements, with the hope to start
testing around mid-summer.
As a 80 kg TNT
When you are ready, the LHC will operate as follows: inside will move in
opposite directions, two "parallel" sets of protons, particles located in the
nuclei. In the structure there will 300,000,000,000,000 protons per bunch,
divided into 2808 packets at 7.5 m from one another. The cartridge will
intersect at 4 points where the detectors are installed. There will be made
proton-proton collisions, which they want to study scientists. Each conflict
has effect «14 TEV», seven times more than is feasible in the current
most powerful accelerator, the Tevatron at Fermilab in Chicago.
Illustration, we mention that this action corresponds to the energy
produced when a mosquito flies. It may sound insignificant, but it is a
proton, which is 10,000,000,000,000,000,000,000 times smaller than a
mosquito. Let's look at a different way: all the protons of the experiment
will have a total mass of just half a millionth of a microgram ... But it is so
fast that their energy is equal to 80 kg TNT.I frontal collision of two
protons will be so violent that would enable a phenomenon for us is
strange, but it is predicted by the theory of relativity, the transformation of
energy into matter . The energy of the collision will be concentrated in a
tiny space and transformed into hundreds of particles that are born
seemingly out of nothing and escape in any direction. What physicists
call the "fact".
The cluster of galaxies Ofiouchos is one of the brightest clusters in the
sky at wavelengths of X-ray X-rays detected are too energetic to originate
from the calm hot gas inside the swarm, indeed shows that giant shock
waves should be disseminated through the gas. This has turned the
population of galaxies in a giant particle accelerator. The picture shows
the shock waves (red) to travel through the hot gas as two galaxy
clusters collide and merge. Most of the X-rays from hot gas in the cluster,
which in the case of Ofiouchou is extremely hot, 100 million degrees
Kelvin. We do not know yet is exactly how most of the produced X-rays
are directed at researchers two choices. The first option is that the
electrons are captured in the magnetic field that permeates the cluster. In
this case, the electrons would move spiraling around magnetic field lines,
releasing synchrotron radiation beams form X. The second option is that
the electrons may collide with microwave were the beginning of the
universe and now bathe all the time. In such collisions, the electrons lose
some energy, emitted as rays X. Which results will help scientists
understand the history of the flock, to determine whether the main cause
is the clash of two flocks, but how recently the flock of Ofiouchou
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 75
swallowed the flock that came. The truth is that nature has transformed
the population of galaxies in a powerful particle accelerator, perhaps 20
times more powerful than the clash of the Big Collider CERN (LHC).
To Large Hadron could detect "anti-particles" Understanding the
mysterious Black Matter in our universe, cosmologists is paramount to
us. The black matter and dark energy, a vast majority of mass in the
aesthetic universe.
Affect the rotation of galaxies, to clusters of galaxies and even holds the
answer to the fate of our universe. So no surprise to us have heard about
some unrealistic physics behind the possible structure of this hidden
mass. A Harvard scientist has stepped up this whole situation by
publishing his understanding on the dark matter, believing that the
answer may be found in one type of material mass, but it behaves like a
molecule.
"Anti-particles" can also be detected by high energy particle accelerator,
as the large detector Hadron (LHD) located at the Center for Nuclear
Studies and Research (CERN) which will be no world wide web a few
weeks. The high energy physics is about to become stranger than it is
already ... The dark matter theory has many forms, including: neutron
stars, weakly interacting massive particles (WIMPs), neutrinos, black
holes and halos ogkodisympagi (MACHOs). It is difficult, however, be
understood by deriving the majority of the mass if you can not comment,
many of those who "know" about this dark matter and energy source, it
will remain just theory until we actually find a way to follow.
Now, we are likely not only to observe a form SkoteinisYlis but also to
produce. Professor Howard Georgi, Harvard University physicist, wants
to share his idea that the "missing mass" of the Universe can be kept in a
content type that can not be explained by current understanding of
physics. The revelation came to him when investigating what to expect
from the future results of experiments LHC. Beginning with quantum
mechanics (as one would expect), focused on the interactions between
sub-atomic particles. Using the "standard model" that describes
everything we know and understand about the matter in our Universe
(interactions, symmetry, leptons, bosons, etc.), Georgi soon found itself
in deadlock. Then came a key requirement of the standard model: the
forces that govern the interactions of molecules act differently on different
length scale. The Georgi made a bold move, assuming it can be
produced by the LHC without the help of standard sub-atomic length
scale constraints and thought if the "anti-matter" or not, exploring the
possibility that the pilot thought you might need to slightly epanakinithei
the extreme world of high energy particles conflict will certainly lead to
some healthy scientific debate. * Quantum physics has revealed that
among the molecules is a fundamental symmetry of each elementary
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 76
particle is symmetrical with an antiparticle same mass but opposite
electric charge. Particles of antimatter have the same stability with the
corresponding particles of matter. Consequently, the electron has an
antiparticle with positive charge, the positron. The proton is the
antiproton, etc. However, the matter and antimatter can not coexist in
very close-spaced, except for minute fractions of seconds, and their
interaction ultimately leads to mutual annihilation, with simultaneous
release huge amounts of energy. Generally, the distinction between
particles and antiparticles are conventional. Particles greater than those
quoted in our physical environment, such as electrons and protons. In
such an environment the antiparticles vanish, it is ephemeral. To produce
the antiparticles must be high energy collision between two particles. In
this case a part of the energy is converted into matter and antimatter in
one.
 It is assumed that some distant galaxies may consist solely of antimatter.
One of the consequences of this theory is the probability at any point in
the universe there are antimatter worlds inhabited by ... antianthropous

Starts great experiment in CERN, o Large Hadron Collider


Starts at 10:00 (GMT) the greatest experiment in the world, under the
Franco-Swiss border, the huge basement, length of 27 km, Large Hadron
Collider (LHC) of the European Organization for Particle Physics
Research (CERN), which promise to shed light on the circumstances of
birth of the universe and allow the discovery of new particles of matter.
And - incidentally - is expected to dispel fears of many that will bring the
end of the world through the black hole can be created.
It is worth noting that the start of the experiment will be broadcast live
from the site http://webcast.cern.ch/index.html
It is now a fact. After at least a decade of preparation and invest 6 billion
on September 10, will begin the first phase of operation, the largest
machine in the world, the Large Hadron Collider (Large Hadron Collider -
LHC) of the European Organization for Particle Physics ( CERN) near
Geneva, an underground circular tunnel construction in depth from 50 to
175 meters long, 27 km in diameter and 3.8 meters below on both sides
of the Franco-Swiss border. Twenty member countries (including Greece
and since 1954 as a founding member) involved in the drive, which can
be described as historic and televised by CERN (webcast.cern.ch), while
the picture will be distributed through network of Eurovision.
The first test synchronization of various components of the accelerator
was on August 9, 2008, and several other subsequent weeks. The first
beam particle accelerator will be released on September 10 will have an
initial energy 450 GeV, or 0.45 trillion electronvolt (TeV). Inside the
accelerator, where the temperature has now dropped to just 1.9 degrees
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 77
Celsius above absolute zero (-271 degrees) that is lower and the
temperature in outer space will become the first rays emitted particles to
move and be the first protons collide, the energy seven times higher than
any other time in the past.
In 2008, the beams will circulate in the LHC, have stabilized, so now the
power of the particle is expected to be increased to 5 TeV. When we
started the comprehensive phase of operation, probably in 2010, the
energy of the particle collisions will exceed by about 30 other times in the
past. According to an analysis of the Economist, is the largest-and long-
awaited by the scientific community, step in particle physics for a quarter
century. The last major discovery in physics of subatomic particles was to
find the so-called W and Z boson 1983.Kalos the supposition, unless the
dominant theories ultimately prove incorrect, the next big moment will be
the discovery of the Higgs boson of, a - currently-theoretical construction
needed to give mass to other particles that make up the material.
Logically, because the LHC, the discovery will be done quickly - if not,
then the physical will be in a very embarrassing ... In fact, physicists are
not invested so much money on "monster" of Geneva, only to find a
particle in any otherwise provide the equations. What hope is to enter an
unknown territory of matter. So far, the dominant theoretical model
(called "Basic Model") contains 16 discovered subatomic particles known
names (electrons, photons) or more exotic (mouonia, gklouonia etc.) and
an 17th item that is pending confirmation (the Higgs boson). Another
mystery, which the LHC can resolve, is the true nature of 'theory of
everything ", the physics ever expect to develop. Until recently there was
a consensus of individuals that it would be a form of "string theory", which
among other things, contends that the universe has no fewer than 11
dimensions. In theory the particles are perceived as multidimensional
vibrating "strings". The vibrational modes to determine the nature of each
somatidiou.Eschatos But string theory has found a rival in the face of the
theory of quantum gravity loops »(loop quantum gravity), which states
that the particles are separated from the space and time, but rather the
space and time consist of "lanes" shaped loop (loop), which, when
intertwined with a number of ways, being perceived as particles. Finally,
the LHC in Geneva is not excluded to make the miracle and to create
small "black holes, which are however not going to swallow the Earth - as
the scientists reassured Concerned! Just take not so much to manage
this. What should happen is quick to dispel the so-called "Hawking
radiation", a theory of the famous physicist, that if indeed confirmed by
the experiments of the LHC, will probably give the next Nobel Prize in
Physics
 

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 78
Emena but my friends because something tells me that going to repeat
the famous experiment of Philadelphia;
Why do I suspect that epieiroun to control time and space to intervene in
the past and correct the future where they need;
The whole project is not a scientific experiment, but this superiority as the
Vulcan! Stand in the middle of the 2nd stage, as if we are below the
turbine missile already begun antlistrofi measurement.

KOINA ITEMS AND EXPERIMENT FILADELFEIAS СERN


• Construction of a huge electromagnet
• Create a powerful electromagnetic field - green misty cloud
• Effect of Molecular Matter
• Vibrating particle forces
• Release from timelines
• reassembly in another timeline

Windsurf and Beach Volley Teleportation


Question. Making the reassembly of materials at the desired time; If you
do not succeed we will have a black hole that swallows up the material;

THIS IS THE SETTING FOR MY accelerator СERN, was created


ASTRIKIS PILI.

The Philadelphia Experiment

The Philadelphia Experiment, or otherwise «project Rainbow» was an


experiment conducted by the U.S. Navy in October 1943 (the 28th of the
month at 7:15 a.m. according to some sources) in Philadelphia (ex'ou the
name «Philadelphia Experiment »). The objective of this experiment
remains in the spotlight, even today, there is considerable confusion as to
what they wanted to achieve and what finally succeeded with the
experiment if we were. But before studying in detail the data from this
experiment should be noted that some confusion. day following the trend
of the human being deals with mysterious and fantastic tales, should be
taken into account and the huge influx of information that has occurred
during recent years. This input includes a number of inaccurate and often
misleading views and some from the U.S. Information Agency, in order to
confuse the public (is also klassikotati regularly, not only in terms of
Americans, but overall). So it should be noted at the outset that some
sources of information, tithontai 'conditional' and quite possibly a product
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 79
of misinformation.
What happened? What is supported by the side of the proponents of this
experiment is that a destroyer escort ship heading Cannon, named DE-
173 Eldridge, disappeared from the port of Philadelphia in a thick green
fog appeared after 15 minutes the port of Norfolk in Virginia (distance
would require about 24 hours journey) and then reappeared in
Philadelphia. The implications of this experiment, but the ship's crew was
terrible (which is why the test was considered failed). Many died, some
disappeared, others went mad, and some even incorporated into the hull
of the ship! The 3 dominant scenarios explaining this experiment are: 1)
The theory of artificial invisibility when the ship was equipped with high
frequency generators, which would make the ship invisible, warming the
surrounding air and water. As argued, this can actually be done by
appropriate means, essentially causing a reflection. According to this
theory, the field generated around the ship but it was electromagnetic
heating. The scientific approach (which contributed a Canadian named
Alexander S. Fraser) allegedly used high-intensity ultrasonic waves,
which were able to heat the material. Moreover, it is known that such
thermal inversions are caused by optical illusions in the desert and make
entire islands 'invisible'. This scenario explains the observed green fog
surrounding the ship, and the complications presented to sailors aboard
the ship. The weakness of this version is that the supporters of the ship
traveled regularly to the Norfolk - which, as mentioned above, is
inconsistent with the limited time the trial and therefore does not explain
how it was seen at the port of Norfolk through 15 minutes. It also does
not explain how the sailors were on a ship, and argues that simply fainted
and lost track of time because of the strong ultrasonic field was created.
2) The official announcement of the Navy, during which the ship did take
part in an experiment, but was designed to be invisible to underwater
magnetic mines. This involved wrapping the vessel with a wire to
inactivate the magnetic field and make it invisible in some mines (but not
on radar) based on proximity sensors to trigger them. This process is
known as demagnetization. It is a relatively reassuring announcement,
but that leaves some gaps. These gaps have to do with why organized
an entire experiment, and even a codename for the demagnetization of a
ship, since the technique was known and was repeated in the past. It's a
fair question that the Navy has not answered, giving the right to many
extreme views to be expressed.
3) The theory of transport in space and time, which is the most extreme
as well as supporters of the ship actually tilemetaferthike. In this version,
is said to have participated in a number of eminent scientists such as
Einstein on unified field theory (although he was not present in the
experiment, most of the research which said that the navy was based,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 80
was this theory) and Tesla (in electromagnetism) reported by some as
the head of the experiment, although some had died prior months. Some
even claim that the Tesla was murdered because they disagreed on the
existence of the crew in that boat. Proceedings of the Eldridge wrapped
with a wire which went through alternating current, causing the formation
of a magnetic field around the ship (due to the creation of Oscillating a
large magnet), bending space-time. Here of course we should say a few
words about how it could happen ...
A few words on the Consolidated Field Theory
Einstein in the General Theory of Relativity argued that gravity was not a
traditional power, but a distortion of spacetime. The John Archibald
Wheeler in fact, trying to make a summary of this theory, states that "the
space affects the material, and tells how to move. And the material reacts
in space and tells how to curved.
The above mentioned two main reasons:
1) Why gravity is that for many years been afflicted scientists. To
complete the unified field theory, should find a single theoretical frame in
which coexist the 4 fundamental forces of nature: the electromagnetic,
strong and weak nuclear and gravitational force.
2) Why, in the words of those who support the validity of the Philadelphia
Experiment, the unified field theory was something that applied then
using a result of (orally expressed by Einstein) that if you can bend light,
you can bend and space. However revealed how such a conclusion
regarding the use of this theory for this experiment? Early as 1930, the
sciences and mathematics had shown great progress, which was meant
to speed on the "needs" of the Second World War. It is also known that-
unfortunately-sciences are evolving rapidly in times of war, to military use
different conclusions arise for the natural superiority of the country facing
the enemy. That being so, in 1933 founded the Princeton Institute for
Advanced Studies (Institute of Advanced Studies) and during operation of
the pass there are several eminent scientists such as Nikola Tesla.
During the Second World War, the discovery of some of the researchers
of the Institute attracted the interest of government (and non-secret)
services, providing many possibilities for efficient electronic camouflage
for vehicles with a continuously changing coordinates (moving). Of
course, the U.S. Navy had an absolute need such techniques "invisibility"
because he had suffered great losses but also because it could cause
even greater to the enemy. Imagine even a ship invisible to enemy radar
of what would cause panic! Thus, in 1936, rumors like the U.S. Navy to
finance a secret project code-named "Rainbow" in which, through the
development of very strong electromagnetic fields could make a ship
invisible. At the same rumors, head mounted Tesla, who later renounces
(or dismissed or killed according to the conspiracy theories) because of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 81
disagreement to be fully utilized to play the role of the test animal in
question board. As a replacement for Dr. Tesla out. Von Noumea (and he
said the institute). Conflicting information, and are probably part of the
various conspiracy theories state that Einstein did not participate in the
experiment, while an engineer Eldridge, o Silverman, says he saw the
preparations of the experiment. As it anyway, insisting that the
experiment was based on the theory of the unified fields.
It all started in 1955 when it was released in America a book entitled
«The expanding case for the UFO» (the case of UFO). Author of this
famous, as it evolved, the book was the Morris K. Jessup, holds
undergraduate degree in mathematics and astronomy professor and too
little at the University of Michigan. Despite this, the Tzesap was not
recognized in the scientific community and the main study was far from
its purpose. Grappled with the idea of UFOs before they become fashion
some years argotera.Ton January 1956 Tzesap received a letter
(postmarked in Gainesville, Texas) from someone who had attended his
lectures and read his book, the Name Carlos Miguel Allende (Carl Allen
and apparently it was his real name). In the letter, Allende, among others,
do the first report of an experiment in the U.S. Navy took place at the port
of Philadelphia in 1943 which led to a whole become invisible destroyer.
Allende himself claims that while serving in the commercial USS Andrew
Furuseth in Norfolk in October 1943 (data to be confirmed), saw a ship
suddenly appears through a veil of mist and green after a few minutes to
disappear. On claims that he read a newspaper in Philadelphia to the
contrary, ie, a ship that disappeared from the port of Philadelphia and
reappeared a few minutes later. Descriptions Allendes the experiment
continued with references to odd incidents resulting from the effects of
the experiment to members of Eldridge. Characteristics indicate a man
who disappeared in front of his family, passing through a wall, and some
others disappeared (became invisible) during a quarrel in a bar. Others of
the crew were burned alive or exaflothikan, while those who lived
suffered from serious psychological disorders. Concludes that the results
of the experiment was far from desirable and so the surveys Navy
stopped 3 years later. The Tzesap not initially convinced by the
descriptions and Allen wrote in asking for more details and information to
confirm the story. The information came on 25 May 1956 a second letter,
in my opinion is pretty interesting ... The most interesting in this is that
Allen insists that the hypnotized to remember details like the name of the
newspaper, date, article title and page number as well as names and
grades of seafarers, addresses and telephone numbers. It is indeed
surprising that Allen not only has knowledge of parapsychology and of
what can bring hypnosis to the surface in terms of information but also
offers to mesmerized by a reliable hypnotist who will offer the Tzesap to
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 82
emerge all the details know about this experiment.
It says so in the letter "As you know, someone who has mesmerized can
not tell lies and someone who has mesmerized and has given time and
the" truth serum "as it is known, it could hardly be lied. Also, knowledge
on parapsychology derive from another passage that says "it is known
that some people might under hypnosis to tell you the name and address
of a person even if you do not have seen or ever. These guys have a
great player or just a big force Y which may be increased in times of
stress or tension or intense fear. It can also epanentathei under hypnosis
and then it's like reading the Encyclopedia Britannica ».
Whatever way, the Tzesap still not convinced. Perhaps the specific
spelling of Allen characterized by asyntaxies, the extensive use of capital
and weaknesses in different content to be pushed to the doubts
concerning the validity of the story. The rest are expected to become
even more interesting since the spring of 1957, Jessup received a
request from the Office of Naval Research in Washington. There, they
showed him a copy of his book, whose margins were handwritten notes
in three different colors of ink in three different handwritings. These notes
included what had been told by Allende in his letters, and detailed
reviews of significant scientific and technological requirements for space
travel, flying saucers and theories of Einstein and Tesla. This is perhaps
the only confirmed the fact on the experiment, as the book with notes and
letters of introduction to the Tzesap Allende, a few printed copies and
was named Varo Edition, the name of the company that made the
reproduction. It would be naive to effortlessly accept the validity of those
described by Jessup in his book or Allendes in his letters to the first.
However, the views put forward and the explanations given by the
experiment of Philadelphia and the general subject of the book Tzesap
have enough interest. What remains truly remarkable, however, is
interest in the Office of Naval Research (Office of Naval Research) for
this book, although the notice of the Navy described the move as "a
private initiative of some officials of the Office of Naval Research" .
The death of the Jessup Jessup «suicide» two years after the reprinting
of Varo Edition of his book on April 20, 1959. The official version says
that he is in a bad psychological state because of marginalization by the
scientific community because of the "heretical" views. Friends and
colleagues advocated this view, while it is known that in the intervening
years Tzesap began to open, making his story known. But the details of
his death is relatively strange to lightly accept the above scenario. The
last two years of his life believed Tzesap discussed thoroughly with the
experiment of Philadelphia making tremendous progress. So one night
before committing suicide, call the partner Manson Valentine saying he
probably found something on which the experiment was to show him.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 83
Closed meeting for the next day, just as it never met the next morning
Tzesap found in the car to a park, almost dead. The way we 'chose' to
die was through the steam engine and connected to the exhaust inside
the car. In the passenger seat was found a note allegedly written by him
before committing suicide. Other rumors speak of a large quantity of
alcohol found in his blood, which in combination with psychotropic drugs
he was taking at that time was sure death. This means that I needed to
do the patent made by evaporating to die, and even if needed, could not
even think about the following as alcohol. Others say the bad psychology
because it was getting a divorce because of the bad critics who had
gotten his books. The conspiracy, but also and more believable in my
opinion here is that she was murdered for what they knew. Indeed,
although there is no evidence and no body was ever passed by autopsy,
it is very surprising that on that day, instead met with Dr. Valentine chose
to go to a park to kill himself. After the death of Tzesap, movements of
unknown Allen as he was traveling constantly, either in Mexico or the
U.S. or elsewhere. The Philadelphia Experiment, but started to become
known to a wider circle of people, which seems the issue only three
books in 1967:
~ The first titled as «The Allende Letters» by Brad Steiger, who had
actually received letters from Allen.
~ The second is the «Anatomy of a Phenomenon» by Jacques Vallee,
who had also received letters from Allendes with comments and
information.
~ The third is called «Uninvited Visitors» and the author of the Ivan
Sanderson, was friends with Tzesap believed to have exchanged a
number of useful information about the experiment.
Two years later, did something unexpected. Allen visited the offices of
Varo and requested a copy of his book Jessup. Then he went to the
offices of the Aerial Phenomena Research Organization (ARPO) Tuscon
in Arizona and informed them that the whole history of the Philadelphia
Experiment was just a farce. From then lost again to found in 1979 in the
pages of the book «The Philadelphia Experiment» by Moore and Berlitz,
which book is a very good research that actually did the experiment
known to the world. The last mention of Allen made in 1983 where he
gave an interview to the author, Linda Strand. Since then becomes once
again disappeared until he died in 1994 in Colorado, including
information from the files of the Department of Social Insurance
A dubious witness in the mid-80s, appeared another witness who caused
a lot of noise with the statement "I was there and saw with my own eyes."
The Al Bielek, claimed that he was one of two Navy sailors who operated
a machinery control room at the Eldridge. According to his version of
history, puts the experiment in Philadelphia in two stages: on July 23 the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 84
first and the second August 12, not October as hitherto believed
happened. He continues by saying that the crew traveled 40 years in the
future to 1983 and found underground facilities program Montok "in Long
Island. There he came into contact with are old Dr. Noumea, who
explained that the experiment had escaped their control, created a rift in
time and space and had to go back to Eldridge to shut the generators
otherwise the time warp would grow and engulf the earth. In essence
though, this is the script of the film "The Philadelphia Experiment" which
had great success at that time (1984). Bielek himself said that he
remembered everything when she saw the movie, and until then had
been brainwashed by the Navy to forget the whole story. It states that "In
families (the crew) are not ever told the truth. They said they were lost
during naval warfare, which is of course a very credible response. "And
his view on the results of the crew that" The body could not withstand
exposure to such a high electromagnetic fields' . Over the next few years,
Bielek was caught by some "known" aspects of history and ontas his PhD
in physics, was very good at giving many technical details of the
experiment in his books, interviews and lectures. Since then they have
done other "witnesses' appearance, who they said were members of the
crew, but all more or less repeated the script.
Now, of course, comparing the words of Bielek with those of Allen, we
see that there is a huge difference in the time of the trial, as the stories
are different in two months. If we accept the date given by Allen, then the
experiment was conducted after the official entry of the ship in active
service, something that should be our concern regarding the absence of
any testimony by the crew. Moreover, after 60 years, more and
something could get from everyone, whether accidental or intentional. On
the other hand, if we accept the date given by Bielek, then this indicates
that the experiment took place before the opening of the vessel. Himself
Bielek claims that used an 'anonymous' crew of which, those who
survived after the experiment, were admitted to the psychiatric
emergency hand, and to ensure their silence.

The investigation of Moore & Berlitz on the ship's identity


In one of the most enlightening books that were released on the
Philadelphia experiment, the proposed «The Philadelphia Experiment»
by Moore and Berlitz, given information about the ship was in the
spotlight after reports of Allen for the experiment. Here we should
mention again that although confirmed that Allen had served on Andrew
Furuseth in Norfolk at the time, is reliable testimony that he saw the
Eldridge and not another boat that day, as understood by Here is doubtful
the validity of the story about the Philadelphia experiment. Consider,
however, the identity of the ship, a destroyer escort named DE-173
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 85
Eldridge Cannon class with 1240 tons displacement. The official records
of the history of the book informs us that: ~ entered the service of New
York on August 27, 1943
~ Used as an accompaniment to missions in the Mediterranean and the
Atlantic until 1945 when transferred to the Pacific
~ Eldridge (Reserve Fleet) in July 1946
~ Resold in the Greek Navy on January 15, 1951
~ After years of service, transferred to the Naval Arsenal in Sudan in
1991, where paroplisthike to "make screws" somewhere in the late '90s
In particular, for the relevant period of the experiment, the records of the
U.S. Navy wants the ship to remain attached to the port from 18 October
1943, when accompanying a convoy returned to New York until 1
November when he left for Norfolk (which remained until November 3)
and then in Casablanca, alongside the convoy GUS-23.
Another controversial point concerning the ship calendar, as there are
rumors saying that the pages relating to the period of the experiment are
missing. This means that the Navy, although it held a great significance
of such an experiment, just not bothered to put a fake diary, but tore the
pages of an existing one. In an epoch-making significance test could not
violate the "sanctity" of the calendar ...
As it may, the calendars of any ship kept the same for the maximum
period of one year and then transferred to the archives of Business
Administration where he kept. So the log Eldridge, a national U.S.
authorities and are publicly available.
Something else we could ask ourselves is why it was chosen a new (and
valuable to the needs of war at the time) the ship for the experiment and
not another older. Also another reasonable question is why the
experiment took place in such a "busy" place where everyone could
witness the experiment, indeed how undercover agents recorded his
opponent moves all of the Navy in Philadelphia. Perhaps the experiment
aimed to impress the enemy, but here there is the question of why it did
not change the name of the ship for misleading any indiscriminate viewer.
It should be noted that there were then about 70 vessels of around
Cannon which was identical to Eldridge.Milontas the vessel used,
however, the most logical thing would be to do everything that no one
can understand what it was, to conceal his identity from intrusive
investigations and, if not destroy, to hide it somewhere so do not know
anything about this ship. This is because the Eldridge like a ship is a
tangible item and is also the reason why we hear so much noise around
it. Despite this, the ship was not the fate of other similar (which either
went into liquidation, or used as targets with live ammunition during the
'70s), but moved to a place away from the geographic area which would
be subject to indiscriminate investigations.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 86
The Eldridge in the Greek Navy
The first mention of the mysterious ship in Greece was the playboy
magazine in October 1996 (apparently it is the period "were screws)
which presented photographs and became known to history. It is strange
that his identity was known to Greek audiences from a magazine of this
kind. However, the vessel had resold the Greek Navy in the aid program
on January 15, 1951. The Leon D-54 »renamed as Eldridge, was one of
the 4" beasts "who were transferred to the Navy, while the remaining 3
was" Ierax ", the" Panther "and the notorious" Eagle "which for the
record, was to become famous as "starred" in movies like "Alice in the
Navy," "The Guns of Navarone" and others.
Naturally, of course, there were a number of sailors who served in the
'Lion' on the inside. First of all the American records refer to 1240 tons
displacement, as above, and 1520 tons full load. The Greek records
mention but a displacement of 1240 tons and 1,900 tons full load. This
means that their resale to Greece removed 380 tons of equipment. What
equipment might be he; Other reports speak of strange wires within the
vessel does not seem to lead nowhere, which in fact are common to
ships of this type. Others also speak of hallucinations members, strange
noises (as usual) but also sealed hatches. However, we know that every
five ships sent to the shipyard for repairs, painting and possibly some
electronic or mechanical upgrades, suggesting that probably would be
difficult to have left some information that will give us valuable information
on the relation ship with experiment. A conspiracy theory that has
afflicted some researchers is that "in reality" the "Eagle" was the ship
used in the experiment and not the Leon, as the Navy deliberately
changed their identities upon delivery to the confused traces. And draws
this conclusion because of some odd references to the "Eagle" which
says that the ship had a "strange" behavior (failures in communication, a
temporary disappearance from the radar, etc.). The merits, however, is
that Leo used in the experiment, equally valid is that used by the Eagle.
For the record, the Eagle was decommissioned the same year with Leon,
in 1991, but had a different fate and was donated by the Government of
the Union Navy escort destroyer (DESA), which collected the sum of $
275,000 of its members . Towed to the U.S. on 23 August 1993, re /
rebuilt by volunteers and a common sight on April 30, 1994, taking the
original name «USS Slater DE-766». Perhaps the Eagle to have
something special compared with other 3 "beasts" ...
However, the prevailing conspiracy thoughts regarding the resale of the
Eldridge in Greece is that the U.S. Navy did not want to ruin and may
have some value in that, so I opted to send in a distant country to lose
the traces. But could also be given another identity to that ship for
defensive reasons, to transfer the interest elsewhere and so the Navy
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 87
can do the surveys they want properly (eg to use it as an exhibit in a
Maritime Museum as a cover for keeping the "life").
Why not repeated the experiment?
This was repeated in the American base on Crete;
Since the Philadelphia experiment was highly publicized, have made their
appearance several scientists such as Al Bielek, for example, which
provide detailed reports and technical analysis of how it was done the
experiment. Also, the aim of the experiment itself would be a great
technological leap if indeed happened. It would be reasonable to wonder
why not repeated the experiment, while "we know how it happened" ...
The answer is that "we do not know." Those scientists illustrate their
objections to the validity of the experiment, as many people say
happened. And most important here is that both sides are right and true
otherwise. But it is worth to think that physical evidence given by various
researchers and scientists, treading on the thin line fraud because it is
relatively easy for some "guru" of physics to place terms like torque,
frequencies, power levels, pulse widths, vertical magnetic axis field, etc.,
in order to confuse the audience, making them unable to understand, to
express their queries and indeed how to judge how valid are these
elements or not. Conclusion
Assuming that it really was an experiment in Philadelphia, then we are
faced with a major technological breakthrough and most who had the test
been confirmed. Despite this, it should be given several answers about
what really happened to the ship and its crew.
If you assume otherwise, then "stumble" upon a sufficient notice of any
seaman as to what happened in the mysterious "suicide" of Tzesap and
caring for shipping the book. Moreover, it would be so difficult for the
Navy to pull another better communication to illuminate further the case,
even the rejects. But even if it is difficult to admit that such a story was
actually one day, should be borne in mind that from 1943 until today,
huge advances in technology and shocking crimes committed through
this progress could be " justify "the existence of yet another experiment,
the" Rainbow ". Yet, the American navy never went to the trouble to
explain, which prompted this wave of conspiracy theories and
parafilologias we see today around the Philadelphia experiment ... The
'Philadelphia Experiment' - The story of the mysterious ship Eldridge (DE
127) and disappearing - perhaps a successful experiment "invisibility"
Whether may be missing an entire destroyer, in a few minutes to appear
on another distant point and then to reimburse the initial position without
passing by any obvious intermediate point? since the Second World War
in October 1943, the U.S. Navy carried out a secret experiment
"invisibility". Using electromagnetic fields failed to extinguish an entire
destroyer with the crew of the naval base in Philadelphia, to develop
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 88
naval base in Norfolk and then back to Philadelphia. And all within a few
minutes. But the side effects that the experiment in the crew of the ship is
nightmarish. Many of the crew became invisible and could not feel their
environment. Several of them disappeared and were lost forever, without
anyone to find them. The Navy after that concealed the fact and
considered void. Instead, the remaining evidence. Many are those who
claim to have seen through the destroyer based in Norfolk, but none of
them can be seen entering or leaving the naval base. Proceedings of the
experiment was successful, although after the results of the crew and
overshadowed covered. The case was investigated first by Dr Jessup.
The Jessup did research on the existence and functioning of the UFO
when he received a letter from someone unknown who signed as Carlos
Miguel Allente. Among other things Allente mentioned in an experiment
that took place at the naval base in Philadelphia, which he argues that
followed located in another boat base. Initially did not particularly
important, until he received two more letters from Allente and the editor of
a book on the UFO filled with corrections, notes and comments which
were written by Allente. This intrigued the author to initiate an
investigation on the issue. Several years later, Dr.. Tzisap found dead in
his car. The death was ruled a suicide. It was said that suicide in the
fumes of the engine of the car, linking the interior of the car exhaust.
Inside the car was found a note that said Tzisap wrote before committing
suicide. Autopsies on the body for determining the true cause of death
was never my blood and found a sufficient quantity of alcohol which is
removed enough to cause itself to death. It is worth noting that
psychologically took medication for a long time something which, in
combination with alcohol can also lead to death. Considering therefore
that at that point Tzisap was intoxicated is a bit difficult to say that suicide
in the manner described. So there is the possibility of forgery of the note
and the murder. So can Dr. Tzisap be killed because of investigations
made on the subject, which were at an advanced stage? Very unlikely in
my view. Carlos Allente was a strange man for whom there is not enough
personal information concerning him, as place of origin and residence.
His real name may be indeed the simplest Carl Allen. The letters are
illegible, the result of the specificity with which they were written. These
letters were written using inks of different colors and is capitalized rather
than specific points, but incoherently and often interfered in the middle of
words. Use at least 3 different colors of ink have been made and
corrections of his book Dr. Tzisap. Many believe that reasonable
adjustments are made by 3 different people, but studying and letters of
Allente we can conclude that the author of all the corrections that might
be Allente. Carlos Allente it claims was the time of the experiment on
another ship, the Andrew Faraseth which was based on the time of the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 89
experiment. The description of the states that saw Allente creates a
green cloud around the ship Eldridge (DE 173). Then the ship began to
disappear and the only thing left visible was only the outline of the ship
through the cloud, and that if it was near the area, it was possible to
discern details that were behind the boat. The Allente describes that
those who were on the ship felt as if transported to another world. We
saw nothing from the ship around and felt to be suspended. The effects
of the experiment on the crew was different and the duration varied in
many cases. Everyone on board was gone mad. Many were invisible,
even when it was under the influence of the field. The only way to reset
was to come into contact with other crew members. Some reappeared
briefly, but others remained in this state for a long time to find them and
give them back, while some were lost forever, without anyone ever find
them. Someone in front of the astonished eyes of acquaintances and
relatives went through the wall of his house. In a local newspaper of
Philadelphia said there was a reference to an incident in the bar area for
some time after the experiment. The waitress says that she saw in front
of two sailors disappear when taking a drink. We tried to explore the
history attached to two cruise ships, Eldridge and Andrew Faraseth.
Correct result for which the two ships were the period before, during and
after the experiment. The reason is that there were gaps in the logs of
both ships. Specifically missing pages in the diary of Eldridge for the
period of interest (August 27 - December 1, 1943) and the diary of
Andrew Faraseth damaged. The official figures indicate that the Navy
ship DE 127 has length 306 feet and a displacement of 1240 tons and
1520 tons full load. The ship was sold to the Greek Navy, renamed
"Leon" and exists today. Studying the Greek figures we find that the
displacement of the ship is 1240 tons and 1900 tons full load. A paradox
here about how increased the total tonnage of the ship's 380 tonnes of
resale. This can happen only if the equipment is removed from within the
ship. So you could say that electronic equipment was removed from the
ship before it was resold to the Greek Navy; The Greek records also
indicate a completion date and chartering the ship just a month before
the official date mentioned in the diary and official records. Reference is
made by Allente even in the name of Albert Einstein and his work on the
Unified Field Theory. Einstein adopted the Unified Field Theory in 1925
and withdrew two years later, in 1927, for "humanitarian" reasons.
Einstein was aware of how devastating it was to implement the theory.
Example awareness of the risks of theories is the fact that Einstein tried
every means to prevent the President of the United States from the
application of proven theories, and thus prevent a nuclear war. The
Philadelphia Experiment may be an indirect application of the theory of
uniform field. The Navy issued a letter he sent to anyone requesting
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 90
information about the Philadelphia Experiment, which was as follows:
DEPARTMENT OF THE NAVY OFFICE OF INFORMATION
WASHINGTON DC 20350 2 3 July 1975 Over the years we have
received innumerable queries about the so-called "Philadelphia
experiment" or "Project" and the alleged role of the office of naval
research (ONR) in it. The frequency of these queries predictably
intensifies each time the experiment is mentioned by the popular press,
often in a science fiction book. The genesis of the Philadelphia
experiment myth dates back to 1955 with the publication of "The case for
UFO's" by the late Dr. Morris k. Jessup, a scientist with a Ph.D. in
astrophysics and a varied career background. Some time after the
publication of the book, Dr Jessup received a letter by a Carlos Miguel
Allende, who gave his address as RD # 1 Box 223, New Kensington, PA.
In the letter, Allende commented on Dr Jessup's book and gave details of
an alleged secret naval experiment in Philadelphia in 1943. During the
experiment, according to Allende, a ship was rendered invisible and tele-
ported to and from Norfolk in a few minutes, with some terrible after-
effects for the crew members. Supposedly, this incredible feat was
accomplished by applying Einstein's never-completed "unified field"
theory. Allende claimed that he had witnessed the experiment from
another ship and that the incident was reported in a Philadelphia
newspaper. Neither the identify of Allende, nor that of the newspaper has
never been established. In 1956 a copy of Jessup's book was mailed
anonymously to Admiral Furth, the chief of Naval research. The pages of
the book were interspersed with hand-written annotations and marginalia
apparently made by three different persons as they passed the book
back and forth among them. The notations implied a knowledge of
UFO's, their means of mention and generally, the culture and ethos of the
being occupying these UFO's The book came to the attention of two
officers then assigned to ONR who happened to have a personal interest
in the subject. It was they who contacted Dr Jessup and asked him to
take a look at his book. By the wording and style of one of the writers of
the notations, Dr Jessup concluded that the writer was the same person
who had written hi about the Philadelphia experiment. It was also these
two officers who personally had the book retyped and who arranged for
the publication, in typewritten form of 25 copies. The officers and their
personal belongings have left ONR many years ago, and we do not have
even a file copy of the annotated book. The Office of Naval Research
never conducted an official study of the manuscript. As for the
Philadelphia experiment itself, ONR has never conducted any
investigations on invisibility either in 1943 or at any other time. (ONR was
established in 1946.) In view of present scientific knowledge, our
scientists do not believe that such an experiment could be possible
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 91
except in the realm of science fiction. A scientific discovery of such
import, if it had in fact occurred, could hardly remain secret for such a
long time. I hope this provides a satisfactory answer to your inquiry. The
'Philadelphia Experiment' may sometimes be executed with 'success', but
may it never happened and is just a farce. The facts and figures on both
sides are many and are often contradictory. There is more information on
the experiment are not reported and which should be studied from all
angles as to the validity of their own data and their sources. The fact that
this experiment was sometimes not yet established, but there are
suspicions that this is probably somewhere in October 1943 to be held By
enigman
The Philadelphia Experiment and the spatiotemporal response to the
Persian Wars
 - Is it possible experiments with space and time have affected our
history?
- Can the infamous Philadelphia Experiment, launched in 1943 in
America, was completed in the 1980s in Greece?
- How involved in the Philadelphia experiment and the activity of
American bases in Greece, especially in Nea Makri and Kato Souli, at the
Battle of Marathon and the Battle of Salamis?
A pioneering work only in the modern era of quantum thought could be
given. For the first time out of evidence and proof for an extraordinary
and bold version to the spatiotemporal response that led the Greeks to
stop the expansionist policy of powerful Persian Empire in the 5th century
BC. "The Philadelphia Experiment and the spatiotemporal response to
the Persian Wars" is an original study of a Greek researcher, that similar
to we can see for over 5 years in the domestic publishing sector. This is a
groundbreaking research linking archaeological and historical
exploration, on-site research and modern theories of time travel. And
when all these are related to ancient Greek history, then the reader's
interest soaring. Spiros Aslanis managed to write a book that I'm sure
you will magnetize the interest of the Greek seekers. The reader is either
satisfied or not by the views of the author, necessarily pass into another
universe, a fascinating alternative history where the hordes of thirsty for
expansion to the west Persia, inhibited by the courageous Greeks. So
far, everything is known. But what would you say if someone claimed that
the strange tales of ancient history for the intervention of mysterious
Echetlaiou had to do to help "sent" from the very near our past in order to
exterminate the Persians?

In July 1943, the American destroyer Eldridge stranded on the docks of


the Delaware for a test of the U.S. Navy had to make the ship invisible.
The official name of the project was "Project Rainbow" (Rainbow Project),
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 92
but became widely known under the name "Philadelphia Experiment"
(Philadelphia Experiment). Much has been written and assumed about
the legendary experiment artificially invisibility (invisibility), well
separating facts from fiction is nearly impossible, especially after the
recent massive influx of false information and deliberate misinformation
that was spread by persons associated with the U.S. Agency Information
(US Intelligence Community) and professional skeptics. There is huge
controversy about what exactly happened in Delaware. It is argued by
some that took a huge leap of science and that the ship traveled in space
and time passed since disappeared from Philadelphia, Pennsylvania, and
appeared in Norfolk, in Virginia, 15 minutes later. What happened is still
unknown, but various theories are detailed below:
The "official" notice issued by the Navy
The Navy acknowledges that the U.S. ship Eldridge took part in an
experiment which included whipping the destroyer of the frame with wire
in an effort to inactivation of the magnetic fields caused by the metal of.
This is known as demagnetization. This would render the ship invisible to
underwater magnetic mines that rely on proximity sensors to be
triggered. These sensors operate detecting magnetic fields around the
ship. Therefore, the ship was able to traverse areas trapped in such
mines, invisible to them, but not on the radar vision. The announcement
of the Navy is quite reasonable and does not include results or unusual
situations. It could however only be a credible description for reassuring
the majority of the public. Besides the demagnetization of ships known
technique, no rare enough to warrant the organization of the entire
experiment codenamed.
Theory of Artificial invisibility
Some scientists developed the theory that the Navy was working on a
method to render the ship invisible to the human eye. However, it had to
do with the folding space-time or any complex of similar nature. This
theory suggests that the Eldridge was equipped with high frequency
generators, which would heat the surrounding air to create a mirage,
making the vessel invisible. This phenomenon occurs naturally, have
been reported cases where whole islands disappeared from sight, under
suitable weather conditions. The high frequency generator would heat the
surrounding air and water (causing even a green mist which occurred
around the ship), causing a mirage, and eliminating ferry from sight. The
generator would be liable even for illness, physical and mental, of the
crew after the experiment. A generator of high frequency can cause
severe brain damage, especially in walking distance. This is a more
believable theory and justifies the physical and psychological injuries
suffered by all members of the crew after the experiment. But it does not
explain how the ship was spotted in Virginia, the crew of the passenger
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 93
Andrew Furuseth, 15 minutes after the disappearance of Philadelphia.
There is even information on some of the crew who, after the experiment
were incorporated in the hull of the ship, or not found at all.
Transport theory in space-time
The most interesting and most far-fetched theory about the Philadelphia
Experiment is that the destroyer, really disappeared and tilemetaferthike
through space and time. Assume that the experiment involved many
prominent scientists, among whom was Nikola Tesla and Albert Einstein.
But Tesla was considered dead months ago. The theory maintains that
the light would be bent around the ship to become invisible. To achieve
this, wrapped around the circumference of the ship and went wire
alternating current from it. This prompted the creation of Oscillating a
huge magnet which formed a magnetic field around the ship, not only
bending the light, but the same space-time. Proponents of this theory
refer to Einstein on unified field, whereby if light bends inevitably bend
space and time as well.
During the first phase of the experiment, the ship is not entirely
disappeared, but the footprint of the structure are deleted in clean water.
The second time the ship disappeared entirely and came 15 minutes later
in Virginia. When the ship reappeared in Pennsylvania, members of the
crew were embedded with the hull of the ship, others were missing and
others had lost her senses them. Indisputable is the fact that apart from
the official announcement of the seaman, it was possible to communicate
with any member of the crew. When the ship was sold to the Greek navy,
the nominal capacity had increased by 300 tonnes, which means that it
had removed equipment from the inside.
It is possible experiments with space and time have affected our history?
- Can the infamous Philadelphia Experiment, launched in 1943 in
America, was completed in the 1980s in Greece?
- How involved in the Philadelphia experiment and the activity of the U.S.
Based in Greece, especially in Nea Makri and Kato Souli, at the Battle of
Marathon and the Battle of Salamis?

A pioneering work only in the modern era of quantum thought could be


given. For the first time out through the investigation of the role of U.S.
Based in New Makri and Kato Souli of evidence and proof for an
incredible and adventurous scenario to the temporal and spatial
intervention which led the Greeks to curb the expansionist policies of the
powerful Persian Empire in the 5th BC century.
In the early '30s, the University of Chicago in cooperation with the U.S.
Navy trying to explore the theory Unified Field of Einstein, started an
investigation into the possibility of missing items by the use of electricity.
The project moved to the Institute for Advanced Study at Princeton,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 94
where continued until the '40s, where a decision was taken to implement
the theory. Object of the experiment was decided to use the destroyer
USS Eldridge of the U.S. Navy. The first trials of the experiment took
place in July 1943 and final test on 28 October of that year. According to
the testimony of one of the many mysterious person taking part in this
story is Al Beilek, who claims that there was eyewitness of the
experiment. The Eldridge loaded with hardware and accessories to assist
in the implementation and monitoring of this unprecedented experiment.
Some eyewitnesses speak JIA two huge generators ton75 KVA, was
located where the front cannon, which will distribute the load through four
coils were mounted on the deck. Three transponders RF (of 2 MW each,
also on deck), three thousand pro tubes "6L6", special synchronization
mechanisms and modulation and other strange and mysterious parts
made to fuel the construction of enormous electromagnetic fields that are
synchronized when appropriate, It was not possible (the theory) to curb
the power and light waves around the ship, making it invisible to enemy
observers.

What happened then;


That day in July, the generators started operating and the giant
electromagnetic field slowly began to form around the Eldridge.
Suddenly, a green mist appeared around the ship, hiding in the eyes of
those who watched the experiment. As reported by witnesses, when the
fog was disbanded shortly thereafter, had taken her and Eldridge, leaving
only the calm waters of the harbor to sway serene, where the destroyer
was moored a few minutes!
The elite officers of the Navy, but the prominent scientists who took part
in designing the experiment, they were amazed by observing that the
ship had lost only one of the supposed enemy radar and their eyes. After
fifteen minutes waiting stopped generators. The green mist began to
appear again and bring her and by that time ghostly Eldridge! Everything
seems to have gone extremely well, but it soon became obvious that
something had happened ...
Once the officers and scientists boarded the destroyer to verify the
results of the experiment, they discovered that the crew showed
symptoms of nausea and loss of orientation. The crew and officers of the
ship were replaced, the Navy decided that what mattered was only the
extinction only by the radar equipment of the experiment was changed
and everything was ready JIA a repetition of the experiment. The naval
base in Philadelphia during the World War II's famous experiment
allegedly took place at the Philadelphia shipyard and the open sea
several times, one of which is attended by members of the ship Andrew
Furuseth and other surface ships. The Andrew Furuseth has a special
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 95
role in history, because one of its members (the alias Carlos Allende or
Carl Allen) constitutes the main source of information on what we know
happened (or not occurring) on that day in October. Through a series of
letters to someone Dr. Morris Jessup, the Allende describes what later
became known as the "Philadelphia Experiment". Indeed, on October 28,
1943, at 7:15 in the morning was the final test on the Eldridge.
Generators were resumed, the field began to take shape and the
destroyer began to fade ... Only a faint outline of the distinguished above
the water. For a few seconds, everything seems to go according to plan,
when suddenly everything changed ... Inside a huge blue flash the ship
disappeared completely! According to later information, Eldridge
appeared in Norfolk, Virginia, dozens of miles away from the naval port of
Philadelphia, where many saw it for several minutes. Then mysteriously
the same, the ship suddenly disappeared from the port of Norfolk to
make his appearance again in Philadelphia! This time, however, as noted
later, the crew showed severe symptoms of various forms of
incapacitation. Some "lost" forever, others went mad, and rumors speak
of five crew members were incorporated into the metal structure of the
ship. Those who survived were never the same again. Apotachthikan the
Navy because of "psychological problems" regardless of their actual
condition. So, an experiment that began as an attempt to implement
electronic camouflage, came up with a (random teleportation of an entire
ship with its crew farther away and return in a matter of minutes. But what
are the sources from which we (or think we know) everything that
happened that morning in October? The classic book by Charles Berlitz,
which refers mainly correspondence with Carlos Miguel Allende to Dr.
Morris Jessup. There he described the above, according to the testimony
of the Allende The Whoever claims that he phenomenon.
Correspondence former crew members or other citizens who have
participated (in their view) in the experiment. (also mentioned in that
book. Please note that the current literature on the Philadelphia
Experiment include at least 65 books.) Typical example Alfred Beilek,
allegedly worked at the Rainbow Rroject in electrical engineering and
monitored throughout the experiment. Official documents of the Navy. In
1966, the U.S. Navy decided to deliver some documents about the
Philadelphia Experiment, denying full stated that what happened. argue
that there was such an experiment, that there was anything invisible. It
was the Project Rainbow, but this was linked to anti-submarine warfare
against the Germans and the service is supposed to make the
experiment was in 1943. This EIdridge never went to Philadelphia and
there are microfilm of the diary which was distortion of spacetime, the
fields were created (intentionally or not) and some powerful
spatiotemporal "lines" made the transfer troubled EIdridge to oscillate
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 96
between Norfolk and Philadelphia. Beyond inability to control and
verification of sources and can prove it. Any electromagnetism
experiments were compared with degaussing, a process that protects
ships from magnetic mines. BUT SO IS;
If someone wants to study what happened (or not done) during the
Philadelphia Experiment, should address the following possibilities (at
least the main, because the theories about this strange story will not stop
moving for several years yet) : Things happened as described by the
mysterious Allende, Beilek etc. information leading to this assumption,
one of the most curious is how the destroyer left the sea also be
transferred to sea and vice versa .... be part of the waterfront Norfolk, it
was reported that appeared in Eldridge, the demise of the Philadelphia
Naval Base The official version of the U.S. Navy. There was nothing but
an ordinary and boring degaussing a ship, perhaps in conjunction with
weird weather and the heated imagination of people at war created the
rest. Show optical illusion due to temperature changes, the proportion of
"asphalt shakes" in a warm summer day ... Add fatigue, morning suffering
a military shipyard and get the rest ...
Using an ultrasonic horn, thereby heating the air and sway around the
ship, which can be linked with the challenge of sick crew members.

 ELDRIDGE TO THE GREEK WAR NAVY


As many know, the Eldridge is in the possession of the Greek Navy for
many years. Indeed many have heard stories from crew members,
associated with strange phenomena. The Eldridge who is heading
Bostwick and given to our country in the late 40s or early 50s with taking
the name Leo (It's a mistake that many people feel that they are top
Eagle ). Specifically, the Navy took delivery of four ships heading
Bostwick, who were named:
 Lion, Eagle, Panther, Ierax.
Crew members felt that they had hallucinations or feel strange vibrations
in the ship, when they were in complete paralysis. In interviews Greek
officers indicated that they found in the pages of the calendar pages
corresponding to the dates on which the trial. Also by officers of the
Greek Navy, enumerated ghost sightings on board, and disappearance of
objects (excluded the possibility of theft because of the meager value of
objects) and the reappearance of some of them in different places than
before disappearing! One officer, board engineer, said that he was
impressed by the huge amount of wiring that was it. He assumed that it
was indeed part of the electrical installation for the celebration of the
experiment. Also reported the strange tremors felt on the ship when it
was even off, so powerful that once thought that an earthquake!
 Sources:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 97
- Department of the Navy, Philadelphia Experiment the official statement,
(2000) (the official announcement of the U.S. Navy in Philadelphia
Experiment)
- BBC Documentary - The true story of the Philadelphia Experiment
- Secret Technology special publications (Unknown)
- E-Telescope - The Philadelphia Experiment
- The Case for the UFO, M. K. Jessup (VARO Edition)
- Anatomy of a hoax, Jacques Vallee (Journal of Scientific Exploration,
Volume 8, Number 1, Spring, 1994)
- Al Bielek's Speech at the Mufon Conference, January 13, 1990

ON the EMV

To EMV global standard for debit and credit cards based on chip
technology. As Q1 2008, there are more than 730 million EMV-cards
using the chips that you are using for payments based on a
microprocessor, a guy from mikrokompiouter that [provides high security
and other features compared with traditional Magnetic Card Golden area
in front of the card is known like contact area. A microprocessor is
located just behind the golden touch protected by a capsule. (Collects
data) When you insert the card to the driver reading the chip in contact
with the reader. This contact activates the chip, which takes power and
make the transaction. (Electromagnetic NEFOS) This is called a chip
card technology. Another type A chip card is said card without contact.
Using your hand holding the card a few inches of the reader. The reader
activates the chip and receiving data wirelessly via RF without the card
removed apoo your hand. The investigation showed that this method of
cards from a distance is 53% faster than using a simple magnetic card
and 63% from cash you are using. The EMVCo created protokolo contact
your card from a distance (RAYS) EMV technology will relieve the
European banks the cost of fraud through plastic money, since the chip
ensures secure transactions. From the table on the progress of the
adjustment process appears to significantly delay the replacement of the
main debit and credit cards have countries like Italy, Spain, Portugal and
the Netherlands, and the situation appears better in terms of acceptance
machines plastic money. Greece is among the countries that have not
advanced in the integration of technology EMV, the replacement rate of
debit and credit cards be increased to 11% and 19% respectively, while
43% and 32% respectively formed the proportion of compatible the
technology EMV, ATM and POS
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 98
WHAT Hide on the chip
• that each transaction brings out a MINI X-ray. THE
RADIOSYCHNOTITES-radiation induces KARKINOUS
• THAT ALL REPORTED IN MEMORY TRANSACTIONS AND YOUR
MEMORY chip is huge.
• WHO IS THE MANUAL OF OPERATIONS;
• The chip sends DATA
• GO TO THE DATA SYLEGEI;
 
ATEBank RURAL
  

READ HOW THE CF DECIDE advertisement

"What is: ATEbank Prepaid Card is your electronic wallet for secure
transactions anywhere, even on the internet! ... A unique gift for your
loved ones ...
 The holder may charge the card with the amount each time it wishes to
use.
Use of the card:
Used 24 hours 24 hours anywhere in the world with the mark VISA, for:
• Shopping / payments / subscription via the Internet (without the physical
presence of the card)
• Purchase equipment to P.O.S. in shops and outlets in Greece and
abroad, especially in modern technology applied for the PIN, and no
additional authentication of the owner by dealer
• Telephone and mail order (without the physical presence of the card)
• Cash withdrawals at any ATM worldwide
• Cash withdrawals at any ATM for free ATEbank
Secured transactions:
The ATEbank Prepaid Card is a chip card technology and meets all
international safety standards and EMV. It is safe, since you have
available, only the amount you will use immediately. The "charge" with
money when you need it. Use it to shop, and then when you need it, the
"charge" again.
In this way the owner is not exposed to potential risks of card misuse by
others for large sums.
Continuous updating of the balance amount available and transactions
with the card
You will be contacted:
) For the balance of your card by the ATM network and our third site.
b) for the last ten transactions from your ATM in our network
Target
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 99
The card is designed for customers ATEbank and third parties.
Can be given as a gift to a friendly and loved ones or new even to minors
aged 14 not yet using deposit accounts and have no ability to use credit
cards, providing security without having to carry cash. Applicants must be
over 18 years.
Transaction limits
The total amount available with which they are charged a card with one
or more successive loads can not exceed the balance of € 2.500 €.
The maximum amount of each purchase can be up and available
whenever the amount of the card.
The maximum cash withdrawal through ATMs ATEbank up to € 1.500
(per transaction and per day) and limit each bank ATM withdrawals from
third parties.
If a concession card to a third party - bearer limits reduced to € 1.000 per
calendar year.
 Card Issue
The Application for ATEbank Prepaid Card is in all stores before. You
receive the card immediately and you can "charge" to either store or via
Web Banking SA and use it the same time.
Invoice
FAQ
Useful Tips
Detailed instructions and more information is available from:
To Tele-Service Center ATEbank: 210.38.94.400 or stable at 30 801 11
5800 0, option 1.

That sends DATA TO MINISTRY OF FINANCE CF Registrar EIPES AL


U.S.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 100

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 101

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 102

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 103

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 104

Banking products come from the future!


 Soon credit cards shaped pendant or sunglasses and mobile as a credit
- Even, frequencies of service and safety
Bank products and shops reminiscent of science fiction come to Greece.
H «new generation bank," as called by the staff of the market, based
mainly on modern management techniques, rather than on innovation
and new products. However, next to new ways of promotion will be
added to certain facilities, such as coverage of the credit card holder from
theft or the borrower by a sharp increase in interest rates.
(It is the story)
Etsi will soon see credit card-shaped pendant or sunglasses in the latest
fashion - even mobile phones will work and as credit cards. At the same
time, be granted credit cards in which consumers will pay only their show
without having to "pass" by a special machine. (Eating the RAYS OF THE
GUARANTEED AND CANCER)
This, say bank executives will facilitate sufficient funds transactions, for
example fast food, so as to avoid queues. Even we will see a mini credit
card in size a little lighter.
Beyond that, however, the new figures on credit cards, bank staffs
designing models of its stores. The new stores should be comfortable to
stand up to the customer, to provide venues where we might be able to
transact. Overall, the aim is to convert stores by selling points to signs of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 105
advice along the lines of private banking. In other words, could shape a
new branches in private banking for many.
New services - facilities
Payments Mobile launch the MasterCard and GSM Association (GSMA)
in a pilot program that will begin later this year (2007). The program
includes the simplification of international money transfers between
individuals and is aimed at people who do not have bank accounts,
immigrants or expatriate employees working in these countries to send
money to friends and relatives at home quickly, easily and securely using
Technology payments by phone. (AP Electric ALL you guys)
The six-month pilot program will initially focus on sending money
between individuals in areas of the world where people regularly send
money back home. In this program, it stipulated that the recipients of the
money will be informed by text message sent via the mobile telephony
network and gain access to money through debit and prepaid cards
issued by the local trapezes.Se what case of services and substantial
piece of banking products designed some changes and additions relate
mainly to:
 Create a credit card all-in-one. That one card will serve as a credit or
debit or a car loan. H convert to these products will be automatically
provided to said owner of the funds which make the payment. (So
PAREIS GUARANTEED AND THE ATTACHMENT)
 Auto loans provide the borrower a sharp change in interest rates.
 Gradual removal of subscriptions from all products. (TOSOUS
INTEREST TO gets)
 Flexibility in installments. O borrower can pay what it can each month
and will be increased accordingly or reduced the duration of the loan.
(Just PLIRONEIS THEIR INTEREST. NOT THE CAPITAL WILL NEVER
repaid)
 Prepaid Credit Cards. These credit cards with chips, which the customer
would buy from a desk with about 4 million. They will then submit the
card you want money and make purchases. Bank executives have found
a particular interest in these cards by consumers who make transactions
via Internet or play games and other games on the Internet. Also, have
found interest from parents for pocket money for their children studying
away from home. Also, interested companies that will use them as gifts at
Christmas (especially for employees, instead of vouchers). H more, but
emphasis is on quality and range of services that will govern the new
Greek banking. The banks believe that the period of low interest rates will
not last for a long time and even that the battle in the market will not give
the rate, but in quality and services.
"Anepafes' payments
The introduction of EMV Chip technology in Europe, or credit cards with
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 106
memory chips or "smart cards" means not only greater security in
traditional transactions with payment cards, but provides in addition to the
payments industry can develop and offer new, faster and more flexible
ways pliromon.Mia area has significant potential activities are
"contactless" transactions (contac tless payments). Already, Visa and
Mastercard in Europe have the first card of "contactless" transactions or
otherwise tap and go. The cards allow consumers to make payments in
less than half a second, just holding the card in front of a terminal that
accepts "contactless" transactions. In this case, the cardholder does not
even need to give the card to the officer to complete the transaction. (X-
CF EFYGES) Payment instructions "exchanged" in a secure manner
between the chip card technology for 'contactless' transactions and
accepting terminal using wireless communication technology.

Padiosychnotites
EMV chip technology has the potential to overcome many barriers, which
traditionally does not facilitate the use of payment cards for low value
transactions. Going one step further and combining EMV technology with
wireless technology, credit cards are able to offer a comprehensive and
workable solution that would replace cash. "Technology EMV, in
conjunction with the existing standard ISO 14443 Radio Frequency
Identification (RFID), ensures both the facilitation of the cardholder and
transaction security," he informs Visa. That would greatly facilitate the so-
called offline «contactless' transactions. More specifically, the issuing
bank should establish and monitor the maximum value of the transaction
and the aggregate expenditure through offline transactions. For example,
an issuing bank can personalize a card to enable the holder to perform
offline «contactless" transactions, where the maximum value of each
transaction up to 10 million when the aggregate of these transactions
does not exceed 50 euros. Each time the holder uses the card, an
integrated set of "Cash» (counters) calculate the aggregate value of all
the offline transactions.
(MIPOS ESTIMATE AND SO ON THE TAX TO BE FULLY; Ust VRE
from here!)
To facilitate instant payment, the PIN is not requested by the cardholder
payments low value (below the limit set). Once consumers reach the limit
set by the bank, this machine will require to fund the transaction to be
online with technology Chip and PIN, thus preventing the uncontrolled
use if the card is lost or stolen.
New applications
Meanwhile, Mastercard with a Nokia test pilot stage, even if the creation
of a mobile phone - credit card and Visa already was demonstrating a
solution "contactless" transactions using a mobile phone Nokia 3220
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 107
equipped with a special cap Nokia Near Field Communication (NFC). The
implementation of the Visa EMV technology is stored securely on a smart
card embedded in the jacket NFC and fully compatible with the card for
"contactless" transactions of Visa. To NFC enables interaction with a
touch among mobile phones and other commercial electronics. The
transaction is in the same way as on card payments. The only difference
is that instead of the implementation of EMV technology to be stored in
the card payment is stored in a secure chip in the mobile phone.
(WHY YOU torn On the pretext of TROMOATIA YOU ARE WHO HAS
THE DETAILS WHAT MOBILE. NET says the next line)
The NFC technology will facilitate the convergence of mobile phones to
credit cards, creating additional value, for both cardholders and
merchants.
H philosophy of "new stores"
According to the philosophy of "new store" will be available the following
sites:
 Area self: The customer service is a clock, via ATM, Internet (e-banking)
and telephone (phone banking).
 Funds: Should be readily accessible. Usually, once lined the entrance.
 Customer Area: Area to accommodate the massive customer base but
also proupantisi those entering the store. The role of officials in this
region is important. First, they serve customers who do cash
transactions. Secondly, guide the customers exactly where to go. Thirdly,
'teach' customers to use alternative networks (ATM, Internet, telephone).
HOW DOES SAY TOKOGLYFOS COURSE;
 Showcase banking: It's in the shop window, with the advertising and
promotional material.
 Location advice: serve customers with high added value of experienced
executives who give advice.
 Throughout the store there are strong marks and promotional messages.

Credit cards with style accessories, key chains and sunglasses


Credit Card-shaped sunglasses and key rings come in the Greek market.
The banking products from ... future will resemble science fiction and
propelled by the latest marketing techniques, sending the "Battle of
interest" in the pages of economic history.
The banks plan to scale models of new stores will resemble mini «private
banking», while telecommunications companies and credit card created
mobile phones to be used as a card, and consumers will be able to pay
and ... waves. Radiation, cancer at 5%

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 108

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 109

Card - Key Ring Ground from the branch of the future


 
It's time to live the wolf with the lamb in harmony;
U.S. SAID NO, THE CHASAPIS How to live;
WILL cuts FTEROUGES ANGELS WITH THE BALL;

Eidomen ...
 
1
Smart Card Technology: Applications
Academia
GI! RGIOS VERANIS
Master Thesis
Supervisor: Konstantinos Tarabanis
Examiner: Konstantinos Margaritis
0.P.M.S Information Systems
University of Macedonia
Thessalonica
January 2008
2
Copyright c George Terrace, 2008-01-13
All rights reserved. All rights reserved
The approval of the thesis by 9.P.M.S. in Information
Systems, University of Macedonia does not necessarily imply
accept the views of the author by the Department.
3
Summary
This thesis aims at the planning, analysis and
then the planning and implementation of an Information System
to enhance the quality of the services of a university
institution to the members that compose it.
Smart cards are a safe for personal data and are easy
the transfer as a tool. Their particularity is that it can
represent physical entities in electronic trading systems. The
applications implemented worldwide and the benefits
result is important for both the user and the provider
services.
In the first chapter is an introduction to the operation of smart cards
to give the reader an intimate knowledge of the technology and

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 110
efarmogespou have smart cards worldwide. The second chapter
reference to a case study of the institution for which will become the
Information System. Then presents the programming
work and the analysis of concepts / entities and processes, which
presented with the use of appropriate diagrams. Also in the fourth
chapter presents the design of the system developed as
suggested by the literature. Below is a description of the application and
Code written for the purpose of implementing it. Finally,
An annex to the application code was implemented and
satisfies the functional part of the Information System.
The main aim of this work is the creation of an Information System in
illustrating the procedures of running a daily
academic institution that services will be associated with a
system functions based on smart cards. Also accompanied by a
reliable database and provides a flexible way of interacting with
the user through the use of modern development tools information
systems.
4
Abstract
The present diplomatic work aims at the planning, the analysis and then
the planning
and the implementation of Information System for the qualitative upgrade
of offered
services of academic institution to the members that compose it.
Smart cards are safe for save personal data and are easy in the transport
as means.
Their particularity is in the make that they can represent natural entities in
systems of
electronic transactions. Their applications are materialised in world level
and the
advantages that arise are important so for the user so for the institution of
benefit of
services.
In the first chapter becomes an import in the operation of smart cards so
that acquires
the reader with familiarity regard to smart cards technology and the
applications that
they have in world level. In the second chapter becomes report in the
study of cases of
institution for which will become the Information System. Then are
presented the
planning of work and the analysis of significances / entities and
processes, which is
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 111
presented with the use of suitable diagrams. Also in the fourth chapter is
presented the
designing of system developed, as it is proposed by the bibliography.
Follows the
description of the application and code that was written for the aims of
the
Information System concretisation. Finally, is included an annex with the
code of
application that was materialised and it satisfies the functionalism of part
of the
Information System
Main aim of work is the creation of Information System which will impress
the
processes of daily operation of academic institution that its services will
be connected
with a system of operations based on smart cards. Also it will be
accompanied by a
reliable base of data and will provide a flexible way of interaction with the
user via
the use of modern tools of growth of Information Systems.
5
CONTENTS
1st Chapter 9-32
1. What is smart card?
1.1. Introduction 9
1.2. Advantages 10
1.3. Developing applications for smart cards 11
1.4. Contact smart cards 18
2. Applications 21
3. Case studies of smart cards in 24 universities
4. Future use scenarios. 31
4.1. Vote 31 students
4.2. Evaluation of teachers and students 31
4.3. Receive printed or electronic material 31
2nd Chapter 33 to 35
2. Case Study
2.1. The problem 33
2.2. Description of services and problems of the university 34
3rd Chapter 36-49
3. Programming
3.1. Selection Methodology Development CP 36
3.2. Request System 38
3.3. The analysis of feasibility of the project 39
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 112
3.4. 0iacheirisi Project 43
3.4.1. Findings of the project 43
3.4.2. 0iacheirisi potential risks (Risk Assesment) 48
4th Chapter 50 -99
4. Analysis
4.1. Requirements Analysis 51
4.2. 0iagramma activities 57
4.3. 0iagramma use cases 61
4.3.1. Description of use cases 62
4.3.2. Calculation man using use case points 72
4.4. 0omiki Modeling 74
4.4.1. CRC cards 75
4.5. Modeling Behavior 86
5th Chapter 100 -112
5.Schediasmos
5.1. 0iagramma package and strategy development 100
5.2. Designing classes and methods 102
5.3. Window 107 Chart Navigation
5.3.1. Standard design application 109
5.3.2. Evaluation interface 110
5.4. Infrastructure Planning 110
6
6th Chapter 113-134
6. Description of application implementation
6.1. On - card application 113
6.2. Off - card application 121
6.2.1. Description 121
6.2.2. Architecture 128
6.2.3. Description File Code 129
6.2.4. Database Design 133
BIBLIOGRAPHICAL REFERENCES 135-136
ANNEX A 137-181
7
LIST OF ABBREVIATIONS! N
SP = Information System
etc. = And other

1st Chapter
1.the is the smart card?
1.1 Introduction
Today there are millions of users of smart cards that use these
in their daily lives. The applications are many and these provide
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 113
advantage of security and confidentiality of the data holder.
The first cards have made their appearance in the early 50 ', where
first group Diners brought to market the first credit card.
These cards were more a kind of magnetic card (ancestor of
smart cards). The group succeeded in a short time to make
accepted the card from a set of retail chains that offer services
travel and accommodation, like this began to use and widely
Europe and America. In fact what made this card was to
replace the money in its current form, that is why the magnetic
cards are also known as plastic money. "
The first smart card was introduced in 1968 (Hansmann et al. 2002),
(Chen
2004), based on a patent of Juergen Dethloff and Helmut Groetrupp that
allow the introduction of a type circuit in a plastic card. 9rontas
independently Kunitaka Arimura Arimura Institute of Technology in 1970
has its own patent for the introduction of plastic circuits
cards. Yet real success (Chen 2004) for smart cards came
1974 and 1979 by Ronald Moreno, who had 47 patents related to smart
cards.
The first smart cards have the ability to store data in
Card example owner's data (name and password). The first
largely successful efforts to use smart cards launched in early
80s'. Between 1982 and 1984, the Carte Bancaire (the first
French banking group) ran a pilot program, which has seen
great success. The smart card industry grew and now
estimated stingermaniki banking market move over 52
million smart cards (GeldKarte). Recently, the technology of chip and
10
Modern cryptography has significant advantages of smart cards,
so thus strengthening their position in global technology. There is a
Today many uses such as: storing electronic money
replace money that is on paper, storage and security of personal
medical evidence, to preventing uncontrolled access to cable and
satellite, wireless phone safety, etc.
Fig 1. Java Smart Card multiple functions of IBM, in actual size
(Hansmann et al. 2002)
1.2. Benefits
Smart cards offer significant advantages for applications for
intended. The three keywords that specify full advantage of all the
advantages are security - Portability - ease of use. It is true that
processor, memory and support for I / O is a circuit
which is embedded in a plastic card. Before the 50s it
a science fiction today, more and more
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 114
States want to use people for the benefit of society
them. In modern cryptography, smart cards become more powerful
against hostile acts (Chen 2004).
The ease of use and portability have made them in countries such as
United States and Bahrain as "electronic wallets"
One can make use of smart cards for secure internet
markets as they would be bought with money or with a credit card
any information needed at the memory card and
elsewhere (Hansmann et al. 2002), (Chen 2004).
11
Also depending on the technology of each card there may be
stored on the card (no dependence on the memory card) in addition
a small-applications for corresponding applications that can be connected

eg cards with technology JavaCard - known as third generation


(Vogiatzis
2001). Still, an important advantage of such cards is that
information can be copied by other means (Hansmann et
al. 2002).
1.3 Developing applications for smart cards
An application for smart cards consist of two parts. The first is called
on-card and is usually an applet that is loaded and executed on the card.
Fig 2. On-card 9iadikasia Development (Dalvins Technologies, 2007)
The second part is called off-card and is the part that is in
computer connected to a smart card reader or
a terminal (Hansmann et al. 2002).
12
Fig 3. Schematic description of an integrated application. (Dalvins
Technologies,
2007)
The term terminal is meant ekeinitin computing unit has appliances
revenues and expenses on such self-reliance ATMs of Banks. The off-
card
applications can be deployed in high-level languages such as
Java, C, C + + and other (Hansmann et al. 2002).
The on-card part of the program is stored in the memory of the smart
card. This section consists of data and perhaps executable code.
The executable code is executed by the operating system of the card and

may use the services of the operating system provides. The


Smart Cards Java Card technology are able to store
many small applet each time depending on program requirements
located in off-card part is the ability to select, compile
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 115
and run the appropriate applet when it is no longer useful for
application to apoepilegei in literature this process refers
as "a lifetime applet» (Hansmann et al. 2002). The Java smart cards are
suitable for long - applications.
Most manufacturers offer a smart card development tools
software, which support the development of on-card applications. The
smart card operating systems allow the latest generation
applications developers to create and upload their own
on-card part of the application. The key is apoafta: Java Card, Multos,
and Smart Card for Windows.
13
Java Card
The Java Card is not operating system for smart cards, but a platform
containing an operating system, which is not directly accessible from the
applications that the card has. The advantage of this platform is that
oncard
applications written in Java and provides a good basis for development
applications on a single card, in other words means that only one card
can
to serve many applications. The Java Card is owned by Sun
Microsystems Inc.
and has the development rights and use. The latest version is Java
Card 2.2.2 API and is provided by the OpenJDK 7 development to off-
card
applications that communicate with the card (Hansmann et al. 2002).
The executable code on-card application is binary code
interpreted by the Java Card Runtime Environment (JCRE), which
controls the
performance of different applications. The on - card application is called
«card
applet »and determined only by the AID (Application Identifier) as
stated in ISO 7816-5. The AID consists of two parts, first part
determine the global company that developed the application (Chen
2004).
The Java Card has limitations such as lack of support loading
dynamic classes, collecting garbage (Garbage collection) is
mandatory. 9en a class SecurityManager, the security policies are
directly to the JVM (Java Virtual Machine). Also, the JVM does not
support
multiple threads. Objects can be cloned. The main types
char, double, float, long is available and the type int backed up for
32 bit integers. However, they can use a common Java
compiler to compile code that is written in a Java Card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 116
binary code.
Multos
The Multos operating system developed by the industry association
Maosco
that preserves user rights. It is one of the operating systems
can support multiple applications within the smart card.
14
Provides an interface compatible with the ISO file system and runtime
environment
specific applications. The applications are developed in a new language
which
called MEL (Multos Executable Language), developers are also
can use the languages C or Java to develop applications and
can convert them using the compiler MEL. In phase
Implementation is also support in Visual Basic.
The Multos in conjunction with an API called AAM (Application
Abstract Machine), provides a common operating system. When creating
a
Multos new application then it can be downloaded to any intelligent
Multos card without any additional treatment. The AAM is the top
Multos operating system and is independent of the hardware card
(Hardware). This explains the application was written in the language and
MEL
translate into specific commands of the operating system, and
running (Hansmann et al. 2002).
Figure 1. The operating system Multos (Hansmann et al. 2002).
The operating system has been used in Multos project Mondex.
Smart Card for Windows
In 1998 Microsoft entered the market of smart cards on its own
production of cards and in November 1999 announced the first version of

operating on the cards. The cards are compatible operating system


Silicon (Harware)
Multos - AAM
Multos - Operating System
MEL - API
Application Application 1 Application 2 3
15
with ISO 7416-4 and are suitable for programming. The core provides
file system, access control, I / O, encryption services, APIs, and a
ISO set of commands. They can also be developed, especially
custom applications because of environmental enforcement has. The
company provides all the tools to develop such applications in these
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 117
interested. The development environment of these tools is through
program Visual Basic.
The instruction set is specially designed and can support all
accepted standards such as ISO, EMV, GSM. The file system looks like
very similar to that of the DOS FAT. In the first version execution
environment is
interpreter in Visual Basic. In the future, designed to support C + +. This
execution environment provides flexibility and advantages as we know
from
Java Card and Multos (Hansmann et al. 2002).
For communication applications that are within the smart card and
applications located in terminals developed some standard
and specifications that are commonly accepted and supported by all
companies
industry. These are the ISO 7816 standard, GSM, EMV, Global Platform,
OCF,
PC / SC, M.U.S.C.L.E.
ISO 7816 standard
To ISO 7816 "Identification cards - Integrated circuit cards with contacts"
published by 9iethni Organization ISO (International Organization for
Standardization), is the most important standardization defining
characteristics
a microprocessor card, which has electric contacts. It covers the most
important issues for smart cards (Chen 2004):
Part 1 - Physical  characteristics
Part 2 - 9iastaseis and  location of contacts
Part 3 - Electronic signals  and transmission protocols
Part 4 - 9iavimiochanikes  orders for exchange
Part 5 - Determinants of  applications
16
Part 6 - 9iavimiochanika data  elements
Part 7 - 9iavimiochanikes  commands SCQL
GSM
The ETSI (European Telecommunications Standards Institute) has
published a
set of presentations covering smart cards for public use and
cellular telephone systems. The GSM (Global System for Mobile
Communications) is defined by the ETSI.Stin actually covered only a few
countries in Europe, but the increasing deployment
Phone applied in other countries, becoming an international standard
(Chen
2004).

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 118
EMV
The EMV standardization, defined by Europay, MasterCard and Visa.
Based on
to ISO 7816 with additional features required by industry
economy. The latest version of the EMV 96 version 3.1.1, published in
May of 1998 (Chen 2004).
Global Platform
For the development of off-card applications, the most popular
Frameworks is
Global Platform (formerly known as Open Platform) was established
under the
oversight group Visa and then joined this and other
known companies. The Global Platform restrictions based on specific
cards and terminals are suitable for application development between on-
card
card applications and applications on the terminals (Chen 2004).
OCF (Open Card Framework)
Another is the Framework OCF (Open Card Framework) was developed
primarily
by IBM and is perhaps the only free tool (without payment
17
license), where one can develop an off-card application for
computers connected to a smart card reader. (Chen
2004)
PC / SC
The PC / SC and is defined by the working PC / SC, which is an
association
large companies in the industry and industry of smart cards. Sets
a general architecture for the use of smart cards in personal
computer computer systems.
In architecture, PC / SC, this aspect of the system is smart applications
cards is the highest point of one or more service providers and
the transmission sources. The service covers the functionality
resulting from a particular smart card and make accessible via
High-level programming interfaces. An administrator sources
managed sources associated with smart cards with devices
These dechontaikai charge may separately manage each smart card.
The PC / SC and OCF have many common areas of application. When
run on
Windows platform the OCF can be accessed through devices accepted
the installed PC / SC transmission sources.
M.U.S.C.L.E.
Yet there is also MUSCLE (Movement for the Use of Smart Cards in a
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 119
Linux Environment), which is a worthwhile project to create
API suitable for applications, libraries of functions for readers
cards with the ultimate aim to develop hardware compatible with the
platform
Linux. (M.U.S.C.L.E. project, 2007)
18
1.4 Communication with smart cards
The protocol stack for communication between the smart card and
PC / Terminal which hosts an application has several levels. The
level at the top is the communication that exists between offcard
implementation and on-card applications in the smart card. Commands
and
data exchanged meaningful only for the specific
application. The next level is the Application Protocol Data Units
(APDUs).
The commands in this level have a specific structure and is independent
applications, but the content and meaning is for each application
specific. A level below we find protocols with names like
T = 0 and T = 1.
APDUs
The APDU protocol used to exchange data between the
application hosted on a computer or terminal and the smart
card. The ISO 7816-4 provides 2 types of APDU: a) Are the commands
sent from the application (off - card) to the smart card (on - card) and
called Command APDU b) commands return the result of
smart card (on - card) to the application (off-card), called Response
APDU.
Command APDU
The structure of these commands is as follows:
Figure 2. 9omi mandate
CLA INS P1 P2 Lc Optional Data Le
Header Body
19
CLA: defines the class  structure. For example, states where the
structure is
compatible with the ISO or private use or use the method
secure mail (secure messaging)
INS: Specifies a specific  command
P1, P2: two parameters are  used to move on
command parameters.
Lc: Length of the mandate in  byte.
Optional Data: Is the data of  reference sent to the

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 120
card.
Le: is the length byte  expected to return as an answer.
If, for example, Le has the value 0x00, then the off-card application
expects the card to return all the data available
arising from the Command APDU.
The CLA, INS, P1, P2 are the head of the order. The structure of the
head is
only and does not change. The Lc, optional data, Le define the body's
mandate. The
structure of the body's mandate may be different variations depending on
the
command that we want to form. (Hansmann et al. 2002), (Chen 2004)
Response APDU
The command structure is as follows:
Figure 3. 9omi command response
Optional data: Is the data  returned
SW1, SW2: containing status  information about whether
command sent itansosti or unsuccessful, said each time
state mandate. If, for example, have a value of 0x9000 means
that the command was successful. (Hansmann et al. 2002), (Chen
2004)
Optional Data SW1 SW2
Body
Trailer
20
T = 0 and T = 1
The protocols T = 0 and T = 1 are those with the greatest use and
defined
The ISO 7816-3. At T = 0 each character is transmitted separately, and at
T = 1
transmitted block characters.
Most modern card readers use one of these
protocols to transmit information. From the response of the cards when
they
restart (ATR - Answer To Reset), the card readers can
find what is the protocol that the card supports. The ATR is the first
data set to return the card after being activated. Also in ATR
can find information on the type of card. The ATR set
by ISO 7816-3.
T = 0 protocol is used by the first days
appeared smart cards. The cards used in GSM applications
this protocol in tons. It has advantages such as being simple and
effective in the management area of the card. To get data from
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 121
card two commands are enough. The application (off-card) sends the
command and
card responds to the length of the answer. In the second application
requesting the
exact number of byte to be answered and the card sends the data.
Respective area = 1 protocol can send and receive the same answer
exchange. Boasting the level of implementation by the transmission level.

Also suitable for secure data transmission between the card and
application.
3omes TVL
To encode the data into objects in smart cards in ASN.1 (
Abstract Syntax Notation One) BER TVLs are widespread. The
description
data in this way standardized in ISO 8824 and ISO 8825. Each
are described as "TVL", or "Tag-Length-Value", a label recognizes
object type, the length of content and data itself.
21
Figure 4. Example TVL structure.
2. Applications
Identified as laptops, having the ability to
store and process data with autonomy. It is known that
Their size is the same as credit cards, this allowed to
become widely accepted in the intended user. Smart cards
find application in a variety of industries directly related to the
technology.
Banking and financial sector thus finds application in
Secure credit card or deposit. It has many common properties with the
magnetic cards, but because they are not losing the information
after removal from an input device such ATMs have begun to
replace the global market. It is also more resistant than
magnetic and have the potential reuse by another client if
the necessary steps, so reducing the cost of banks in
hundreds of millions a year.
With the development of electronic commerce worldwide and the
insecurity are consumer markets for payment through
Internet is not slow to present the first applications for e-payment by
using smart cards. It's a move that finds an ally and banks
and thus reduces operating costs in relation to credit to
currently used (Chen 2004). But the idea extends beyond and in spite
goal is for consumers to obtain a so-called electronic wallet
a smart card. This means that all consumer purchasing power will
is a single card with the elements that would
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 122
permit to be in possession of such personal data. For banks
and business is an ideal solution to secure sales for
0x92
Airport
0x03
3 Bytes
"XWY"
Airport code for Wyoming
Tag Length Value
consumers a tool for better services.
Fig 4. Example of using smart cards in banking system (Elliot and
Loebbecke 1998).
Another industry where there is widespread application is the industry's
communication. From very early on started to use smart cards in
is in the form of prepaid cards for telephone services, known as
phonecards. The field of wireless communication is the best customer of
Companies that manufacture smart cards and this is due to the fact that
smart cards comply with safety technology GSM (global system
for mobile communication). Each SIM card is every mobile phone should
have the technology GSM. The SIM card identifying the user - owner and

provide an encryption key to start digital transmission of voice.


Other services offered to users is mobile banking,
The mobile commerce, enabled access to the Internet and what
This can provide. The security of user authentication and data
moving is the most important advantages.
23
In the area of health insurance, smart cards that can help
to reduce the complexity of managing information can a
patient has, eg personal information, health records, information
regarding the
insurance, medication that has been followed for many years, etc. Be
possible with all the information is incorporated into a single smart card
with potential for renewal when krinontaianagkaies. These data
could be shared between hospitals, doctors and pharmacies to
approval of the cardholder and above all safety. For example, a
tourists on holiday away from home, his is a
allergy crisis if not treated quickly can lead to death
it. A tourist holds a smart card that has all the medical instruments
file or provide the opportunity to join the on call doctor in
national health care with security and see where that information
have even come in contact with his personal physician. The
opportunities are in this huge area. A typical example
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 123
a health system using smart cards for hospitals in New
York (Jaikumar 2005), where 100,000 smart cards were given to patients
two major hospitals in New York to
used in conjunction with the health system of Siemens. The aim is to
patients have a history of health in portable data format and
Doctors have a safer, faster and more reliable access to data
them.
Even health characteristic example of smart
card is an effort that was implemented in the period 2000 - 2002 by
public health system in Taiwan (Cohen 2003). The cost of
implementation is not
exceeded 115 million dollars and is targeted at 22 million people.
It is one of the largest projects undertaken in this country and
result was to dramatically reduce medical costs for patients and
State's contribution to them. The need for consolidation of the system led
Government in this solution, which was implemented by Sun
Microsystems
in cooperation with companies TECO (Electric & Machinery Co.) and top
smart card maker Giesecke & Devrient. In this work
Card technology used Java Card, Sun Enterprise Systems
10000, 4500, 3500, and 450 systems running the software Solaris. The
cycle
24
life of cards in 5 years, while the cost of renewal does not exceed 4
dollars. The example of Taiwan and Germany followed in 2006 (Smart
Card Alliance 2006) and Austria 2005 (Giesecke & Devrient 2007).
In the transport sector in both private and public, there
prospects for large profits for both companies and their passengers. In
class public transportation tickets can be replaced by
Prepaid cards such as happens in industry
telecommunications with the known calling cards. This solution provides
many
advantages in the management of many small transactions in conjunction
with
safety movement.
However, there are applications in closed environments, such as
international
and European organizations, groups of companies, universities and
institutes. To
case of academic institutions is extensive reference to the next
section.
The fact is that: "The smart card technology is gaining ground
acceptance, since it is in everyone's wallet »(Chen 2004).
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 124
3. Case studies of smart cards in University
Institutions
Both at European and global level are those few
universities that have adopted smart card technology
to cope with greater safety and economy in many
students at their premises and make use of services
have. About Marriott Corporation has set up pilot to Trinity
College (Burlington, VT) and Queens College (Charlotte, NC) for the first
time
U.S. in 1988 a smart card system for the management of meals and
physical access to these institutions (Robert Huber Associates, 2007).
Since
many educational institutions in the U.S. have used similar systems.
The company developed products from companies around the world
usually does not satisfy all needs and requirements of universities.
Between two universities, there are the same people, applications that
25
developed should be proportionate to the overall level apaitiseonkai
The new card system to integrate the proper functioning of the institution.

The high cost of construction and configuration of such systems and


the different standards that exist from country to country (Fridell T et al.
2007),
led to the formation of ECCA (European Campus Card Association). The
ECCA aims to help higher education institutions to make
use of technologies derived from smart cards through
knowledge sharing and development of European standards. This
association
represents more than 5000 institutions across Europe (ECCA -
European Campus Card Association, 2007) and its members have and
Universities
America and Canada.
The universities that have implemented in their system ready
of packages are numerous, but few of them are public
nature since the purchase and maintenance are high. Most
programs support the traditional functions of universities
are as follows (Das P. and Rastogi L 2002):
A unique identification of  the cardholder.
Access to electronic  resources, computers and networks.
Access to physical spaces  (such as offices, laboratories, classrooms).

9iakinisi documents between  students, secretaries and teachers.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 125
Access to online courses. 
Electronic wallet for  everyday transactions (eg agorakafe,
food, books, photocopies, etc.).
ATM Services in internal bank  institution.
9aneismos material from the  university library.
Health care. 
Feeding Students 
The environment, however, academic institutions can be classified as
potential, so that their cards should be easy to maintain
different applications. Most commercial programs use
smart cards whose software has been developed by the companies
themselves
26
(The most famous CardOs of Siemens). This is a safety valve
for companies that only they can be deployed on any changes
presented to services but also an obstacle for institutions to
anexartopoiithoun. Generally there is guidance for developing such
Card software that can support more than one application.
Such are the JavaCard smart cards, which have the advantage
to download the latest versions of applets which have an authorized
server and to run where applicable.
The case of the card system of the institution KUFPM (King Fahd
University
of Petroleum & Minerals) is noteworthy as it uses the same card
contact (admission card in card reader or terminal) and contactless
(Wireless) applications (Halawani, T.and Mohandes M 2003). The
University KUFPM developed in collaboration with private company
BELLID an implementation based on smart cards to manage the volume
its students. The cards used are two chips on a
card readers and one for wireless. The platform is
oriented use cases that meet the very-applicability
applications running in memory cards. The services covered
are: the student card, access to library services,
e-wallet transactions, physical access control,
perilthapsi health, e-learning, access to computers and networks.
All services are managed centrally from a server hosting a
database file that gives access to other databases
through the network of the university have to do with personal
information of the cardholders. For each service offered by
centralized system is the appropriate subsystem that supports it. So
example, the card personalization system controls the physical access
card holders at places and laboratories of the University. The subsystem

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 126
reported working with confirmation between a client and server, so
to connect to the server and tools from there depending on the rights
down in each owner being able to run other applications in other
subsystems, such as personal information of students and
finance each holder. The central management system is
able to record the traces of procedures performed by
27
cardholders, so you may find the history of actions if
necessary.
Each subsystem according to the services offered are linked
other equipment that gives the possibility to use
potential applications arising from wireless technology, but
and to have a better user satisfaction.
Fig 5. The points system sales (POS) (Halawani, T.and Mohandes M,
2003)
So for example the management subsystem is linked to payment
point of sale terminals (POS - points of sale) to restaurants, library
cafes, medical centers. The POS system accepts payments and
processed through the university connect with the
similar accounts of the cardholders.
The University JKU (Johannes Kepler University) in Linz Austria
began to build by 2002 a system of its own intelligent
cards for teachers and students. Here it should be noted that the
institution is
Member of ECCA offers valuable assistance and expertise to other
institutions of the union. The system as it has developed enables
students to participate in online courses and exams
absolute certainty about the quality of educational services. Also, through

one card can operate almost all services that


University JKU offer those who are not from other services
and trade programs, smart cards can provide packet
28
them. The project development team chose to use the following
Technologies: J2EE, J2SE, JMS, JNLP, EJB, JSP / Servlet Web
Services, JCA Java
Connector Architecture, JCO SAP-BAPI connector, JMX Management
(Leitenmoller
DI H 2007). The main reason for their choice was to be in the form of
open
software. Can the software be developed in light of the Sun
Microsystems, but the available free.
Fig 6.Eikoniki description of the smart card platform JKU (Leitenmoller
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 127
DI H 2007).
The developed system was geared to the needs of
students and teachers. The workflow of the two groups is
often interrelated. Students choose courses that teachers have the
teachers consider the students and the results recorded in
each tab of the student.
29
Fig 7. Lifecycle mathimatonsto JKU (Leitenmoller DI H 2007)
This move (DAS OFFIZIELLE INFORMATIONSMEDIUM DER
JOHANNES
KEPLER UNIVERSITAT LINZ, Oktober, A usgabe 19, OKTOBER 2003)
but
had other purposes as was the need for better service
students in their daily needs for micro-transactions, the effective
management students and financial situation of the University. For
financial transactions of the university students worked with local
banks to be able to use them outside the area of the institution.
Also there was the expectation that through the reorganization of the
system will
and the resulting increase in enrolled students of the University.
In Greece, the benefits of smart card technology are still
early stage. In 2002 the University of Crete in collaboration with other
agencies
public and private sector of whom were partners in the project
sponsored by the Society of Information "on the" Smart
cards, the findings of their research does not indicate an application to
has achieved a place at university institutions (Task C3 -
Operational Programme "Information Society" 2002). There are however
the same survey valuable references for systems that have developed in
healthcare and banking.
In 2007, the Aristotle University of Thessaloniki, which is the largest
University of Greece in physical size and population, but students
30
announced it would implement on a pilot level platform for smart cards
so for all staff and students (Roma 2007). The aim is
to become the first Greek university, where all services will be
available electronically to students and other staff. The effort
is financed by the Operational Program "Society
Information ".
The digital functions that work ("Precursor e
University ") has set to achieve are:
Access to student requests  for licenses or any kind of
Secretariats.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 128
Access to information  necessary for their courses.
Access to networks and  computers.
Access to material and  non-electronic courses.
Support for teachers  regarding courses (quantitative and qualitative
data) they teach.
Control physical access 
The project size is large enough as the University has
intended to extend the platform in all schools it has.
It is estimated that the number of students is approximately 75,000 while
the administrative
staff of 2,500, is undoubtedly one of the largest projects
gineise university level in Greece (9imolaidou 2007).
It is worth mentioning that smaller units such as university
Libraries meet short-applications smart cards, as in
ECB (National Documentation Centre), but they found great acceptance.
The next section presents some future scenarios using
smart cards, some of these may meet for the first time in
literature and this is because of the peculiarity of the case
Greek academic community.
31
4. Future scenarios for use of smart cards
universities
4.1 Student Vote
The students vote to elect their representatives on
academic base is always numerous and in some cases there
complaints of fraud. It is likely that the European community there and
other universities of different nationalities. . But is not provided by the
programs are made so far for smart cards to provide support
for such activities. About voting for national elections are
applications but are quite expensive and aimed at states and
have other extensions such as the identity card, passport, security
health etc.
4.2 Assessment of teachers and courses
In yparchontaemporika programs already known that there is a possibility

to obtain access to online courses and services. . But


between electronic services not provided by the evaluation
users. Could create a service where the data
evaluation will be stored on the card over time should give an appropriate

feedback on changes made in the service of electronic


courses.

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 129
4.3 Delivery of printed and electronic educational materials
At public universities nature books available from the State.
Each book represents a student and the process is usually done by
bookstores outside the university campus. The procedure for obtaining
the
book is time consuming for students, bookstores and expensive for the
state.
The creation of digital library that includes all educational
writings of all schools where every student has the right to
borrow or have on staff computer training material has
previously discussed. The main problem is the security with
32
will they handle the volume of e-learning materials. The
smart card technology could contribute substantially to this
problem laying the foundations of security.
33
2nd Chapter
2. Case Study
2.1 The problem
A University wants to reduce its operating costs to
certain services provided to students so as to be
upgrading of quality (to be and compete with other
Universities in Europe) and the safety of the services requested
an adviser to describe the current situation and problems. Also
asked the consultant to do the analysis and design of a new CP
addressing the problems diagnosed and implementation
an application that supports the CP.
The University is at the wider public sector and apply
following when developing CP:
• can be developed either internally or by tender so the development
The company is chosen (called the contractor) under
a fixed price contract signed by the parties
• monitor the work of a (usually 5 member) Committee on Monitoring
Project
(EIA), which consists of senior civil servants. This makes
meetings with the contractor (eg the project manager) to verify the
course work
• The EIA also review project deliverables and the acceptance or not
• it is common for contractor to perform all phases ASPS subsequently
the body
to prescribe what will be implemented and then to implement - is
important to stress that first signed the contract defines the
total (fixed) cost of the project and then starts the ASPS and of course
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 130
Implementation of
• general users of the systems (ie civil servants) are not very
associated with new technologies and what they can offer - they know
But very good job that sometimes is complex (due
legislation etc.)
34
• General public servants working in their offices and are therefore not
available for numerous meetings with the contractor
• Civil servants are usually not asked for systems that
implemented - are designed centrally, and their use is mandatory
2.2 Overview of services and problems of university
Services:
At the University work for each section and the relevant literature. The
graduate programs and specialized programs that
have developed their own secretariats. There is also a library
university that provides students at the institution but also
external users. Even the institution has a club and food for students and
staff.
The services offered to students and staff are:
Student enrollment in  courses, departments, transcript
, Certificates of all kinds, books, applications, scholarships,
health insurance, handling documents
Feeding 
Access to electronic  resources and areas with computers,
laboratories, offices.
Library, lending evidence 
Postgraduate courses 
  Parking
0iadikasia:
To fulfill their requests and to receive services, students
Go to the secretariats only in specific hours is the public
and waiting in line to serve. Often there is an
phenomenon becoming handling the demands of students' associations
students affiliated to any political party. Students at the
35
institutions have access to every floor, offices, laboratories and rooms
This has not become a control.
Problems:
The problems found in nearly every service. In
coursework, there are often people in laboratories have
no relation to the course. The secretariats of the departments observe
enough

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 131
delay in serving the students and the workload of
Officials there and the number of students who wish to serve.
In the library there are problems on the interlibrary loan material
external users. Communication problems when students are foreign
nationals. Thefts of parts from labs. Feeding unchecked on
turnout of people (students - staff). Each service has its own
program for which the institution pays large sums to license
and maintenance.
Past: In the past, had been trying to implement a system
magnetic cards that concerned only the staff of the institution (time
employment, access to natural spaces, parking), but in a short period
time the practice was abandoned. The main reasons were non-Training
staff and lack of maintenance.
36
3rd Chapter
3. Programming
3.1 Choice of Methodology Development CP
For the selection of appropriate development methodology of the CP
should
take into account the conditions mentioned in the relevant section
above.
A key factor is the lack of knowledge about the new smart card
technology
Is a factor of great importance and significance of the one
more definitive criteria for selecting development methodology. Hence
development methodology of selecting the SP model of cataract
(waterfall). In
generally respond better and more reliable to
final information system that will arise in connection with other
methodologies referred to in the literature.
This methodology divides the development of the computer system to
milestones, which will serve all signatory
sides. The lack of previous experience and infrastructure in technology
smart card requires some way to implement the information
system based on the model of cataract. System requirements
and the intersections of users (managers or otherwise) will be designed -
analyzed from the outset because it is difficult to obtain new demands
a user and the institution (for lack of knowledge on applications
the subject). The CP will be implemented under strict specifications has
to avoid omissions claims against its development. Still
strict framework will help towards maintaining the
budget will occur at the planning stage (Planning). A
the drawbacks of this model is the high time of delivery but
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 132
This case might be an advantage and experience
and technognosiapou be acquired by people participating in
life cycle of the CP will be more mature than other methodologies
could be selected.
37
Figure: 5: Waterfall Model (Dennis A et al 2005)
Planning
Analysis
Design
Implementation
System

Request System 3.2


Project: Implementation of smart card technology by students and staff.
Sponsor Project 9iefthyntis University Library
Business Need: The project will begin to be better
serve students and staff in their daily work. Also
quality education from the perspective of service expected
significantly improved.
Business Requirements: Using smart cards will be able to
make a series of actions both at the institution and
outside it. 9inetai the opportunity to identify the user and what
rights to use any service that the institution wishes to provide. The
functionality of the system can be described below:
Coordination of services  within the institution
 Access to electronic resources (e-learning) and networks.
Access to physical spaces  (such as offices, laboratories, classrooms).

Evaluation of courses and  teachers.


Electronic wallet for  everyday transactions (eg purchase of coffee
food, books, photocopying, tickets, etc.).
ATM Services in internal bank  institution.
9aneismos material from the  university library.
All secretarial services to  students.
Business Value: The use of smart cards are expected to come
working hours of employees who work in serving students
(Secretariat). By improving the quality of services is expected to become
serve the students in the shortest period of time with less
omissions and mistakes, so there will be shorter lines - less
Overcrowding in the secretariats as will now be able service over
24 hours. The replacement of student ID from a smart card
39
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 133
expected to deliver economic benefit of 70%, as there
reusability for at least 5 years. There will also be
reducing licensing programs used to
privacy.
Special issues or constraints:
Unknown on the smart card  technology to end users
(Students), any fear of its use.
Identification of the  institution in the University community
implementation of the project.
The adoption by the Rector is  necessary.
Any reaction from trade  unionists and political parties to
tistechnologias application.
The Library wants such work  and has a range of services
significantly improved by the application of smart technology
cards. For example, it can provide access to electronic
sources to external users (ie not students and members 9EP).
3.3 The analysis of feasibility of the project
Highlights of the feasibility analysis are:
Technical factors:
It is possible to apply the technology of smart cards, although
There are some risks.
The risk of work on familiarity with smart card applications
high.
The staff of the institution  has over the development experience
applications using smart cards and related applications.
40
There are hundreds of  European institutions to use technology
smart cards for the benefit of staff and students.
The applications interact  with smart cards do not differ
largely to those used for everyday tasks
both officials and students.
The risk of work on familiarity with technology is moderate.
The administrative staff of  the foundation had done in the past, a
short time, magnetic cards to enter the
natural areas. There is such a use proigoumeniempeiria
quite similar technology in relation to that will be
developed in the project.
is available academic staff  with knowledge on the subject
technologies to be used and may have
advisory.
There are commercial tools  for developing applications for both Smart
Card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 134
and applications that interact with them. These tools
usually supported by the manufacturing companies in the cards
which makes them more reliable.
The size of the project can be regarded as a moderate risk.
The period of completion of  the project is estimated to be not
more than 3 semesters as chronic enough to normalize
all possible difficulties that may arise.
The project development team  will be relatively small in the range of 5

people. But it is technically and professionally trained in


smart card technologies.
The size of the project is  modest in size compared with other existing
SP
exist within the institution, such as the SP of IT.
41
The compatibility of the project with the existing technology can be
considered quite
good.
The SP is new and there is a  need to connect to other SP
are at the foundation. There is an increased likelihood of use
the same technology, among other applications, the SP application
CP could be developed and has not incurred any particular problems
compatibility at the application level.
The SP's computer is already  providing an excellent organization
data will be needed for applications in smart cards.
The existing technological  equipment is in good condition and not
needs to be some sort of upgrade to be installed
special card readers.
The technology applications  for smart cards using open
standard.
Financial:
The following conservative economic approach of the project shows how
the institution
can invest in development without taking high risks.
The development cost is  estimated at moderate levels, is around
80.000
- 100,000 euros with a higher amount due to a stock market
(Hardware). It also requires a small number of specially trained
staff to develop the project because of the nature of technology
to be used.
The staff will use the smart  cards will be
trained as to reduce any technological fears

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 135
that may occur. End users can be trained by the
academic or technical staff, including the use of applications
expected to be familiar.
42
Reduce man for secretarial  work, and those
staff employed to serve their users
various services.
server market of 20,000 Euros  to host the application
SP, purchase of special devices (smart card reader) and cards will
support the SP. The readers and cards during
lives of more than 5 and 7 years respectively. The implementation of
technology
Applications for cards are relatively modest drop. 9en there
big difference in the technological equipment was in use before 3-4
years than today. These facts lead us to conclude
that the institution will in the longer term benefits and risks of the original
investment decreases.
Licenses programs related  software. But the goal is to
used programs in the category of open
code to reduce annual operating costs. Recently
established strong community support of free software in
application area for smart cards.
Intangible costs and benefits:
Satisfaction of students and  staff to upgrade
Quality of service
9ynatotita transfer of  knowledge gained in other
universities and national institutions anagnorisitou
level.
Organizational:
The project has a low risk of organizational policy. The aim of the system
is
exist within the institution safe and quality services to all,
which is achieved through the use of smart cards.
Support from 9iefthynti of  the Library.
43
Support from 9iefthynti of  Computerization and services
9iktyou.
Supporting the group of  employees in administrative positions.
Reduce our service levels by 
interested student.
The system users wishing to  use the benefits
resulting from implementation of the project. 9inetai possible
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 136
maximize the quality and safety upgrades to
students.
Other:
The Library seeks to  implement the project, the results
will provide the essential services to attract students
and expertise, which can be exploited in other ways.
We need to recruit trained  personnel for the new system
incurred.
3.4 0iacheirisi Project
Being "9iacheirisis project" through the methodology
literature (Dennis A et al 2005) suggests assessing the required time,
size of project and human effort should be made
that the CP to become reality. In this process should take into account
and potential risks that an implementation may entail. Within
possible solutions will be proposed that the risks are not hamper the
implementation.
3.4.1. Assessment project.
To estimate the size of the project will use the approach
operational points (Function Point Approach (Dennis A et al 2005)).
Based
44
This first estimate the size of the project in number of lines of code
required to implement the project. The estimated size then based
type becomes a figure that reflects that anthropoprospatheia
required. Finally, the estimated anthropoprospatheia converted into a
time
layout where I captured during a month.
Rating scale
Input: 1 screen to search - information (set of 2 - languages) 1
screen presentation - receiving documents, 1 screen for electronic
communication, 1 screen background monitoring of all services -
operations
made by the user based on the search, 1 screen for user registration
the department wants depending on what rights have the card, 1 screen
explanation of all rights and obligations 1 screen
financial services, 1 screen for editing user information
officer, 1-screen presentation - online user.
Total: 9 * 2 = 18
Output: 1-screen results from the prospecting
information (total 2), 1 screen for development of applications -
monitoring, 1 screen
projection data of the cardholder, 1 screen statistics
use 1 screen display errors and instructions for their solution
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 137
Total: 5 * 2 = 10
Query: Search among student services, search application, document,
certificate, proof of payment, search employees and hours worked,
search for persons who have physical access to sites, general search
information, renewal prices of goods and services supplied, search
use errors and degree of risk, replacement account information
users from other systems.
Total: 11
Files: 1 for students by recording, 1 for search - editing, 1
Statistics 1 for "intercom" between services, 1 for languages
45
1 for information officers, 1 for financial transactions, monitoring 1
actions.
Total: 8
Program Interfaces: the library services with other insurance
services, with a bank, and system administration.
Total: 4
Function Point Estimation Worksheet
System Components:
Complexity
Description Total
Number Low
Medium High Total
Inputs _18_ 9 x 3 5 x 4 4 x 6 _ 71
Outputs _10_ 4 x 4 4 x 5 2 x 7 _ 50
Queries _11_ 2 x 3 6 x 4 3 x 6 _ 48
Files _8_ 2 x 7 4 x 10 2 x 15 _ 84
Program Interfaces _4_ 0 x 5 2 x 7 2 x 10 _ 34
Total Unadjusted Function Points (TUFP): _287
Overall System:
Data communications _3
Heavy use configuration _2
Transaction rate _2
End-user efficiency _1
Complex processing _2
Installation ease _2
Multiple sites _1
Performance _1
Distributed functions _2
On-line data entry _1
On-line update _1
Reusability _1
Operational ease _1
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 138
Extensibility _2
Total Processing Complexity (PC): 22
(0 = no effect on processing complexity; 3 = great effect on processing
complexity)

The project is considered a complex system due to the nature of the


technology to
used when judging the degree of complexity as is prudent to
APC = 1.35
Adjusted Processing Complexity (APC):
1.35 + (0.01 * 22) = 1.57
Total Adjusted Function Points (TAFP):
_1, 57 (APC) x 287 (TUFP) = 450,59 (TAFP)
The development application is expected to be in Java with 80% HTML
20%
0,80 * TAFP * 55 + 0.20 * TAFP * 15 = 19825,96 + 1351,77 = 21177,73
Anthropoprospatheia: 1.4 * 21.17773 = 29.648822 Person
Time = 3.0 * 29.648822 1 / 3 = 9.18 around (9 months and 7 days)
Time representation
As part of this stage was using modern tools such as Visio,
when graphic designers across the entire length of the project with all
works to be implemented, thus having a more clear and concrete
picture of the CP.
? Iagramma Gant
Gant chart obtained is:
47
Fig 8. Gant 9iagramma the CP.
48
3.4.2 0iacheirisi potential risks (Risk Assessment)
Risk # 1: There is a danger that as the Greek language is not supported
by
cards when stored data.
Likelihood of risk: The probability of occurrence is medium level, because
the cards
store the data in the form of byte. Since the ASCII characters
supported by ASCII, can be stored in the form of byte, the
problem is focused mainly on language to communicate with the card if
you
can do the conversion properly and show good results eg in
a browser.
Potential impact on the project: The result will be the project, is a)
delay in the flow development and redesign of the communication model
other systems where this is necessary
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 139
Ways to address this risk: A workaround is to write data
we want to apothikefontaistin card is in roman characters.
. But this is because they will be supported by appropriate training
and choice of characters will be right in line with the 5-member
Committee.
Risk # 2: Do not be a proper choice of material hardware. Incompatibility
between card readers and smart cards, due to different protocols.
Also at risk would include the case of incompatibility
material as the framework to be chosen to link the application with the
hardware.
Likelihood of risk: The probability of occurrence is medium level.
Potential impact on the project: The result of such an event would be
cause confusion for analysts of CP and to those who will
49
to implement. One of the most likely outcome is a long
delay and increase the budget of the work.
Ways to address this risk: how to deal with such a risk
is to select and identify the outset of the protocol on which to
develop the platform (eg GlobalPlatform 2.0.1 or 2.1.1) and not on the
road
implementation, as the best solution is to choose an open standard. Also
at this point would be to select the appropriate framework under which
will develop the application (eg, OCF - Open Card Framework, Java API
for Cards)
but which is compatible with the protocol. Also on this basis that
should be determined and the choice of material is strictly based on
them.
Risk # 3: Non-acceptance of the system of student political factions.
Likelihood of risk: The probability of occurrence is medium-level
Potential impact on the project: The result of such an event would be
no mass effect students who will condemn the system to
abandoned or limited use. The reasons could be
induce such operations are normally due to the perception that the
system
Smart cards may be called by many the "electronic
keep files ".
Ways to address this risk: Before the system would be quite
useful to present and promote the general student public,
present the advantages of and the radical changes
everyday users of the institution
This stage is the final phase of planning and thus
say that we have "health" foundation for the SP want to design.
50
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 140
4th Chapter
4. Analysis
In the analysis phase to understand who will use the system, what
make the system in its final form and fee, when and who will
used. During this phase, analyzed and presented
functional models, such as chart of activities and situations
use structural models such as graph classes and models
behavior.
The opening phase of analysis done with the stage of "Requirements
Analysis"
where are we aware of all the methods used
the knowledge elicitation and problems from users with the ultimate aim
of
their integration into the new SP in the form of requirements, which can
divided into functional and non functional (Dennis A et al 2005).
At this stage determined the degree of change is the introduction of a
such Information System in the workflow of the institution
whole. Based on the literature (Dennis A et al 2005) and phase
programming is proposed as the best technical requirements analysis
The BPI (Business Process Improvement). Based on this main
activities is the duration of the analysis, the cost of each operation and
Information about other similar applications developed by other
institutions.
The period of analysis (Duration Analysis) is important as it requires
detailed examination of energy and time each activity takes
place in the system as it is now, ie AS - IS system. A thorough analysis
all the individual steps that a process has no comparison
this time with the time needed to oloklirotheii energy. From
This comparison shows, for example, the size of the fragmented years
between steps and propose ways to reduce the total time
implementation process. Most of the processes carried out
within the institution usually involved more than 2 people. For example,
when
a student wants to take a certification course should go to
Secretariat to complete the document, to provide the responsible
The Secretary to certify that the student is submitting this document
51
and then the document must be presented to the \ head not \ for the
Signed to for this work the estimated time is about 10 minutes,
without including the waiting time if there are other
people to serve. The system, developed by the time the same
result is calculated to be less than 2 minutes and clearly pleased
users greater. There are certainly more complex operations where there
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 141
will
techniques used to integrate operations or any other work
take place alongside other to reduce the total time time
required.
The cost of main power (Activity - Based Costing) is a great source
knowledge. The attention focuses mainly on basic steps and procedures
have higher costs and are attempts to improve. Yet
information for other applications (Informal Benchmarking) can solve
issues such as lack of knowledge and action planning problems.
If anyone knows what kind of applications made by others can be
better organize their work formed a daily basis in
institution under the new Information System for smart cards. This
knowledge
helps to introduce new ideas to the analysis of CP.
Because the size of the CP to be developed that judge is a medium-sized

but of great importance in upgrading the quality of


services institution, both to the student community but also
employees, therefore it is necessary to define the business needs
the analyzer. To this end become used mainly 5 methodologies
These are: analysis of documents, interviews, observation,
questionnaires and
Meetings type JAD (Joint Application Development) (Dennis A et al
2005).
4.1 Requirements Analysis
Methods
1. Analysis of documents - to determine what the requirements of
existing system and that even those with paper-have
imprinted. To facilitate their study is good to have a
52
schetikikatigoriopoiisi in the course request. Application forms
(Supplemented, empty), legislation, legislative framework, business
procedures that is registered, official documents and forms
certificates and copies of certificates issued.
2. Interviews - to establish the personal problems
the existing system and requirements for new officers by
administration familiar with the procedures. At the beginning of the
project
sponsor the project and then with senior executives who have
Management background in particular institution (ie people who are
knowledgeable
procedures and relevant legislation), for this reason and because
people are expected to be busy is to have good
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 142
electronic equipment to be carried out on-line
interviews. Apart from these strains would be wise to have
interviews with representatives (whether union or heads of specialist
departments)
officials because they are being handled primarily flows
processes in the system will be implemented.
Also good to have interviews with the
representatives of the students why they implemented the system and
are the main users and beneficiaries of the system. In phase
They should be highlighted and the benefits arising from
the use of smart cards in order to avoid possible reactions
of these user groups.
3. Note - Leave the project sponsor for access to natural
space officials - offices, the reason is to look closely
all stages of the process and value with our
technology platform that could automate the whole
process. This observation could be used in conjunction with
interview in order to complete registration procedures without
gaps or questions from the side panel design.
4. Questionnaires - Properly configured, the questions will be
elicit from the ordinary user of the system (public servant
53
student) what he would like to have the system, questions are tailor
that would limit not to mention a "fantastic"
technologies. Also be questionnaires whose results
will give a better picture of the existing system and problems
suffering, failures at user level, employees and
aliens. The questionnaires are expected to contribute significantly to
direction to meet the level of knowledge of users, so
Later in the implementation of the system varied
environments that will help the user to perform work properly
it.
5. JAD - As the description of the problem indicates that there
time for several meetings, we could avoid the process
it. But if you resort to this option will miss the important
advantages this methodology offers. The advantages of
this method is the most useful method for gathering information
by users over the others, as stated in
literature (Dennis A et al 2005). It is also likely to reduce errors
requirements gathered by other methods, as
executives from different departments and sections to meet special
landscaped area and discuss on the same basis as the IT manager
meetings such JAD.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 143
With modern technology is given in cases where there
enough time for the meetings can be held
'E' sessions JAD, with specially designed software and
staff. Again, according to studies (Dennis A et al 2005) has
found that the average meeting time is reduced 50 to 80 percent
cent with e-JAD. For the smooth operation of meetings and so
to achieve maximum efficiency of these teams will need the
executives will be invited not to exceed 6 people.
Our team of analysts should therefore be equipped with all necessary
technological resources within the area of the institution and for this
purpose
needs approval from the Dean. The top teams will
should be modeled on the work of the new CP will serve,
54
So it is good to involve professionals with excellent knowledge on the
subject
all steps of a task can have. In this way
can be made more details about work
and very likely to occur and errors that occur between the
different levels should be noted here that every member of
group has equal time to answer questions from the person responsible
for
the session. Also appropriate at the end of each week and after
have completed various other sessions and there is a
session only senior on the high-level work
that there take decisions and measures by most experts. For
This is why people team for this session must belong
Rector of the Board and be aware of both technical as
and legal issues. It is also wise to review team is
and Director of the Library, who ypostirizeito project.
Then the group analysis of the project proceeds in distinguishing
effects of the new CP will serve a functional and non functional. The
This separation is necessary in order to determine the
characteristics of the system and what must be satisfied.
Functional
1. 9iglossi information to students via the website
foundation for the services the smart cards can
offer and how you can use. They must also
there is the possibility of answering questions on-line from
staff.
2. 9imiourgia / compliance / student searching a computer file.
3. Checking errors in the application.
4. 9imiourgia reporting statistics.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 144
55
5. In exchange data with existing CP and the CP other
agencies and services within and outside the institution
involved in this work.
6. 9imiourgia reports about the use and the errors
performed both by users and of itself
system.
7. Download smart card money through special
surroundings, in which the other
Information systems.
8. Daily updates of the financial transactions of the card
students and staff in conjunction with the CP of the bank.
9. Initializing prosopikondedomenon students from special service
University and storing them in the smart card.
10. Sending messages (SMS, email) to users on
services.
11. Select a specific environment for visually impaired users
12. Store non-personal data of users on a
data.
13. The system will serve users will be able
card to download new versions as they will applet
issued by the competent department of the institution. Users are not
have the same right to take any action
upload applet in the card.
Non-operating
Business:
Access to the system via the Internet through Info - Kiosk with touch -
screen
screens (more friendly for those who do not know the PC). Compatible
with all
popular browsers. Requirements for cooperation with other information
systems with which it communicates.
56
Performance:
Response of the system when information is requested in 1-2 sec, the
same
levels of speed and access. When searching for any
call time not exceeding 15 seconds to issue a new card must not exceed
3 days. The database will be updated in real time.
Security: The system could serve the need for access control
students and workers in physical or logical resources. The cardholder will

only the right, always based on the characteristics which are set to
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 145
access to bibliographic sources, networks and computers. Yet there is
need for controlled access to services and procedures for all levels
of CP involved on. The safety but not be limited
Only the data card can be saved, but a better and more
efficient solution is proposed that the combination of databases in
conjunction
the data is in memory of the smart card. If
identify changes to the data card is then you should
accordingly notified the competent authorities and the user.
Culture & Policy:
The card will be given free for the first time students and employees.
If this is lost there will be relatively fine for the reissue. Also
fine will be imposed and if found "invasion" on the card
by the user. 9ynatotita Association card to bank accounts
below limits set by the user. Provide conversion program
swap users from outside the European Union. The system will
should be written in technologies that only Sun offers. Also should
The system supports the ISO 7816 for smart cards.
Then expressed relative to figure analysis of work
System (AS - IS) as it is in its present form.
57
4.2 _iagramma _rastiriotiton
The modeling of the AS-IS system helps us to significantly and optical
now distinguish the procedures exist but also to recognize
possible changes the system needs.
The procedures that have emerged are:
Students coming to the institution and there are two cases a) knows 9en
to go so close to people from various political parties or
seek information from the intelligence department of the institution, b)
knows that
contacted and directed that way.
If there are people willing to help the student,
help fill the requests and the accompanying literature.
In the Secretariat, the student submits his application for the granting of
student
identity. To be considered the record of completed application and
required
medical examinations if the student has given him the time the
application is completed and
enters a phase of treatment by competent workers to secretaries.
A worker checks the registry file of the application and if all
Full details are sending the application to the Head of Service for
signature. If the information is incomplete, the student shall be informed
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 146
by telephone. If
request the student has shown that counterfeit items then informed the
department of the Rector.
The Director signed the applications and return them to the workers.
Also at times want to send statistics and reports on
applications to the Rector.
If the process the Secretariat completed successfully then given to
student studying the book and informed by the responsible official for
actions must be done to remove the student of
identity. The student is required within 5 days to come to
Care Foundation. It is a service charge on a pass
and providing health insurance to students. The folding of the student in
conjunction
to book a course the student identity of each student. The
58

Head of Service wants to send monthly reports to the Rector


to undertake the appropriate funds for students.
When the student leaves the responsibility may optionally appear in
Library to present the book to study and make an application for
a card.
Identity that the student has access to all logical and physical
source institution, only it may be served by the Secretariat and
also when they go in the area of food has to be with him
if requested.
Below is a chart of activities for existing
business processes.
59
Figure 9: 9iagramma activities, Part A.
It should also be dealt with here and if the student has already
student ID. The actions may make the student as
reported on and above are:
1. You may request any certificate or certificate of
Secretariat.
60
2. May be served by the staff of the library and
use its services.
So therefore clear and additional activity in graph
which deliberately did not mention above that area. We
Figure 10: 9iagramma activities, part B.
Below the diagram of use cases, which we
presents a picture of the future system and uses this
have.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 147
61
4.3 Use Case _iagramma
Below the diagram use cases
Fig 11. 9iagramma cases of use of CP
62
4.3.1 Description of use cases
Use Case Name: Authentication ID: 1 Importance Level:
High
Primary Actor: Student, Computer Science CP Use Case Type: Detail,
essential
Stakeholders and Interests:
Students - want to take action provided to the cardholder
MS Computer Science - wants to manage cardholder accounts
Registry - wants to perform operations on the object tab student
Library - wants to provide electronic and bibliographic material to
students and staff
Brief Description: This use case describes the introduction of students
and staff of different
service system using a password.
Trigger: Request to the system
Type: External
Relationships:
Association: Student, Secretary, Library, MS Computer Science
Include: Purchase of goods and services, elected representatives,
Monitor tab,
9iacheirisi tab student to provide evidence, 9iacheirisi accounts, access
to sources
Extend:
Generalization:
Normal Flow of Events:
1. The user may insert the card into a special reader and typing the
code.
If the code is running properly subflow1
If the code is wrong running subflow2
2. Logging in
3. Select and display interface according to the code.
SubFlows:
S-1: The password is incorrect
Recorded in the system user who entered the system and how
computer.
S-2: The code is wrong
Sought re-enter password
Alternate / Exceptional Flows:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 148
S-2, 1a. and in case of failure of third suspension of the account of that
user
and informing the SP of IT.
1b. Application to the department to provide a new password.
63
Use Case Name: Purchase of goods and services ID: 2 Importance
Level:
High
Primary Actor: Student Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to use the card to purchase goods and services
call money
CP Bank - wants to be informed about the transactions of the cardholder
Registry - wants to be informed about transactions involving fees
SP 9ioikisis - wants to give informed as to the transactions and rights
access
Library - wants to be informed about transactions involving services
Brief Description: This use case describes the process by which the
student buys products
and services within the institution.
Trigger: purchase request
Type: External
Relationships:
Association: Student
Include: Introduction to the system 9iacheirisi financial claims
Extend: Provide Documents
Generalization:
Normal Flow of Events:
1. Introduces a special card reader
2. Running the use case «Authentication»
3. Select the tab of financial services.
4. See references notices on its debts.
5. Search products and services.
6. Performs product or service they desire.
If the execution of purchase mistake running subflow1
7. The SP informed the bank to open
If the transaction is valid running subflow 2
8. Disconnect from the system
9. Get Card
SubFlows:
S-1: If the performance market is wrong
You receive a message warning the student
S-2: If the transaction is correct
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 149
Stored on the card the student the necessary information.
Alternate / Exceptional Flows:
6a. If it is invalid transaction it becomes an automatic logoff
and sending error SP Computerization
64
Use Case Name: Election of representatives ID: 3 Importance Level:
Medium
Primary Actor: Student Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to vote for representatives
Brief Description: This use case describes the process required to vote in
the student
Trigger: Vote representatives
Type: External
Relationships:
Association: Student
Include: Introduction to System
Extend:
Generalization:
Normal Flow of Events:
1. Introduces a special card reader
2. Running the use case «Authentication»
3. Selects the service record
If the approval process is not successful running subflow 1
4. View all candidates
5. Selection of candidates
6. Receipt print on these selected
7. Validation options
8. Storage options in the system
If the store is successful running subflow 2
If storage is not successful running subflow 1
9. Select Output
SubFlows:
S-1: If the adoption is unsuccessful
Warn me about.
Registration error SP Computerization.
S-2: If the store is successful
The registration number of students coming from the candidate list of
voters.
Alternate / Exceptional Flows:
S-1: 1a The repeated failure to adopt the service record leads to
lockdown
card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 150
and all services that the owner has.
65
Use Case Name: Monitor Tab ID: 4 Importance Level:
Medium
Primary Actor: Student Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to see the scores of courses and to request further
information
Brief Description: This use case describes the actions the student to see
the personal
tab to be informed about the scores and make
applications.
Trigger: The student enters the code to perform actions relating to
personal
the tab.
Type: External
Relationships:
Association: Student
Include: Introduction to System
Extend:
Generalization:
Normal Flow of Events:
1. Students visiting the website of the Foundation
2. Introduces a special card reader
3. Running the use case «Authentication»
4. View related environment
5. Select View tab student
6. Transaction monitoring
If a transaction is complete running subflow 1
7. Sending a request to the Secretariat
8. Receive requests from the Secretariat.
9. Logoff
SubFlows:
S-1: If the transaction is complete
Verification check with the credit card
Alternate / Exceptional Flows:
S-1: 1a. If the test is negative alerted the CP Computerization
66
Use Case Name: 9iacheirisi tab student ID: 5 Importance Level:
High
Primary Actor: Registry Use Case Type: Detail, essential
Stakeholders and Interests:
Registry - wants to handle applications and introduce new rankings,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 151
prepares statistics
Students - want to provide information about the grades and course
applications to the Secretariat
CP Bank - wants to keep for transactions involving the student
Brief Description: This use case describes the process by which officials
of the Secretariat
process student data tab
Trigger: The Secretariat wishes to draw the student tab
Type: External
Relationships:
Association: Secretary
Include: Introduction to System
Extend:
Generalization:
Normal Flow of Events:
1. The Secretariat performs the use case «Authentication»
2. Student Search - Find
3. Select the tab on the student management
4. Change data, information
If the changes are correct running subflow 1
If the changes are wrong running subflow 2
5. Signature of documents by the Director
If the documents prove false run subflow 3
6. Issue of certificates, licenses
7. Student Information
8. Preparing statistical report
9. Logoff
SubFlows:
S-1: If the changes are correct
Logging of the Secretariat of the system
S -2: If the change is wrong
Warning staff, provision of relevant directives
S-3: If the documents are considered false,
Then inform the police department.
Alternate / Exceptional Flows:
S-2 1a If the changes are wrong due to incorrect configuration of the tab
student then forwarded to SP Computerization
67
Use Case Name: Provide Documents ID: 6 Importance Level:
Medium
Primary Actor: Library Use Case Type: Detail, essential
Stakeholders and Interests:
Library - wants to provide library services to students
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 152
Student - use library services, access to resources depending on the
Rights
CP Bank - information about student financial transactions with the library

Brief Description: This use case describes the process by which the
library provides
items to students.
Trigger: The student wants to find and borrow bibliographic Library.
Type: External
Relationships:
Association: Library
Include: Authentication, Access to sources
Extend: Purchase of goods & services
Generalization:
Normal Flow of Events:
1. Introduces a special card reader
2. The student performs the use case «Authentication»
3. Select the tab for literature search
4. Access rights depending on the use of the card
5. Search - Search
If the books are finding success running subflow 1
If the book is unsuccessful finding out the subflow 2
6. Puts the books on a special automatic lending machine
If the machine does not work run the subflow 3
7. Were tested and displays the list of borrowed books
If no prior financial burden running subflow 4
8. The student confirms the decision of the machine
9. View list of books borrowed by a student
10. Demagnetize the books from the machine.
11. The student chooses to leave the system
12. Take the card and leaves.
SubFlows:
S-1: If your search is successful
The student is in the library books they want to borrow.
S-2: If a successful search
The student goes to stream 11.
S-3: If we do not operate the auto loan
The student is addressed to an official of the library
Run the flow 7.
S-4: If no prior financial burden
Asked the student to pay the fine and issued
Alternate / Exceptional Flows:
S-3: 1a The student pays the amount from the card after confirmation
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 153
2B, the student if there is money in the account of the then canceled
costs
68
Use Case Name: 9iacheirisi financial
requests
ID: 7 Importance Level:
High
Primary Actor: CP Bank Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to have an electronic wallet for all departments within the
institution
Registry - charge account where the student fees
CP Bank - updated for any size financial transactions of the student
Brief Description: This use case describes the process by which the bank
accepts CP
information on financial transactions
Trigger: Each half-hour SP Bank is informed of the movements of the
system
Foundation
Type: External
Relationships:
Association: CP Bank, Student
Include: Purchase of goods & services
Extend: 9iacheirisi accounts
Generalization:
Normal Flow of Events:
1. The SP receives notice of the bank to inform trading
2. The official bank codes entered into the system of bank
If the codes are correct running subflow1
If the codes are wrong running subflow2
3. Logging in the Bank
4. Start automatic updates alert on similar accounts
users
If an entry error caused running subflow3
5. Shipping movements in the user email account if they exceed an
amount
defined by the system
6. Output from the system staff
SubFlows
S-1: The codes are correct
Recorded in the system user who entered the system.
S-2: The code is wrong
Sought re-enter the codes
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 154
S-3: Incorrect update
Update service from which the requested change of account
The bill goes to state supervision by the banking system
Alternate / Exceptional Flows:
S-2, 1a. and in case of failure of third suspension of the account of the
user.
S-3, 1a If the system fails to meet bank, informed the SP
Computerization
69
Use Case Name: 9iacheirisi accounts ID: 8 Importance Level:
High
Primary Actor: Computerization CP Use Case Type: Detail, essential
Stakeholders and Interests:
Student - make correct documents for entry or modification of elements
of
Registry - Check documents for the educational purposes of the student
Library - information about changes to services has
SP Bank - Check best supporting economic
SP Computer - manage all accounts and is responsible for monitoring
these
Brief Description: This use case describes the process by which
management is
accounts of both new and existing, if
documents are correct.
Trigger: The MS Computer Science student record data
Type: External
Relationships:
Association: SP Computer
Include: Introduction to System
Extend: CP Bank, SP 9ioikisi
Generalization:
Normal Flow of Events:
1. Students arrive at the offices of the Computerization of the necessary
supporting
If the documents are incomplete running subflow 1
2. Part of the documents are sent to SP 9ioikisi Control
If the check is negative running subflow 2
3. An official SP Computer running use case «Introduction to System"
4. 9imiourgeitai tab of the student
If during the recording found an existing account is running a subflow 3
5. Insert the necessary data
6. Card issued by the student
7. Warn the student
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 155
SubFlows:
S-1: If the documents are incomplete
The request goes into standby mode
S-2: If the check is negative
The request is canceled and advised the student
S-3: If the student account is already
The request is canceled and advised the student
Alternate / Exceptional Flows:
1a. Students submit documents through the website of the institution.
S-3: 1a. If the student is notified in the same one that had the bill before it

canceled the first item (and card) and return the flow 4.
2a. If it is then sent notice to SP 9ioikisis the account goes into
idle.
70
Use Case Name: Set user rights ID: 9 Importance Level:
Medium
Primary Actor: SP 9ioikisis Use Case Type: Detail, essential
Stakeholders and Interests:
SP 9ioikisis - wants to decide on the rights of use according to the
documents
there are
MS Computer Science - wants to be informed about the changes
Brief Description: This use case describes the actions which change the
basis of the
rights to use the cards.
Trigger: Decision-making for information rights
Type: External
Relationships:
Association: SP 9ioikisis
Include:
Extend: MS Computer Science
Generalization:
Normal Flow of Events:
1. An official SP 9ioikitikou running use case «Authentication.
2. Student Search - Find
3. Processing request
If the request is checking of documents running subflow 1
If the request is cancel the card running subflow 2
4. Configuration using
5. 9inetai information on CP Computerization
6. Logoff
SubFlows:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 156
S-1: If the test is positive
SP informed Computerization
S-2: If the request is canceled card
The official checks for financial outstanding student in the institution
Alternate / Exceptional Flows:
71
Use Case Name: Access to sources ID: 10 Importance Level:
Medium
Primary Actor: Student Use Case Type: Detail, essential
Stakeholders and Interests:
Students - want to make entry into natural areas or networks.
Library - wants to know the status of a student to give similar access to
bibliographical sources.
SP 9ioikisis - wants to regulate use rights according to student status
Brief Description: This use case describes the process by which the
student is physically or
reasonable access to places and networks within the institution.
Trigger: The student wants to enter a physical or logical area
Type: External
Relationships:
Association: Student
Include: Authentication, provide evidence
Extend:
Generalization: Access to countryside, access to networks
Normal Flow of Events:
1. Introduces a special card reader
2. The student performs the use case «Authentication»
If the result is negative Authentication run subflow1
3. Take the student permission to use a logical or physical access
If the license is reasonably accessible to perform the subflow 2
If the license is for physical access to run the subflow 3
4. Use the source
5. Select Output
6. Take the card and leaves
SubFlows:
S - 1: If the result is negative Authentication
The student is notified of the outcome
SP informed the computerized energy.
S - 2: If the license agreement for reasonable access
The Library informed and provide access to sources of
SP informed the computerized energy
S - 3: If the license terms of physical access
SP informed the computerized energy
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 157
Alternate / Exceptional Flows:
S - 2: 1a, if the student has financial obligations to the Library, advised
accordingly
and access to sources is limited to basic.
72
4.3.2. Calculation of person-hours using use case points
Use Case Point Estimation Worksheet
Unadjusted Actor Weighting Table
Actor
Type
Description Weighting
Factor
Number Result
Simple External System with welldefined
API
122
Average External System using a
protocol-based interface, e.g.,
HTTP, TCT / IP, or a database
236
Complex Human 3 1 3
Unadjusted Actor Weight Total (UAW) 11
Unadjusted Use Case Weighting Table
Use Case
Type
Description Weighting
Factor
Number Result
Simple 1 - 3 transactions 5 8 40
Average 4 - 7 transactions 10 2 20
Complex> 7 transactions 15 0 0
Unadjusted Use Case Weight Total (UUCW) 60
Unadjusted Use Case Points (UUCP) = UAW + UUCW
UUCP = 11 +60 = 71
Technical Complexity Factors
Factor
Number
Description Weight Assigned
Value (0 - 5)
Weighted
Value
Notes
T1 Distributed system 2 4 8.0
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 158
T2 Response time or
throughput
performance
objectives
1 4 4.0
T3 End-user online
efficiency
1 5 5.0
T4 Complex internal
processing
1 3 3.0
T5 Reusability of code 1 4 4.0
T6 Easy to install 0.5 3 1.5
T7 Ease of use 0.5 4 2.0
T8 Portability 2 3 6.0
T9 Ease of change 1 4 4.0
T10 Concurrency 1 2 2.0
T11 Special security
objectives included
1 5 5.0
T12 Direct access for third
parties
1 4 4.0
T13 Special User training 1 3 3.0
73
required
Technical Factor Value (Tfactor) 51.5
Technical Complexity Factor (TCF) = 0.6 + (0.01 * Tfactor)
TCF = 0.6 + (0.01 * 51.5) = 1.115
Environmental Factors
Factor
Number
Description Weight Assigned
Value (0 - 5)
Weighted
Value
Notes
E1 Familiarity with system
development process
being used
1.5 2 3.0
E2 Application experience 0.5 3 1.5
E3 Object-oriented
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 159
experience
1 3 3.0
E4 Lead analyst capability 0.5 2 1.0
E5 Motivation 1 5 5.0
E6 Requirements stability 2 3 6.0
E7 Part time staff -1 0 0.0
E8 Difficulty of
programming language
-1 -5.0 5
Environmental Factor Value (Efactor) 14.5
Environmental Factor (EF) = 1.4 + (-0.03 * Efactor)
EF = 1.4 + (-0.03 * 14.5) = 0.965
Adjusted Use Case Points (UCP) = UUCP * TCF * ECF
UCP = 71 * 1.115 * 0.965 = 76.394225
According to the algorithm is the RIM 28
Person Hours Multiplier (PHM) PHM = 28
Person Hours = UCP * PHM = 76.394225 * 28 = 2139.0383
Therefore concludes that the project is feasible and necessary
total of about 2139 man-hours. In this work, but must work
People who have experience developing similar environments and
have direct contact with new technologies.
Then give the class diagram for the entire Information System
as well as CRC cards obtained.
74
4.4 0omiki modeling
Figure 12: 9iagramma classes in Information System
75
4.4.1 CRC cards
The corresponding CRC Card diagram of classes are:
Front:
Class Name: Person Person ID: 1 Type: Concrete, Domain
Description: Describes the general people
system
Associated Use Cases:
Responsibilities
- Access to the system
Collaborators
Back:
Attributes:
Name (string)
Last Name (string)
Identity (char)
Relationships:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 160
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Officials
Foundation
ID: 2 Type: Concrete, Domain
Description: Describes the general staff of
Foundation
Associated Use Cases:
Responsibilities
Collaborators
Back:
Attributes:
Department (string)
Division staff (char)
Relationships:
Generalization (a-kind-of): Face - Room Service
Aggregation (has-parts):
Other Associations: Search
76
Front:
Class Name: Student ID: 3 Type: Concrete, Domain
Description: The person giving the
Services Foundation
Associated Use Cases: 4
Responsibilities
- Submit application
- Monitor application
- Take affidavits, certificates, business card
- Takes items (books, articles)
- Tucked sources (logical, physical)
- Buy products
- Vote in elections Foundation
Collaborators
Documents
Quest
Documents
Resources
Products Documents - Proof
Voting records;
Back:
Attributes:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 161
Registration (char)
Examinospoudon (integer)
Possession Card (boolean)
Relationships:
Generalization (a-kind-of): Face - Night
Aggregation (has-parts):
Other Associations: Search, Documents, Resources, Products
Front:
Class Name: 9iefthyntis ID: 4 Type: Concrete, Domain
Description: The person who supervises officers
Foundation
Associated Use Cases: 1
Responsibilities
- Sign writing
- Publishes statistics
- Police Information
Collaborators
- Employee, Documents
- Employee
- Control
Back:
Attributes:
Relationships:
Generalization (a-kind-of): Employee Foundation
Aggregation (has-parts):
Other Associations: Service and Documentation, Testing
77
Front:
Class Name: Employee
Service
ID: 5 Type: Concrete, Domain
Description: The person responsible for
number of services provided within the institution
Associated Use Cases: 4
Responsibilities
- 9imiourgei regulates accounts
- 9iacheirizetai rights
- 9aneizei presumption
- Make payments
- Prepares certificates
- Registers request
- Prepares report
- Inform students
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 162
Collaborators
- Documents
- Documents, Information
- Update
- Documents
- Documents
Back:
Attributes:
Relationships:
Generalization (a-kind-of): Officials of the institution
Aggregation (has-parts):
Other Associations: Documents, Control, Information, 9iefthyntis
Front:
Class Name: Bank ID: 6 Type: Concrete, Domain
Description: The agency informed
financial transactions card holders
Associated Use Cases: 1
Responsibilities
Inform user accounts
Collaborators
- Information, Documentation
Back:
Attributes:
Department (char)
Information officer (string)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Documents, Information
78
Front:
Class Name: Verification ID: 7 Type: Concrete, Domain
Description: Total process serving
same action for other classes
Associated Use Cases: 3
Responsibilities
- Checks if conditions met
- Validity of evidence
- Control card
Collaborators
- Documents
- 9iefthyntis
- Employee service
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 163
Documents
Back:
Attributes:
Type of Control (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Documentation, Employee Service, 9iefthyntis
Front:
Class Name: Media ID: 8 Type: Concrete, Domain
Description: set of procedures that serve
other classes with a focus on updating their
Associated Use Cases: 3
Responsibilities
Identifies the type of user
Send information
Collaborators
- Employee service
Bank
- Bank Employee
Service, Resources
Back:
Attributes:
Species Information (char)
Registration number (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Resources, Employee Service, Bank
79
Front:
Class Name: Find ID: 9 Type: Concrete, Domain
Description: Total processes that
joint actions in other classes
Associated Use Cases: 6
Responsibilities
Displays the search result
Collaborators
- Documents, Sources
Back:
Attributes:
Search Type (char)
Relationships:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 164
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Documents, Resources, Student, Employee
Foundation
Front:
Class Name: Source ID: 10 Type: Concrete, Domain
Description: Provides access to people with physical
or logical areas of the institution
Associated Use Cases: 2
Responsibilities
- It records the movements
Collaborators
- Information, Student
Back:
Attributes:
Type (char)
9ikaiomata (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: News, Student, search
80
Front:
Class Name: Documents ID: 11 Type: Concrete, Domain
Description: Total items obtained as
derivatives of other actions of other classes
Associated Use Cases: 5
Responsibilities
- Audit rights
Collaborators
Control
Back:
Attributes:
Type (char)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Student, Search, 9iefthyntis, Bank, Check,
Products
Front:
Class Name: Reference ID: 12 Type: Concrete, Domain
Description: A document required to start
The account creation process
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 165
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Registration number (integer)
Status request (String)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts): 9ikaiologitika
Other Associations:
81
Front:
Class Name: 9ikaiologitika ID: 13 Type: Concrete, Domain
Description: Documents required for a
integrated application
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Type (char)
Number (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Certificate _______ID: 14 Type: Concrete, Domain
Description: A document that shows properties
are people within the institution
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Registration number (integer)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts):
Other Associations:
82
Front:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 166
Class Name: Receipt ID: 14 Type: Concrete, Domain
Description: Type of financial document
showing payments made
Associated Use Cases:
Responsibilities
Collaborators
Back:
Attributes:
Number (integer)
Service (String)
Sum (float)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts): Fine
Other Associations:
Front:
Class Name: Fine ID: 15 Type: Concrete, Domain
Description: Type of evidence given when it
to pay the student specific services
Associated Use Cases: 2
Responsibilities
Collaborators
Back:
Attributes:
Date (date)
Reason (text)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
83
Front:
Class Name: Identity -
card
ID: 16 Type: Concrete, Domain
Description: Used by people within
foundation for actions.
Associated Use Cases: 8
Responsibilities
Collaborators
Back:
Attributes:
9ikaiomata use (integer)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 167
Sum (float)
Code (char)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Vote ID: 17 Type: Concrete, Domain
Description: Used for the election
Representatives
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
Date (date)
Array (String)
Relationships:
Generalization (a-kind-of): Documents
Aggregation (has-parts):
Other Associations:
84
Front:
Class Name: Product ID: 18 Type: Concrete, Domain
Description: Goods may be purchased by student
Associated Use Cases: 2
Responsibilities
- Sale
Collaborators
- Documents - Proof
Back:
Attributes:
Type (String)
Price (float)
Product code (char)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations: Student, Documents
Front:
Class Name: Service ID: 19 Type: Concrete, Domain
Description: Description of general services
exist within the institution.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 168
Associated Use Cases: 3
Responsibilities
Collaborators
Back:
Attributes:
Name (String)
Number of employees (integer)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts): Library, Computer, 9ioikisi
Other Associations:
85
Front:
Class Name: Library ID: 20 Type: Concrete, Domain
Description: Description of the Office of the Library
Associated Use Cases: 1
Responsibilities
Collaborators
Back:
Attributes:
List (String)
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: 9ioikisi ID: 21 Type: Concrete, Domain
Description: Description of the service 9ioikisis
Associated Use Cases: 1
Responsibilities
- Organisation of procedures
Collaborators
Back:
Attributes:
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
Front:
Class Name: Computer ID: 22 Type: Concrete, Domain
Description: Description of ypiresiatis
Computerization
Associated Use Cases: 1
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 169
Responsibilities
- 9iorthosi errors
- Error Logging
Collaborators
Back:
Attributes:
Relationships:
Generalization (a-kind-of):
Aggregation (has-parts):
Other Associations:
86
Then move on to diagrams of conduct to study the
use cases outlined above. The dynamic representation of
Chart helps us to reconstruct the different streams of messages
out over time.
Thus we have the following behavior diagrams for use cases.
4.5 Behavior Modeling
In diagrams visualized the flow behavior of use cases
and acquire a better view of what happens during
the system implemented. The sequence diagrams that
will be followed for all use cases analyzed in
previous sections. The diagrams describe the operational
procedures of the institution in terms of purpose. Until now, these
processes
have perigraftei level classes.
87
1st Case of use: Authentication.
Fig 13. Authentication
88
2nd Case of use: Purchase of goods and services.
Fig 14. Buying goods
89
3rd Case of use: Election of delegates.
Fig 15. Voting
90
4th Case of use: Monitoring tab.
Fig 16. Monitoring tab.
91
5th Case of use: 9iacheirisi student tab.
Fig 17. 9iacheirisi tab.
92
6th Case of use: Provide evidence.
Figure 18: evidence
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 170
93
7th Case of use: 9iacheirisi financial demands.
Fig 19. Financial claims
94
8th Case of use: 9iacheirisi accounts.
Fig 20. 9iacheirisi accounts
95
9th Case of use: Set user rights.
Fig 21. Setting Rights
96
10th Case of use: Access to sources.
Fig 22. Access to sources
97
We should at this point to mention that these diagrams
behavior because the user confirmation scenario repeated in almost
all the diagrams do not plan again after the first graph where
fully described. Was to simplify the diagrams and more
effective understanding of other shapes.
Then follow these diagrams and charts
statements. Charts situations are dynamic models show
different situations that an object can have during
interacting with life events, through its own activities (Dennis
A et al 2005).
The contents of a matrix of situations can only be one class,
but may include a set of classes or the whole
system.
So we have:
Fig 23. 9iagramma returns "the student buys products'
98
Fig 24. 9iagramma katastaseongia "the student has access to sources"
Eik.25. 9iagramma statements for the "student vote"
Eik.26. 9iagramma returns "the official handles requests"
99
Fig 27. 9iagramma returns "state application for a student
identity '
100
5th Chapter
5. Design
5.1. 0iagramma Packages and Strategy Development
Turning to the design phase, on an 9iagramma Packages and
Strategic Development implemented chart packages. This chart
Then, in the 9iefthynti Library. Also then
mentioned the most appropriate development strategy based on all
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 171
information
we had so far in our disposal. Graph special packages
interest was the grouping of different classes of procedures
levels (layers) and the separation of the computer system in three main
layers, HCI, PDL, DML and relations between them. Simplification of
Class diagram based on the logical grouping increased the ratio
understanding.

Fig 28. 9iagramma package and strategy


The development strategy proposed is outsourcing. Why will be assigned
to
specialized company with similar experience and specifications are
fixed, so reducing the risk of errors or omissions. So the
timing system can be lower. Also
EDP department of the institution makes software development so that
102
contract awarded to a company that has more experience in this area
is a major advantage of this strategy. Even the staff will not
burdened with extra work and will not be involved in the production of
program will be implemented to support the CP.
There will be particular attention is the contract that would
Signed with the firm, which should include conditions (recommended
safeguards) to not leak information to relate to
information security within the system. The type of contract that
proposed is the fixed-price. Another point should be emphasized
the situation after the implementation is on track to technical
support and maintenance of the natural system.
It will also say that a key point for better functionality, which
which should be fixed in this contract to be done is to have
staff training in the new system, because officials have not
expertise in smart card technologies.
5.2 Planning classes and methods.
A review of methods for the design criteria were not revealed
new diagram classes. Because the methods are presented in the above
Figure headings are too many, have been selected at this stage
most important of these. The methods that are most relevant
terms of analysis is the access to sources () Purchase of goods () and
Signing documents (). In practice, contracts are created for each method
can receive messages from other objects. The contract contains
information necessary so that a programmer can
understand what is in the process, so that they might implement it. The
following form (method specification form) contracts (contract format)
describing the code of the method is implemented by
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 172
developers. 9inontai ie instructions on what to implement the method
a code base (Dennis A et al 2005).
103
Contract Format
Method Name: access to source () Class Name: Student ID: 1
Clients (Consumers): Method of Inspection Rights ()
Associated Use Cases: Student, Resources, Audit, ID - card
Description of Responsibilities:
Insert the card and having entered the code performs a request
access.
Returns subject information on whether the card user has
necessary rights to make use of natural or logical resources.
Arguments Received:
Id_student: char
Password: char
Current_date: date
Type of Value Returned:
Access (boolean)
Information (text)
Pre-Conditions:
Provide user card.
Passwords are correct
Post-Conditions:
Method Specification Form
Method Name: access to source () Class Name: Student ID:
Contract ID: 1 Programmer: Date Due:
Programming Language:
 Smalltalk   Visual Basic   C + + Java X
Triggers / Events:
Insert a card reader, request use of sources
Arguments Received:
Data Type:
Notes:
char Id student
char Password
Date Date
Messages Sent & Arguments Passed:
ClassName.MethodName:
Data Type:
Notes:
Control: Control Card () Boolean
Documents: String control rights
Argument
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 173
104
Returned: authorization decision
access
Data Type: Object
Notes: receive permission to access
Algorithm Specification:
Misc.Notes:
Contract Format
Method Name: Purchase of goods () Class Name: Student ID: 2
Clients (Consumers): Method of sale ()
Associated Use Cases: Student, Bank Products, Proof
Description of Responsibilities:
Debit card with the amount of money required to acquire
good.
Returns the balance of the card.
Arguments Received:
Id_student: char
password: char
Current_date: date
Price_product: float
Type of Value Returned:
Proof (object)
Summary (float)
Pre-Conditions:
Provide user card,
Passwords are correct
Be enough money in the account
Post-Conditions:
To create the correct object in the correct form.
Method Specification Form
Method Name: purchasing goods () Class Name: Student ID:
Contract ID: 2 Programmer: Date Due:
Programming Language:
 Smalltalk   Visual Basic   C + + Java X
Triggers / Events: Tap Button property market
Arguments Received:
Data Type:
Notes:
char Id student
char Password
date Date
Product price float
105
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 174
Messages Sent & Arguments Passed:
ClassName.MethodName:
Data Type:
Notes:
Products: sales () float Price
Control: Control Card () boolean Market Entry
Bank: Account Update () float Account Balance
Argument
Returned: Proof
Data Type: Object
Notes: sends proof of receipt
Algorithm Specification:
Misc.Notes:
Contract Format
Method Name: signing documents ()
Class Name: 9iefthyntis ID: 3
Clients (Consumers): Preparation certificate, registration application ()
Associated Use Cases: Employee, Student, Documents
Description of Responsibilities:
Sign documents relating to student requests for various actions
served by the secretariats
Returns whether the certificate or, in general the documents are intended

for students can be delivered.


Arguments Received:
Id_student: char
Current_date: date
Type of Value Returned:
Certificate / Certificate (object)
id_certificate (longint), the id of the certificate.
Pre-Conditions::
The application documents must not be forged.
Provide students with ID - card
Provide staff
Post-Conditions:
To create the correct object in the correct form.
106
Method Specification Form
Method Name: signing documents ()
Class Name: 9iefthyntis ID:
Contract ID: 3 Programmer: Date Due:
Programming Language:
 Smalltalk   Visual Basic   C + + Java X
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 175
Triggers / Events:
The documents are not forged
Arguments Received:
Data Type:
Notes:
char Id student
Date Date
Messages Sent & Arguments Passed:
ClassName.MethodName:
Data Type:
Notes:
Official: Prepare certificate () String
Control: Control card boolean
Employee: Student Information Get information on String
the state of
application
9iefthyntis: Information
Police
String If the supporting documents
application prove
false
Argument
Returned: Certificate /
confirmation
Data Type: Object
Notes: The license / certificate given /
sent to the student
Algorithm Specification:
Misc.Notes:
107
5.3 Window 0iagramma Navigation
For 9iagramma navigation selected the most important processes
use. Thus we have the following scenarios:
1o Use Case Scenario: A student purchases goods and services
1. The user visits the system. (1)
2. Introduces smart card (1)
3. Performs product search - Search (2)
4. 9idetai purchase a product or service (2, 6, 7)
5. The user is informed of the financial operations of (7)
2o Use Case Scenario: The student has access to sources of the
institution
1. The student introduces the card in a special machine and enter the
source
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 176
(1.10)
2. Students looking for items to logical or natural sources. (10, 6)
3. Receive evidence, using library services (6)
3o Use Case Scenario: The official work, perform a series of operations
has.
2. The official linked to the appropriate environmental management by
introducing
card. (1)
3. 9iacheirizetai the requests from various student cards (5)
4. Inform other departments of the institution and the student tab on (4,8)
4o Use Case Scenario: The director of the service review and sign
documents
1. The director certified and enters the management system (1)
2. Document control (5.8)
3. Publication of statistical reports (5)
The bar graph window (WND) is obtained:
108
Fig 29. Graph Navigation Window
109
5.3.1. Interface Design Standard
Interface Metaphor: Application connection services using smart cards
University
Interface Objects:
Requests: All requests for services
9ikaiologitika: All-reference documents required for applications
Manual: Manual of the implementation of particular content
explain the use of smart cards.
Interface Actions
Search: Display results depending on the keyword that was
Navigation: Displays the current screen
Submission: Submit an application for registration information
Purchase: View account and asset value
Statistics: Statistics Report-enabled configuration criteria
Monitor: View procedures kartelaschristi
Interface Icons:
Icon home page: will be used on all pages
Icon Contact: used on all pages
Icon emergency: to be used on all pages
Icons Language: used on all pages
Icon shopping cart will be used on pages that relate to
charge card.
Icon quick login to the account: to be used in all
pages.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 177
Icons for file operations such as: storage, deletion,
downloading etc. Be used in all environments users
have management functions.
110
5.3.2. Interface Evaluation
. As a method to assess the interface suggest the Walkthrough
evaluation, the
reasons are:
1. The officials are not familiar with new technologies, so a
more visual assessment with an explanation of the analyst about how the

interface would be more profitable than the part of the evaluation


2. It is a good first touch and user interface, meaning that it is
controlled by the processor that created the interface and is able to
explain the philosophy to which he did.
3. From the discussion that will occur after the presentation as normal
reaction of the public (users), outputs (perhaps new requirements or
additions to the interfaces) will close einaipio actually
achieved in comparison with other assessment techniques. The basic
parameter
is as above the line of sight for the users and
coupled with the fact that users know their job well, the combination
these two leads to a result set (corrections) closer
the actual implementation.
5.4 Infrastructure Planning
In the final stage of the design phase which is the 'Design
Infrastructure, developed to extend the diagram (deployment model) and
network model (network model), which can see all the external
systems in which the university should interact. The
first diagram helps us to understand the architectural design
systems, both hardware and software for use in new
Information System. The source of this information was considered
important as
We are now in a position as advisors to have a glimpse of the system
and that users on the basis of technological knowledge should be
prepared.
While the second chart may indicate possible improvements to the
requirements
111
infrastructure in telecommunications equipment should have the
foundation to
meet the requirements of the new Information System.
Fig 30. Model Extension (Deployment Model)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 178
As shown apotin picture above, the system is independent of the
platform operating system with the users' computers.
This is due to technology development that will be used. It is also
evident that the connection to the application is necessary reader
cards, which might push the cost of implementation, but should not
forget the important advantages resulting from the use of the cards
when the cost of the device outweighed the benefits.
Then describe the network model of the Information System.
112
Fig 31. Network model (Network model)
For the smooth functioning of the system will be implemented for
information
system investigated should communicate with all networks
described in the above image. The network of consulates necessary
it is known that there interstate agreements to exchange students
between institutions, when a foreign student should be treated as
unit within an institution, like other students. For all other networks
there was no reference to previous sections on the reasons
connection with the system operated.
Network
Universities
diene
Police
Network
Network
Minister
Education
Network
Consulates
Network
Insurance
Funds
Network
Banks
Private
Network
Private
Network
Private
Network
Private
Network
Private
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 179
Network
113
Chapter 6 - Overview of application implementation
For the implementation of the application used the following programs
and
Libraries (Netbeans, 2007), (Java Card, 2007), (GPShell, 2007),
(OpenJDK 7,2007),
(MySQL, 2007), (PhpMyAdmin, 2007), (PSPad, 2007):
1. Netbeans 5.1.1
2. Java Card Kit 2.1
3. Java Card Kit 2.1.1
4. GPShell 1.4.1
5. Open Platform 1.1.0
6. OpenJDK 7
7. MySQL 5
8. PhpMyAdmin 2.9.2
9. Mysqlconnector java 5.0.8
10. PSPad editor
11. JDK 1.2.2
12. JDK 1.6.0_02
The equipment used is as follows:
GemXpresso 64K - Smart card 
GemPC USB-SL - Smart card  reader
On - Card application
Initially we installed the Kit of Java Card 2.1.1 and later
Make the files are missing from the Java Card Kit 2.1.1 and has
2.1. The Kit is available from Sun to develop on - card
applications (the latest version of JCKit 2.2.2 provides better tools
simulation, but the resulting output files can not be
currently supported by all the smart cards in circulation
trade.). Because the applet to be "downloaded" the card would actually
be
a snapshot of the applet to the memory card should EEROM
114
try to implement the simulator JCKit whether responding
correctly. 9en can work out the code of the applet when it is loaded
the smart card and since installing the applet is usually
consuming need to have tried at least once in 1
simulator that runs normally without problems. The simulator
represents the behavior of smart cards to the commands of Java
Card, however, is not a panacea for all cards. More specifically, could
an applet in the simulator naemfanizei some problems, but when
loaded on the card does not have an obvious problem when accepting
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 180
orders
the application (off - card).
The process of development of on-card application (applet) is
schematically indicated
in Fig 2
The code developed at the interface of the program PSPad
covers the on - card implementation in the following scenario: The applet
is installed when
the card is initialized so that values are the number, the
name, surname of the student and a code by which it can
perform certain actions. Also, the applet may serve
economic functions, such as the student to load the card with money and
can purchase goods and services with it.
The code on - card application (Myapplet.java) is given in Appendix A.
Before proceeding to the explanation of the code should refer to the way
to operate the applet on - card to make it more understandable.
When the packets are defined and loaded in the Java smart card and
related
other packages on the card if they exist, then we consider the life cycle
the applet starts. The snapshot of the applet is created and entered in
JCRE (Java Card Runtime Environment). This means that only one
applet can
run each time. When the applet is installed first, then
in a passive state. Becomes active when the epilechtheiapo off card
application. When selected the off card application sends the command
and the applet
sends the response, the process is repeated until a new applet
115
selected by the application or leave the card reader
(Hansmann et al. 2002). The procedure described in the figure below.
Fig 32. On implementation of the applet (Hansmann et al. 2002).
Each instance of the applet loaded on the card has a unique AID
(Application identifier), each packet is also using the Java applet
also indicated that AID, the accuracy is like a subset of. The
AID is an array of bytes, which can be interpreted in two different
pieces.
Fig 33. Application identifier (AID) (Hansmann et al. 2002).
The first piece of RID (resource identifier) is a 5 byte size and state of
which company has written the applet. Every company has a unique RID
which
under the control of the agency ISO. The second part is a variable
length value known as PIX (proprietary identifier extension), this element
typically uniquely identifies the applet company (Hansmann et al. 2002).
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 181
When off - card application sends the command SELECT to select the
applet
is on the card, searching for the applet is based on the existing AID
the command option. If found then JCRE to select and run the applet.
Each applet is applied by creating a subclass of class
javacard.framework.Applet. Here are the methods of those who JCRE
Calls from creation to execution of the applet.
RID (5 bytes) PIX (0 - 11 bytes)
Inactive Active
process a
comman
create d
select
deselect

1. public static void install (byte [] bArray, short bOffset, byte


bLength): The
JCRE calls this method to create the enastigmiotypo
subclass of Applet.
2. protected final void register (): This method is used by the
applet
to store a snapshot of the applet and to JCRE
match the AID of the CAP file in the snapshot of the applet.
3. protected final void register (byte [] bArray, short bOffset, byte
bLength): The
This method has the same application as the above.
4. public boolean select (): The JCRE calls this method to inform
applet is selected.
5. public abstract void process (APDU apdu): The JCRE calls this
method
to prepare the applet to accept for processing incoming
APDU command.
6. public void deselect (): The JCRE calls this method to
inform the currently selected applet to another applet is selected.
Taking all the above can describe the code clearly.
In line 1 indicate the path where the file resides. Then
Line 3 is the statement of the necessary import libraries that
frequently is javacard.framework, but there are others such as
javacard.security used for data encryption
mostly.
On lines 5-292 is heading Myapplet. This class is therefore
outside the

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 182
fixed variables (lines 8 to 42) which defines the CLA, the INS
orders
and some constants, a variable initializers (lines 44 to 49), the
constructor Myapplet (lines 55 to 77) and the following methods
(lines 85 to 290)
public static void install  (byte [] bArray, short bOffset, byte
bLength): Here
called a constructor MyApplet create a new object.
public boolean select ():  Here is a selection of applet if not
exhausted by the effort the user to enter the PIN correctly
card.
117
public void deselect (): Here  the applet from-selected and
invited method
reset () of the pin, which controls a boolean variable on whether
the
pin has entered the cardholder is valid or not.
public void process (APDU  apdu): This method accepts an
APDU
command under the INS office that calls other methods. For
example, if the INS's mandate is 01 then we invite getstudentId (
apdu).
private void verify (APDU  apdu): This method checks whether
the command
sent by the application when the user entered the PIN is the
right. 9iladi check the price has the mandate to that the applet
has taken to initialize.
private void getstudentId  (APDU apdu): Returns the response
as mandated by
number of the user, the applet is given in
initialization.
private void getname (APDU  apdu): Also here returns the
name of
user.
private void getlastname  (APDU apdu): Likewise returns the
name of
user.
private void credit (APDU  apdu): This method allows the user
to
load on your money, if it is entered correctly the code.
There are also some extra controls on the amount that wants
user to load the card. So what can be more

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 183
of 127 monetary units and not less than 0 monetary units.
Also, the maximum amount on the card can not be more than
462,847
monetary units.
private void debit (APDU  apdu): This method allows the user
has been entered correctly the code to charge the card with an
amount
does not exceed what the card is already inside.
private void getBalance (APDU  apdu): The
methodosepistrefei the amount that the
Card is the time when the command is sent from the application.
118
Then we will describe how they create the class files
and that inside the converter is created CAP file which will be
loaded
card.
Open a command environment MS-DOS and run the file
javacard_env.bat which we created when we install the Java
Card Kit 2.1.1.
The file contains the following:
@ Echo off
set JAVA_HOME = c: \ Java \ jdk1.6.0_02
set JC21BIN = c: \ jc211 \ bin
set PATH =% JC21BIN%;% JAVA_HOME% \ bin;% PATH%;
set CLASSPATH = c: \ jc211 \ bin; c: \ jc211 \ samples
In essence what this does is set some environment variables are
are necessary. Then type the command cd
c: \ jc211 \ samples \, command us to the samples folder where
you
putting the following command:
.. \ .. \ Jdk1.2.2 \ bin \ javac.exe-g-classpath .. \ bin \ api21.jar
com \ sun \ javacard \ samples \ Myapplet \ *. java
So I have compiled the file with Myapplet.java libraries jdk 1.2.2,
These requirements are due to the adoption of Java Card as the
cards
support. Inside the folder is the file Myapplet Myapplet.class
Then execute the command:
converter-config com \ sun \ javacard \ samples \ Myapplet \
Myapplet.opt
This command will create in the folder Myapplet \ javacard \ 3
records
endings. jca,. exp, cap. Myapplet.opt file gives instructions to
converter
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 184
on the conversion. This file has the following:
119
-Out EXP JCA CAP
-Exportpath .. \ api21
-Applet 0xa0: 0x0: 0x0: 0x0: 0x62: 0x7: 0x1: 0xc: 0x2: 0x1
com.sun.javacard.samples.Myapplet.Myapplet
com.sun.javacard.samples.Myapplet
0xa0: 0x0: 0x0: 0x0: 0x62: 0x7: 0x1: 0xc: 0x2 1.0
The first line provides information about the files we want to
create.
In the second line there is the information on where to find the
converter libraries needed by the applet.
In the next line we define the AID of the applet.
In teleftaiagrammi define the AID of the package applet.
Myapplet.cap file has been created and therefore can now be
install the card.
At this point it should be noted that the testing phase in Java
simulator has been omitted because, as indicated above tools
Simulation Kit 2.1.1 is not sufficient to be tested efficiently.
The GPShell is an open source software which helps in making
install a CAP file in a smart card, looking at the AID
applet initialized and what statements are and then we can
delete the applet from the card. These functions are basic but
however, is for many the best solution to commercial
programs. At the command prompt, and if we are in the file
contains GPShell.exe execute the following command:
GPShell.exe InstallgemXpressoProR3_2E64.txt
This command initialize the applet on the card, the instructions
given by the
File InstallgemXpressoProR3_2E64.txt (which is on file GPShell,
Like the CAP file we created above). File
InstallgemXpressoProR3_2E64.txt has the following code:
120
mode_201
gemXpressoPro
enable_trace
establish_context
card_connect
select-AID A000000018434D00
open_sc-security 3-keyind 0-keyver 0-key
47454d5850524553534f53414d504c45
/ / Open secure channel
install-file Myapplet.cap-instParam
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 185
4D49533036323747454F524745564552414E495332373031303
5-sdAID
A000000018434D00-nvCodeLimit 4000
/ / ID -> MIS0627 -> 4D495330363237
/ / NAME -> GEORGE -> 47454F524745
/ / LASTNAME -> VERANIS -> 564552414E4953
/ / PIN -> 270105 -> 323730313035
card_disconnect
release_context
In the first 7 lines are the commands needed to open a safe
communication channel (mutual authentication) with the card.
More specifically, the
command select-AID A000000018434D00 select an existing
applet on the card
which is known as the card manager. The applet is therefore
necessary
be selected to "open" communication channel card and not
can be deleted. Installed by the manufacturer and for each
card initialization is unique. In line 7 are given the mandate for
opening the secure channel as we can discern is the
parameters of security, keyind, keyver, key. The first refers to the
level
security card, this used has 3 levels.
The next 2 have to do with the characteristics of the key, for
example
if we create our own key then keyver would value a
key (keyver => key version, keyind => key index). In this
case have the value 0 because we use the key to the
manufacturer
121
company has put on the card. If you turn the key in ASCII you will
see
that 47454d5850524553534f53414d504c45 ->
GEMXPRESSOSAMPLE.
In the ninth line is given the mandate to install and Myapplet.cap
initialize the applet. Parameter-instParam value is given
4D49533036323747454F524745564552414E495332373031303
5 which is the
initialization Myapplet.cap. The parameter-nvCodeLimit has the
value 4000
which means that when running the applet on the card will
assume overall
4K to the memory card. The following instructions are for
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 186
disconnected
safety. Lines beginning with / / are comments.
If the installation does not command us then return error
message
believe that the installation was successful. Here
echeioloklirothei description of
on - card application.
6.2 Off - Card application
The off - card application was developed in the interface of the
program
NetBeans 5.1.1. To connect the application to the base was used

plug - in mysqlconnector java 5.8.0. 9imiourgithike with a


PhpMyAdmin
user only has access to the database by name and
mynewdatabase
tables is: party, voting, products. Also been used and
Java Smart Card API given by Openjdk 7.
6.2.1. Description
The scenario is off - card application covered are as follows: The
cardholder
introduces a special card reader and can then navigate to
application. The application gives access to the user after
previously connected to it and give correct password.
It includes four sections:
Link: Here the user clicking Connect, the application makes the
connection and
chooses the card applet with AID in the command selection
sends.
122
Fig 34. Before the connection option.
Fig 35. The user chooses to connect without introducing the card.

Fig 36. After selecting a connection.


Record holder: Selecting the Validate button and the code is
right then displays information about the cardholder.
123
Eik.37. Before the selection control code
Fig 38. The code is wrong
Fig 39. After the successful verification code
Finance: Here the user can "load" the card with a cash
amount or can spend the money that the card by purchasing
products.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 187
124
Every time you buy something that decreases the amount
through the card,
depending on the cost of the product. Prices of goods and
services
may be renewed by the database.
Fig 40. Financial Tab
Fig 41. The user can purchase any of the displayed products;
selects the Meal B.
125
Fig 42. The user has chosen to buy Meal B and the amount of
the card
decreased by 15 €, while the value of the product.
Fig 43. The user will make the card in the amount of 10 €.
Fig 44. The user has submitted to the card 10 €.
126
Fig 45. The user chooses to purchase the product for the value of
which is
money to the card.
Fig 46. The user selects the card to deposit an amount of more
than
127 €, which does not allow on - card application.
Vote: Here the user can vote in student elections. Becomes the
Check if you have already voted.
Fig 47. Environment vote.
127
Fig 48. The user chooses to vote for a party
Fig 49. The user has voted
Fig 50. The user tries to vote again
128
It should be noted here that the voting results are shown in
party list and may for instance through a web application to
highlight
Internet.
The application was designed to be viewed more functionality
applications can have technology in a exypnonkarton
university.
6.2.2. Architecture
The application consists of files:
1. Main.java: this is where the object is of type Apcard
ApplicationJFrame and also here are some initial settings
concerning the appearance of the object.
2. ApplicationJFrame.java: This is designed for our application for
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 188

appearance and the functionality it supports.


3. ProxyCard.java: This file has all of those methods necessary
to communicate with the ApplicationJFrame.java on - card
implementation
card.
4. MyDBConnection.java: Here are the necessary methods for
Apcard object interaction with the database.
5. OPSPUtil.java: This file is in the library OpenPlatform 1.1.0
and has been amended accordingly to be compatible with the
Java Smart Card
API I / O when called its methods.
129
Basically it could be represented as follows:
Figure: 6: Architecture off-card application
6.2.3 Code Description File
The codes of all files that have been developed for the off - card
implementation
found in Appendix A.
In the Main.java file is not more than that described in
section of the application architecture.
ApplicationJFrame.java planned to file the application and
functionality
it. The objects defined here are the most important subject PX
ProxyCard type that can use the methods available to
ProxyCard.java. All methods have been checked for possible
errors that can
prokypsounkai to display messages according to the user.
Main.java
ApplicationJFrame.java
ProxyCard.javMyDBConnection.java a
OPSPUtil.java
Smart
Card
MySQL
2.
He has the following methods:
1. private void FrameInit (): Here is the initialization of some properties
objects of ApplicationJFrame, on the characteristics of
Interface
2. private void initComponents (): Also a method of initializing
objects of the interface. The code at this point produced by
Platform NetBeans, well designed environmental design.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 189
3. private void formWindowClosing (java.awt.event.WindowEvent evt):
Controls
energy when user closes the application by the exit button
window. What it does is to close the communication channel
card safely.
4. private void jButton1Connect_card (java.awt.event.ActionEvent evt):
The
This method satisfies the user to connect to the card.
The AID of the applet is defined here to select the applet for which
The written off - card application.
5. private void jButton2Disconnect_card (java.awt.event.ActionEvent evt):
The
This method closes the communication channel with the card in a safe
manner.
Also changing object properties of the interface.
6. private void Validate_pin (java.awt.event.ActionEvent evt): This
method
check whether the code has been entered by the user agrees with what
the
applet is initialized in the on - card application card. If
is to control real time read from the card name, last name, first
user id and the amount of the card. If the check is false then
returns a similar error message.
7. private void Debitcardbt (java.awt.event.ActionEvent evt): In this
method
mdbc been created using the methods
found in the file MyDBConnection.java. Purpose aftistis method
is to perform the service properly market a product or service
selected by the user. The process provides the user selects
to purchase, depending on the product name in the table products
the database the application uses corresponding to this
a product price. The price returned to this method
then called the method of the object debitcard PX is
131
Type ProxyCard and remove that amount from the card and displays
new card balance.
8. private void CreditCardBt (java.awt.event.ActionEvent evt): In this
method of simply calling the method creditcard object type PX
ProxyCard, the new balance shown on the screen of the application.
9. private void VoteBt (java.awt.event.ActionEvent evt): This method
serves its service record, created the object mdbc
and with a supply only the id is stored on the card
record vote of the user.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 190

10. public static int hex2decimal (String s): This method converts a
hexadecimal number to decimal.
11. public static String convertToUnicodeString (String hexString):
Method
This converts a hex string to a unicode string.
File ProxyCard.java can be considered the heart of the application and all

actions to communicate with the card are made in this file. This file
has some similarities with the way it works is on - card
application, defined here as the CLA, INS and fixed to be structured
properly
APDU to be sent to the card. The command is always structured
according to the instructions
the Java Smart Card API.
Includes the following methods:
1. public void connect_card (): In this method made the connection with
the
card reader and selected the first in the list of available
devices. After the choice of opening a secure communication channel
card
2. public void selectAID (byte [] appletAID): In this method becomes the
selection of the AID of the applet on - card application. Here the
command is structured
always in accordance with the instructions provided by the manufacturer
card (Jurgensen T, Guthery S 2002).
3. public static byte [] toBinArray (String hexStr): Converts a hex String to

an array of byte.
4. public boolean verify_pin (char [] PIN): This method sends the
appropriate instruction to the card to "understand" that the card
132
is to perform the method verify, as we saw above in section
the on - card application. When orders are actually constructed a
byte table in which they enter as an argument to the object
CommandAPDU method to transmit. Related How can anyone
found in the JavaDoc version of OpenJDK 7. If the password is wrong
then
Card returns the error message SW_VERIFICATION_FAILED =
0x6300, which in the java API returns as an integer with
Appropriate tests may arise where the error messages
user.
5. public String getBalance (): 9omeitai command question about
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 191
card balance.
6. public String getName (): Similarly, the mandate for the username.
7. public String getID (): Similarly, the mandate for the number of the
user.
8. public String getLastName (): Ditto for the name of the user.
9. public void creditcard (String s): It is the method that meets the service

deposit money onto the card. This command builds the order entolietsi
answer method of credit on - card application. The amount
added first converted to type byte and then incorporated into
command.
10. public void debitcard (String s): It is the method that meets the
service
market products, structured command. The amount will be deducted from

Card is the result of the method populateBuyList, which becomes


appropriately in order to accept the command sent.
11. public void disconnect_card (): Closes the communication channel
with the card
and off-card application is disconnected from the on - card application.
Also
applet on the card run method deselect.
The archive MyDBConnection.java there are methods that help
Communication with the database used by the subject mdbc
defined in ApplicationJFrame.java, are as follows:
1. public void init (): Here is the link to the database.
133
2. public Connection getMyConnection (): This method returns the object
myConnection.
3. public void close (ResultSet rs): This method performs the method of
close
object rs.
4. public void close (java.sql.Statement stmt): This method performs
close method
object stmt.
5. public void destroy (): This method closes the connection to the base
data.
6. public String Studentvote (String id, int p): This method is called by
VoteBt and take all necessary steps to implement the service
the vote. Here are the necessary checks on the basis
data, control and recording of votes is based on the id
card has.
7. public int populateBuyList (int s): This method returns the Debitcardbt
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 192
which calls on the value of the product that the user has epilexeina buy
so finally removed this amount from the card.
The archive OPSPUtil.java added methods public static String
toHexString2 (
byte [] b) and public static String displayHexString (String s), other than
those
already existed. The first accepts an array of bytes and returns String,
used by the subject ProxyCard. When the application is in
reply card then sends the data always in the form of tables byte. The
second method takes a String and displays it as Hexademical Sring,
used for verification purposes results during
development application.
6.2.4. Design Database
The database application has the following tables:
134
party: Represents the parties  involved in election
process. In this table measure the votes of students.
products: This table contains  the prices of goods or services
the student buys.
 voting: In this table there is information about whether a
Students participated in the election process or not.
The structure of the tables shown in the figure below.
Figure 7: The structure of the database table.
In Appendix A you can find the necessary codes along with
application data
id_party
title_party
countvotes
party
id_product
title
value
id_student
datevoting
timevoting
products
voting
flagvoting
135
ΒΙΒΛΙΟΓΡΑΦΙΚΕΣ ΠΑΡΑΠΟΜΠΕΣ
1. Hansmann U, Nicklous S.M , Schack T, Schneider A, Seliger F, 2002, Smart
Card Application Development Using Java, 2nd edition, Springer-Verlag Berlin
Heidelberg , New York , ISBN 3-540-43202-7.
2. Chen Z, 2004, Java Card Technology for Smart Cards: Architecture and
Programmer’s Guide, 2nd edition, Addison-Wesley, ISBN 0-201-70329-7.
3. Βογιατζής Α., S 2001, Ανάλυση Ασφάλειας Συστημάτων Έξυπνων Καρτών, Msc
thesis, Πανεπιστήμιο Κρήτης Σχολή Θετικών Επιστημών Τμήμα Επιστήμης

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 193
Υπολογιστών,Ηράκλειο.
4. Elliot S, Loebbecke C, J 1998, ‘Smart Card based Electronic Commerce:
Characteristics and Roles’, First Annual Hawaii International Conference on System
Sciences, vol. 4, p. 242.
5. Jaikumar V., D 2005, ‘N.Y. Hospitals, Siemens Launch Smart-Card Pilot’,
Computer World, viewed 2 September 2007,
<http://www.computerworld.com/securitytopics/security/story/0,10801,106950,00.ht
ml>
6. Dalvins Technologies, (2007), Dalvins Technologies, Available from
:<http://www.dalvins.com> ,[Accessed at 4 July 2007].
7. M.U.S.C.L.E. project, (2007), M.U.S.C.L.E. project, Available from
:<http://www.linuxnet.com/index.html>, [Accessed at 21 March 2007].
8. Cohen A ,J 2003 ,’ Smart Cards, Smarter Health Care’, PC Magazine ,viewed at 4
September 2007, <www.pcmag.com>
9. Smart Card Alliance, J 2006, ‘German Health Card’, viewed at 7 September 2007,
<http://www.smartcardalliance.org/resources/pdf/German_Health_Card.pdf>
10. Giesecke & Devrient, A 2007,’E-card successfully completes first field test in
Austria’, viewed at 25 August 2007, <http://www.gide.
com/portal/page?_pageid=44,68631&_dad=portal&_schema=PORTAL>
11. Robert Huber Associates, (2007), Robert Huber Associates, Available from
:<http://www.allcampuscard.com/cch80.htm>, [Accessed at 2 September 2007]
12. Fridell T, Mc Kenna E, Smith D, 2007,’Campus Cards - Past, Present and Future -
Everything you need to know’, 5th Annual Conference ECCA, Austria.
13. ECCA – European Campus Card Association,(2007), ECCA – European
Campus Card Association, Available from:<www.ecca.ie >, [Accessed at 24 August
2007].
136
14. Das P., Rastogi L, 2002,’Re-engineering educational institutions through
smart
cards’, SHTR Consulting Group.
15. Halawani, T., Mohandes, M., D 2003, “SMART CARD for SMART CAMPUS –
KFUPM Case Study”, Electronics, Circuits and Systems, ICECS, 10th IEEE
International Conference, vol. 3, pp. 1252 – 1255.
16. Leitenmόller DI H, 2007,’A Java Based Information System for Students and
Teachers’, 5th Annual Conference ECCA, Austria.
17. 2003,’NEWS VOM CAMPUS’,DAS OFFIZIELLE INFORMATIONSMEDIUM
DER JOHANNES KEPLER UNIVERSITAT LINZ, Oktober , A u s g a b e 19.
18. Ομάδα Εργασίας Γ3 - επιχειρησιακό πρόγραμμα ≪Κοινωνία της
πληροφορίας≫,O
2002, ‘Έξυπνες κάρτες’, Αθήνα.
19. Τσιγγάνας Θ, A 2007, ’Αριστοτέλειο, το πρώτο ≪on line≫ AEI’, Καθημερινή,
19
Απρίλιος.
20. 9ημολαΐδου Φ,2007,’Αριστοτέλειο: Ηλεκτρονικές υπηρεσίες προς τους
φοιτητές’, Μακεδονία , 19 Απρίλιος/
21. Dennis A, Wixom H. B, Tegarden D,2005,’System Analysis And Design With
UML Version 2.0, An Object-Oriented Approach ‘,2nd edition , Wiley.
22. Jurgensen T, Guthery S, J 2002, ‘Smart Cards – The Developer’s Toolkit’,
Prentice Hall PTR, ISBN 0-13-093730-4.
23. Netbeans, (2007), Netbeans, Available from :<http://www.netbeans.org>,

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 194
[Accessed at 19 October 2007].
24. Java Card, (2007), Java Card, Available from
:<http://java.sun.com/products/javacard>, [Accessed at 5 September 2007].
25.GPShell,(2007), GPShell, Available
from:<http://sourceforge.net/project/showfiles.php?group_id=143343>, [Accessed
at
29 October 2007].
26. OpenJDK 7, (2007), OpenJDK 7, Available
from:<http://download.java.net/openjdk/jdk7> , [Accessed at 27 November 2007]
27. MySQL,(2007), MySQL, Available from:<http://www.mysql.com/> [Accessed
at
15 November 2006].
28. PhpMyAdmin,(2007), PhpMyAdmin, Available from:<www.phpmyadmin.net>
[Accessed at 20 November 2006].
29.PSPad,(2007), PSPad, Available from:<www.pspad.com>, [Accessed at 4
December 2006].
137
138
ΠΑΡΑΡΤΗΜΑ Α
Αρχείο Myapplet.java
package com.sun.javacard.samples.Myapplet;
import javacard.framework.*;
public class Myapplet extends Applet
{
final static byte CLA = ( byte )0xB0; //CLA
final static byte GET_STID = ( byte )0x01; // INS
final static byte GET_NAME = ( byte )0x02; //INS
final static byte GET_LASTNAME = (byte)0x03; //INS
final static byte VERIFY = (byte)0x04; //INS for pin verify
final static byte CREDIT = (byte) 0x05; //INS
final static byte DEBIT = (byte) 0x06; //INS
final static byte GET_BALANCE = (byte) 0x07; //INS
// maximum balance
final static short MAX_BALANCE = 0x7FFF;
// maximum transaction amount
final static byte MAX_TRANSACTION_AMOUNT = 127;
final static byte MAX_ID_SIZE = ( byte )0x07;
final static byte MAX_NAME = ( byte )0x06;
final static byte MAX_LASTNAME= ( byte )0x07;
final static byte PIN_TRY_LIMIT = (byte)0x09;
final static byte MAX_PIN_SIZE = (byte)0x06;
final static short SW_VERIFICATION_FAILED = 0x6300;
// signal the the PIN validation is required
// for a credit or a debit transaction
final static short SW_PIN_VERIFICATION_REQUIRED =0x6301;
// signal invalid transaction amount
// amount > MAX_TRANSACTION_AMOUNT or amount < 0
final static short SW_INVALID_TRANSACTION_AMOUNT = 0x6A83;
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 195
// signal that the balance exceed the maximum
final static short SW_EXCEED_MAXIMUM_BALANCE =0x6A84;
// signal the the balance becomes negative
final static short SW_NEGATIVE_BALANCE = 0x6A85;
//instance variables declaration
OwnerPIN pin;
short balance;
139
byte[] studentId = null;
byte[] name = null;
byte[] lastname=null;
/**
* Only this class's install method should create the applet object.
*/
private Myapplet (byte[] bArray, short bOffset, byte bLength)
{
studentId = new byte[ MAX_ID_SIZE ];
name = new byte[MAX_NAME];
lastname = new byte[MAX_LASTNAME];
pin = new OwnerPIN(PIN_TRY_LIMIT, MAX_PIN_SIZE);
bOffset= ( short )( bOffset + bArray[bOffset]+4);//AID +4 bytes
Util.arrayCopyNonAtomic(bArray, bOffset, studentId, (short)0, MAX_ID_SIZE);
bOffset+=MAX_ID_SIZE;
Util.arrayCopyNonAtomic(bArray, bOffset, name, (short)0, MAX_NAME);
bOffset+=MAX_NAME;
Util.arrayCopyNonAtomic(bArray,bOffset,lastname,(short)0,MAX_LASTNAME);
bOffset+=MAX_LASTNAME;
bLength = (byte)0x06;
//bArray contains the PIN initialzation value
pin.update(bArray,bOffset,bLength);
register();
}
/**
* Installs this applet.
* @param bArray the array containing installation parameters
* @param bOffset the starting offset in bArray
* @param bLength the length in bytes of the parameter data in bArray
*/
public static void install(byte[] bArray, short bOffset, byte bLength)
{
new Myapplet(bArray, bOffset, bLength);
} //end install
public boolean select(){
if (pin.getTriesRemaining()==0)
return false;
return true;
} //end select
public void deselect(){
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 196
pin.reset();
140
}
public void process(APDU apdu) throws ISOException
{
byte[] buffer = apdu.getBuffer();
if ( selectingApplet() )
{
return;
}
else if ( buffer[ ISO7816.OFFSET_CLA ] != CLA )
{
ISOException.throwIt( ISO7816.SW_CLA_NOT_SUPPORTED );
}
switch ( buffer[ ISO7816.OFFSET_INS ] )
{
case GET_STID:
getstudentId( apdu );
return;
case GET_NAME:
getname( apdu );
return;
case GET_LASTNAME:
getlastname( apdu );
return;
case VERIFY:
verify( apdu );
return;
case GET_BALANCE:
getBalance(apdu);
return;
case DEBIT:
debit(apdu);
return;
case CREDIT:
credit(apdu);
return;
default:
ISOException.throwIt( ISO7816.SW_INS_NOT_SUPPORTED );
}
}//end process
//Verify PIN
private void verify( APDU apdu )
{
byte[] buffer = apdu.getBuffer();
//receive data for validation
141
byte byteRead = (byte)(apdu.setIncomingAndReceive());
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 197
//check PIN
if(pin.check(buffer,ISO7816.OFFSET_CDATA, byteRead)==false)
ISOException.throwIt(SW_VERIFICATION_FAILED);
}//end verify
private void getstudentId( APDU apdu )
{
byte[] buffer = apdu.getBuffer();
Util.arrayCopy( studentId, ( short )0, buffer, ( short )0, MAX_ID_SIZE );
apdu.setOutgoingAndSend( ( short )0, MAX_ID_SIZE );
}
private void getname(APDU apdu )
{
byte[] buffer = apdu.getBuffer();
Util.arrayCopy(name, ( short )0, buffer, (short)0, MAX_NAME );
apdu.setOutgoingAndSend( (short)0, MAX_NAME );
}
private void getlastname(APDU apdu )
{
byte[] buffer = apdu.getBuffer();
Util.arrayCopy(lastname, ( short )0, buffer, (short)0, MAX_LASTNAME );
apdu.setOutgoingAndSend( (short)0, MAX_LASTNAME );
}
private void credit(APDU apdu) {
// access authentication
if ( ! pin.isValidated() )
ISOException.throwIt(
SW_PIN_VERIFICATION_REQUIRED);
byte[] buffer = apdu.getBuffer();
// Lc byte denotes the number of bytes in the
// data field of the command APDU
byte numBytes = buffer[ISO7816.OFFSET_LC];
// indicate that this APDU has incoming data
// and receive data starting from the offset
// ISO7816.OFFSET_CDATA following the 5 header
// bytes.
byte byteRead =
(byte)(apdu.setIncomingAndReceive());
142
// it is an error if the number of data bytes
// read does not match the number in Lc byte
if ( ( numBytes != 1 ) || (byteRead != 1) )
ISOException.throwIt(ISO7816.SW_WRONG_LENGTH);
// get the credit amount
byte creditAmount =
buffer[ISO7816.OFFSET_CDATA];
// check the credit amount
if ( ( creditAmount > MAX_TRANSACTION_AMOUNT)
|| ( creditAmount < 0 ) )
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 198
ISOException.throwIt
(SW_INVALID_TRANSACTION_AMOUNT);
// check the new balance
if ( (short)( balance + creditAmount) > MAX_BALANCE )
ISOException.throwIt
(SW_EXCEED_MAXIMUM_BALANCE);
// credit the amount
balance = (short)(balance + creditAmount);
} // end of deposit method
private void debit(APDU apdu) {
// access authentication
if ( ! pin.isValidated() )
ISOException.throwIt
(SW_PIN_VERIFICATION_REQUIRED);
byte[] buffer = apdu.getBuffer();
byte numBytes =
(byte)(buffer[ISO7816.OFFSET_LC]);
byte byteRead =
(byte)(apdu.setIncomingAndReceive());
if ( ( numBytes != 1 ) || (byteRead != 1) )
ISOException.throwIt
(ISO7816.SW_WRONG_LENGTH);
// get debit amount
byte debitAmount =
buffer[ISO7816.OFFSET_CDATA];
// check debit amount
143
if ( ( debitAmount > MAX_TRANSACTION_AMOUNT)
|| ( debitAmount < 0 ) )
ISOException.throwIt
(SW_INVALID_TRANSACTION_AMOUNT);
// check the new balance
if ( (short)( balance - debitAmount ) < (short)0 )
ISOException.throwIt(SW_NEGATIVE_BALANCE);
balance = (short) (balance - debitAmount);
} // end of debit method
private void getBalance(APDU apdu) {
byte[] buffer = apdu.getBuffer();
// inform system that the applet has finished
// processing the command and the system should
// now prepare to construct a response APDU
// which contains data field
short le = apdu.setOutgoing();
if ( le < 2 )
ISOException.throwIt
(ISO7816.SW_WRONG_LENGTH);
//informs the CAD the actual number of bytes
//returned
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 199
apdu.setOutgoingLength((byte)2);
// move the balance data into the APDU buffer
// starting at the offset 0
buffer[0] = (byte)(balance >> 8);
buffer[1] = (byte)(balance & 0xFF);
// send the 2-byte balance at the offset
// 0 in the apdu buffer
apdu.sendBytes((short)0, (short)2);
} // end of getBalance method
}
144
Αρχείο Main.java
/*
* Main.java
*
* Created on 22 Νοέμβριος 2007, 11:30 μμ
*
* To change this template, choose Tools | Template Manager
* and open the template in the editor.
*/
package new_diploma;
import javax.smartcardio.*;
import java.util.List;
import org.dyndns.widerstand.OpenPlatform.*;
import new_diploma.ApplicationJFrame;
import java.awt.*;
/**
*
* @author GEORGE VERANIS
* A.M. MIS2706
*/
public class Main {
private static ApplicationJFrame Apcard;
/** Creates a new instance of Main */
public Main() {
try {
jbInit();
} catch (Exception ex) {
ex.printStackTrace();
}
}
private void jbInit() throws Exception {
}
/**
* @param args the command line arguments
*/
public static void main(String[] args)
{
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 200
// TODO code application logic here
Apcard = new ApplicationJFrame();
Apcard.pack();
Dimension screenSize = Toolkit.getDefaultToolkit().getScreenSize();
Dimension frameSize = Apcard.getSize();
145
if (frameSize.height > screenSize.height)
frameSize.height = screenSize.height;
if (frameSize.width > screenSize.width)
frameSize.width = screenSize.width;
Apcard.setLocation(((screenSize.width - frameSize.width) / 2)-150,
((screenSize.height - frameSize.height) / 2)-150);
Apcard.setSize(600,300);
Apcard.setTitle("Java Card in University");
Apcard.setDefaultLookAndFeelDecorated(true);
Apcard.setVisible(true);
}
}
146
Αρχείο ApplicationJFrame.java
/*
* ApplicationJFrame.java
*
* Created on 24 Νοέμβριος 2007, 7:01 μμ
*/
package new_diploma;
import com.mysql.jdbc.Connection;
import java.awt.event.WindowAdapter;
import java.awt.event.WindowEvent;
import java.io.IOException;
import java.sql.ResultSet;
import java.sql.SQLException;
import javax.smartcardio.*;
import javax.swing.*;
/**
*
* @author GEORGE VERANIS
* A.M. MIS2706
*/
public class ApplicationJFrame extends JFrame {
private static ProxyCard PX;
private static Card univCard;
private static CardChannel channel;
private MyDBConnection mdbc;
private java.sql.Statement stmt;
/** Creates new form ApplicationJFrame */
public ApplicationJFrame(){
PX = new ProxyCard();
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 201
initComponents();
FrameInit();
}
private void FrameInit()
{
jButton2.setEnabled(false);
jButton3.setEnabled(false);
jPasswordField1.setText("");
jPasswordField1.setEnabled(false);
jComboBox1.setEnabled(false);
jComboBox2.setEnabled(false);
147
jTextField4.setEnabled(false);
}
/** This method is called from within the constructor to
* initialize the form.
* WARNING: Do NOT modify this code. The content of this method is
* always regenerated by the Form Editor.
*/
// <editor-fold defaultstate="collapsed" desc=" Generated Code ">
private void initComponents() {
jPanel1 = new javax.swing.JPanel();
jTabbedPane1 = new javax.swing.JTabbedPane();
jPanel7 = new javax.swing.JPanel();
jButton1 = new javax.swing.JButton();
jLabel2 = new javax.swing.JLabel();
jButton2 = new javax.swing.JButton();
jPanel2 = new javax.swing.JPanel();
jLabel3 = new javax.swing.JLabel();
jLabel4 = new javax.swing.JLabel();
jTextField1 = new javax.swing.JTextField();
jTextField2 = new javax.swing.JTextField();
jLabel5 = new javax.swing.JLabel();
jTextField3 = new javax.swing.JTextField();
jLabel1 = new javax.swing.JLabel();
jPasswordField1 = new javax.swing.JPasswordField();
jButton3 = new javax.swing.JButton();
jLabel6 = new javax.swing.JLabel();
jPanel3 = new javax.swing.JPanel();
jButton4 = new javax.swing.JButton();
jTextField4 = new javax.swing.JTextField();
jButton5 = new javax.swing.JButton();
jLabel7 = new javax.swing.JLabel();
jLabel8 = new javax.swing.JLabel();
jLabel9 = new javax.swing.JLabel();
jComboBox1 = new javax.swing.JComboBox();
jPanel5 = new javax.swing.JPanel();
jLabel10 = new javax.swing.JLabel();
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 202
jLabel11 = new javax.swing.JLabel();
jScrollPane1 = new javax.swing.JScrollPane();
jTextArea1 = new javax.swing.JTextArea();
jComboBox2 = new javax.swing.JComboBox();
jButton6 = new javax.swing.JButton();
setDefaultCloseOperation(javax.swing.WindowConstants.EXIT_ON_CLOSE);
addWindowListener(new java.awt.event.WindowAdapter() {
public void windowClosing(java.awt.event.WindowEvent evt) {
formWindowClosing(evt);
}
});
148
jButton1.setText("Connect");
jButton1.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
jButton1Connect_card(evt);
}
});
jLabel2.setText("\u039a\u03b1\u03bb\u03ce\u03c2
\u03ae\u03c1\u03b8\u03b1\u03c4\u03b5 \u03c3\u03c4\u03b9\u03c2
\u03ad\u03be\u03c5\u03c0\u03bd\u03b5\u03c2
\u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5
\
u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03af\u03bf\
u03
c5");
jButton2.setText("Disconnect");
jButton2.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
jButton2Disconnect_card(evt);
}
});
javax.swing.GroupLayout jPanel7Layout = new
javax.swing.GroupLayout(jPanel7);
jPanel7.setLayout(jPanel7Layout);
jPanel7Layout.setHorizontalGroup(
jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel7Layout.createSequentialGroup()
.
addGroup(jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addGroup(jPanel7Layout.createSequentialGroup()
.addGap(88, 88, 88)
.addComponent(jButton1)
.addGap(62, 62, 62)
.addComponent(jButton2))
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 203
.addGroup(jPanel7Layout.createSequentialGroup()
.addGap(57, 57, 57)
.addComponent(jLabel2,
javax.swing.GroupLayout.PREFERRED_SIZE, 329,
javax.swing.GroupLayout.PREFERRED_SIZE)))
.addContainerGap(121, Short.MAX_VALUE))
);
jPanel7Layout.setVerticalGroup(
jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel7Layout.createSequentialGroup()
.addContainerGap()
.addComponent(jLabel2, javax.swing.GroupLayout.PREFERRED_SIZE,
59, javax.swing.GroupLayout.PREFERRED_SIZE)
149
.addGap(35, 35, 35)
.
addGroup(jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jButton1)
.addComponent(jButton2))
.addContainerGap(39, Short.MAX_VALUE))
);
jTabbedPane1.addTab("\u03a3\u03cd\u03bd\u03b4\u03b5\u03c3\u03b7",
jPanel7);
jPanel2.setEnabled(false);
jLabel3.setText("\u038c\u03bd\u03bf\u03bc\u03b1:");
jLabel4.setText("\u0395\u03c0\u03ce\u03bd\u03c5\u03bc\u03bf:");
jTextField1.setEnabled(false);
jTextField2.setEnabled(false);
jLabel5.setText("\u03a5\u03c0\u03cc\u03bb\u03bf\u03b9\u03c0\u03bf
\u03ba\u03ac\u03c1\u03c4\u03b1\u03c2:");
jTextField3.setEnabled(false);
jLabel1.setText("\u0395\u03b9\u03c3\u03b1\u03b3\u03c9\u03b3\u03ae
\u039a\u03c9\u03b4\u03b9\u03ba\u03bf\u03cd :");
jLabel1.setToolTipText("\u0395\u03b4\u03ce
\u03b5\u03b9\u03c3\u03ac\u03b3\u03b5\u03c4\u03b5 \u03c4\u03bf\u03bd
\u03ba\u03c9\u03b4\u03b9\u03ba\u03cc \u03c4\u03b7\u03c2
\u03ba\u03ac\u03c1\u03c4\u03b1\u03c2 \u03c3\u03b1\u03c2");
jButton3.setText("Validate");
jButton3.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
Validate_pin(evt);
}
});
jLabel6.setText("\u20ac");
javax.swing.GroupLayout jPanel2Layout = new
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 204
javax.swing.GroupLayout(jPanel2);
jPanel2.setLayout(jPanel2Layout);
jPanel2Layout.setHorizontalGroup(
jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel2Layout.createSequentialGroup()
.addGap(46, 46, 46)
150
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addComponent(jLabel4)
.addComponent(jLabel5)
.addComponent(jLabel3)
.addComponent(jLabel1, javax.swing.GroupLayout.PREFERRED_SIZE,
131, javax.swing.GroupLayout.PREFERRED_SIZE))
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
TRAILING, false)
.addGroup(jPanel2Layout.createSequentialGroup()
.addGap(4, 4, 4)
.addComponent(jPasswordField1))
.addComponent(jTextField1,
javax.swing.GroupLayout.Alignment.LEADING,
javax.swing.GroupLayout.DEFAULT_SIZE, 94, Short.MAX_VALUE))
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
TRAILING, false)
.addComponent(jTextField2,
javax.swing.GroupLayout.Alignment.LEADING)
.addComponent(jTextField3,
javax.swing.GroupLayout.Alignment.LEADING,
javax.swing.GroupLayout.DEFAULT_SIZE, 93, Short.MAX_VALUE)))
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addGroup(jPanel2Layout.createSequentialGroup()
.addGap(22, 22, 22)
.addComponent(jButton3))
.addGroup(jPanel2Layout.createSequentialGroup()
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 205
.addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED)
.addComponent(jLabel6)))
.addGap(143, 143, 143))
);
jPanel2Layout.setVerticalGroup(
jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel2Layout.createSequentialGroup()
.addGap(19, 19, 19)
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jLabel1, javax.swing.GroupLayout.PREFERRED_SIZE,
25, javax.swing.GroupLayout.PREFERRED_SIZE)
151
.addComponent(jPasswordField1,
javax.swing.GroupLayout.PREFERRED_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE)
.addComponent(jButton3))
.addGap(17, 17, 17)
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jLabel3)
.addComponent(jTextField1,
javax.swing.GroupLayout.PREFERRED_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE))
.addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED)
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jLabel4)
.addComponent(jTextField2,
javax.swing.GroupLayout.PREFERRED_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE))
.addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED)
.
addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jTextField3,
javax.swing.GroupLayout.PREFERRED_SIZE,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 206
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE)
.addComponent(jLabel5)
.addComponent(jLabel6))
.addGap(53, 53, 53))
);
jTabbedPane1.addTab("\u039a\u03b1\u03c1\u03c4\u03ad\u03bb\u03b1
\u039a\u03b1\u03c4\u03cc\u03c7\u03bf\u03c5", jPanel2);
jPanel3.setEnabled(false);
jButton4.setText("BUY");
jButton4.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
Debitcardbt(evt);
}
});
jButton5.setText("Credit");
jButton5.addActionListener(new java.awt.event.ActionListener() {
152
public void actionPerformed(java.awt.event.ActionEvent evt) {
CreditCardBt(evt);
}
});
jLabel7.setText("\u03a5\u03c0\u03cc\u03bb\u03bf\u03b9\u03c0\u03bf
\u03ba\u03ac\u03c1\u03c4\u03b1\u03c2:");
jLabel8.setText(" ");
jLabel9.setText("\u20ac");
jComboBox1.setMaximumRowCount(4);
jComboBox1.setModel(new javax.swing.DefaultComboBoxModel(new String[]
{ "Please select", "coffee", "Drink", "Meal A", "Meal B", "Tee", "Tickets 5", "Tickets
10", "Tickets 20", "Fine Library" }));
javax.swing.GroupLayout jPanel3Layout = new
javax.swing.GroupLayout(jPanel3);
jPanel3.setLayout(jPanel3Layout);
jPanel3Layout.setHorizontalGroup(
jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel3Layout.createSequentialGroup()
.addGap(28, 28, 28)
.
addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING, false)
.addComponent(jLabel7, javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE)
.addComponent(jTextField4)
.addComponent(jComboBox1,
javax.swing.GroupLayout.PREFERRED_SIZE, 108,
javax.swing.GroupLayout.PREFERRED_SIZE))
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 207
.addGap(18, 18, 18)
.
addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addComponent(jButton4, javax.swing.GroupLayout.DEFAULT_SIZE,
61, Short.MAX_VALUE)
.addComponent(jButton5, javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE)
.addGroup(javax.swing.GroupLayout.Alignment.TRAILING,
jPanel3Layout.createSequentialGroup()
.addComponent(jLabel8, javax.swing.GroupLayout.DEFAULT_SIZE,
40, Short.MAX_VALUE)
.addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED)
153
.addComponent(jLabel9,
javax.swing.GroupLayout.PREFERRED_SIZE, 15,
javax.swing.GroupLayout.PREFERRED_SIZE)))
.addGap(292, 292, 292))
);
jPanel3Layout.setVerticalGroup(
jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel3Layout.createSequentialGroup()
.addContainerGap()
.
addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jButton4)
.addComponent(jComboBox1,
javax.swing.GroupLayout.PREFERRED_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE))
.addGap(34, 34, 34)
.
addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jLabel7)
.addComponent(jLabel9)
.addComponent(jLabel8))
.addGap(41, 41, 41)
.
addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jButton5)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 208
.addComponent(jTextField4,
javax.swing.GroupLayout.PREFERRED_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE))
.addContainerGap(21, Short.MAX_VALUE))
);
jTabbedPane1.addTab("\u039f\u03b9\u03ba\u03bf\u03bd\u03bf\u03bc\u03b9\u0
3ba\
u03ac", jPanel3);
jPanel5.setEnabled(false);
jLabel10.setText("ID :");
jTextArea1.setColumns(20);
jTextArea1.setRows(5);
jScrollPane1.setViewportView(jTextArea1);
jComboBox2.setModel(new javax.swing.DefaultComboBoxModel(new String[]
{ "Please choose", "\u0394\u0391\u03a0", "\u03a0\u0391\u03a3\u03a0",
"\u03a0\u039a\u03a3", "\u0395\u0391\u039a\u039a" }));
154
jButton6.setText("Vote");
jButton6.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(java.awt.event.ActionEvent evt) {
VoteBt(evt);
}
});
javax.swing.GroupLayout jPanel5Layout = new
javax.swing.GroupLayout(jPanel5);
jPanel5.setLayout(jPanel5Layout);
jPanel5Layout.setHorizontalGroup(
jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel5Layout.createSequentialGroup()
.addContainerGap()
.
addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addGroup(jPanel5Layout.createSequentialGroup()
.addComponent(jLabel10)
.addGap(15, 15, 15)
.addComponent(jLabel11))
.addComponent(jScrollPane1,
javax.swing.GroupLayout.PREFERRED_SIZE, 156,
javax.swing.GroupLayout.PREFERRED_SIZE))
.
addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addGroup(jPanel5Layout.createSequentialGroup()
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 209
.addGap(36, 36, 36)
.addComponent(jComboBox2,
javax.swing.GroupLayout.PREFERRED_SIZE, 118,
javax.swing.GroupLayout.PREFERRED_SIZE))
.addGroup(jPanel5Layout.createSequentialGroup()
.addGap(64, 64, 64)
.addComponent(jButton6)))
.addContainerGap(187, Short.MAX_VALUE))
);
jPanel5Layout.setVerticalGroup(
jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel5Layout.createSequentialGroup()
.addContainerGap()
.
addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
BASELINE)
.addComponent(jLabel10)
.addComponent(jLabel11)
155
.addComponent(jComboBox2,
javax.swing.GroupLayout.PREFERRED_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.PREFERRED_SIZE))
.
addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme
nt.
LEADING)
.addGroup(jPanel5Layout.createSequentialGroup()
.addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED)
.addComponent(jScrollPane1,
javax.swing.GroupLayout.PREFERRED_SIZE, 98,
javax.swing.GroupLayout.PREFERRED_SIZE))
.addGroup(jPanel5Layout.createSequentialGroup()
.addGap(30, 30, 30)
.addComponent(jButton6)))
.addGap(23, 23, 23))
);
jTabbedPane1.addTab("\u03a8\u03b7\u03c6\u03bf\u03c6\u03bf\u03c1\u03af\u0
3b1",
jPanel5);
javax.swing.GroupLayout jPanel1Layout = new
javax.swing.GroupLayout(jPanel1);
jPanel1.setLayout(jPanel1Layout);
jPanel1Layout.setHorizontalGroup(
jPanel1Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 210
.addGroup(jPanel1Layout.createSequentialGroup()
.addComponent(jTabbedPane1,
javax.swing.GroupLayout.DEFAULT_SIZE, 512, Short.MAX_VALUE)
.addGap(18, 18, 18))
);
jPanel1Layout.setVerticalGroup(
jPanel1Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN
G)
.addGroup(jPanel1Layout.createSequentialGroup()
.addComponent(jTabbedPane1,
javax.swing.GroupLayout.PREFERRED_SIZE, 195,
javax.swing.GroupLayout.PREFERRED_SIZE)
.addContainerGap(javax.swing.GroupLayout.DEFAULT_SIZE,
Short.MAX_VALUE))
);
javax.swing.GroupLayout layout = new
javax.swing.GroupLayout(getContentPane());
getContentPane().setLayout(layout);
layout.setHorizontalGroup(
layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADING)
.addGroup(layout.createSequentialGroup()
156
.addComponent(jPanel1, javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE)
.addContainerGap())
);
layout.setVerticalGroup(
layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADING)
.addGroup(layout.createSequentialGroup()
.addComponent(jPanel1, javax.swing.GroupLayout.DEFAULT_SIZE,
javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE)
.addContainerGap())
);
pack();
}// </editor-fold>
private void formWindowClosing(java.awt.event.WindowEvent evt) {
try {
// TODO add your handling code here:When Window closing disconnect the card
PX.disconnect_card();
}catch (Exception ex) {
JOptionPane.showMessageDialog(this,
ex.getMessage(),
"Warning",
JOptionPane.WARNING_MESSAGE);
} finally {
System.exit(0);
}
}
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 211
private void jButton1Connect_card(java.awt.event.ActionEvent evt) {
// TODO add your handling code here: try to connect with the card
try{
byte[] AID = {
(byte)0xa0, (byte)0x00, (byte)0x00,
(byte)0x00, (byte)0x62, (byte)0x07,
(byte)0x01, (byte)0x0C, (byte)0x02,
(byte)0x01
};
PX.connect_card();
PX.selectAID(AID);
jButton1.setEnabled(false);
jButton2.setEnabled(true);
jButton3.setEnabled(true);
jPasswordField1.setEnabled(true);
this.setTitle("Java Card in University -- Connected");
} catch(Exception ex) {
JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning",
JOptionPane.WARNING_MESSAGE);
157
}
}
private void jButton2Disconnect_card(java.awt.event.ActionEvent evt) {
// TODO add your handling code here: onClick disconnect from the card
// disconnect
try{
PX.disconnect_card();
jButton1.setEnabled(true);
jButton2.setEnabled(false);
jButton3.setEnabled(false);
jPasswordField1.setText("");
jPasswordField1.setEnabled(false);
jTextField1.setText("");
jTextField2.setText("");
jTextField3.setText("");
jTextField4.setText("");
jLabel8.setText("");
jComboBox1.setSelectedIndex(0);
jComboBox1.setEnabled(false);
jComboBox2.setSelectedIndex(0);
jComboBox2.setEnabled(false);
jLabel11.setText("");
jTextArea1.setText("");
this.setTitle("Java Card in University -- Disconnected");
} catch(Exception ex) {
JOptionPane.showMessageDialog(this,
ex.getMessage(),
"Warning",
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 212
JOptionPane.WARNING_MESSAGE);
}
}
private void Validate_pin(java.awt.event.ActionEvent evt) {
// TODO add your handling code here: Verify if the pin is correct. if the pin is
correct
then show the Name, the Lastname and give the
//balance . If pin is not correct then inform how many tries you have before lock
the card and prompt you to validate your card.
try{
char[] Password = jPasswordField1.getPassword();
if(PX.verify_pin(Password)) {
this.setTitle("Java Card in University -- Authentication Succeed");
String balanced = PX.getBalance();
if(balanced!=null){
jTextField3.setText(String.valueOf(hex2decimal(balanced)));
jLabel8.setText(String.valueOf(hex2decimal(balanced)));
158
jComboBox1.setEnabled(true);
}
String name = convertToUnicodeString(PX.getName());
if(name!=null) jTextField1.setText(name);
String lastname = convertToUnicodeString(PX.getLastName());
if(name!=null) jTextField2.setText(lastname);
String id_student=convertToUnicodeString(PX.getID());
if(id_student!=null){
jLabel11.setText(id_student);
}
jComboBox2.setEnabled(true);
jTextField4.setEnabled(true);
}//end if
else {
this.setTitle("Java Card in University -- Authentication Failed");
return;
}
} catch(Exception ex) {
JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning",
JOptionPane.WARNING_MESSAGE);
}
}
private void Debitcardbt(java.awt.event.ActionEvent evt) {
// TODO add your handling code here: debit money from the card
mdbc=new MyDBConnection();
try {
mdbc.init();
} catch (ClassNotFoundException ex) {
ex.printStackTrace();
} catch (SQLException ex) {
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 213
ex.printStackTrace();
}
try {
int deb = mdbc.populateBuyList(jComboBox1.getSelectedIndex());
String str = new Integer(deb).toString();
try {
PX.debitcard(str);
String balanced = PX.getBalance();
if(balanced!=null){
jTextField3.setText(String.valueOf(hex2decimal(balanced)));
jLabel8.setText(String.valueOf(hex2decimal(balanced)));
}
} catch(Exception ex ) {
159
JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning",
JOptionPane.WARNING_MESSAGE);
}
} catch (SQLException ex) {
ex.printStackTrace();
}
mdbc.destroy();
}
private void CreditCardBt(java.awt.event.ActionEvent evt) {
// TODO add your handling code here: add money to the card. Maximum
transaction
127 €
try{
PX.creditcard(jTextField4.getText());
String balanced = PX.getBalance();
if(balanced!=null){
jTextField3.setText(String.valueOf(hex2decimal(balanced)));
jLabel8.setText(String.valueOf(hex2decimal(balanced)));
jTextField4.setText("");
}
} catch(Exception ex ) {
JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning",
JOptionPane.WARNING_MESSAGE);
}
}
private void VoteBt(java.awt.event.ActionEvent evt) {
// TODO add your handling code here:The student vote
mdbc=new MyDBConnection();
try {
mdbc.init();
} catch (ClassNotFoundException ex) {
ex.printStackTrace();
} catch (SQLException ex) {
ex.printStackTrace();
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 214
}
try {
String voting = mdbc.Studentvote(jLabel11.getText(),
jComboBox2.getSelectedIndex());
try {
jTextArea1.setText(voting);
} catch (IllegalStateException ex) {
ex.printStackTrace();
} catch (IllegalArgumentException ex) {
160
ex.printStackTrace();
}
} catch (SQLException ex) {
ex.printStackTrace();
}
mdbc.destroy();
}
public static int hex2decimal(String s)
{
String digits = "0123456789ABCDEF";
s = s.toUpperCase();
int val = 0;
for (int i = 0; i <s.length(); i++) {
char c = s.charAt(i);
int d = digits.indexOf(c);
val = 16*val + d;
}
return val;
}
public static String convertToUnicodeString(String hexString)
{
StringBuffer output = new StringBuffer();
String subStr = null;
for (int i =0 ; i < hexString.length() ;i=i+2 )
{
subStr = hexString.substring(i,i+2);
char c = (char) Integer.parseInt(subStr, 16);
output.append(c);
}
return output.toString();
}
/**
* @param args the command line arguments
*/
public static void main(String args[]) {
java.awt.EventQueue.invokeLater(new Runnable() {
public void run() {
new ApplicationJFrame().setVisible(true);
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 215
}
});
}
private ResultSet getResultFromProducts() {
return null;
}
// Variables declaration - do not modify
private javax.swing.JButton jButton1;
161
private javax.swing.JButton jButton2;
private javax.swing.JButton jButton3;
private javax.swing.JButton jButton4;
private javax.swing.JButton jButton5;
private javax.swing.JButton jButton6;
private javax.swing.JComboBox jComboBox1;
private javax.swing.JComboBox jComboBox2;
private javax.swing.JLabel jLabel1;
private javax.swing.JLabel jLabel10;
private javax.swing.JLabel jLabel11;
private javax.swing.JLabel jLabel2;
private javax.swing.JLabel jLabel3;
private javax.swing.JLabel jLabel4;
private javax.swing.JLabel jLabel5;
private javax.swing.JLabel jLabel6;
private javax.swing.JLabel jLabel7;
private javax.swing.JLabel jLabel8;
private javax.swing.JLabel jLabel9;
private javax.swing.JPanel jPanel1;
private javax.swing.JPanel jPanel2;
private javax.swing.JPanel jPanel3;
private javax.swing.JPanel jPanel5;
private javax.swing.JPanel jPanel7;
private javax.swing.JPasswordField jPasswordField1;
private javax.swing.JScrollPane jScrollPane1;
private javax.swing.JTabbedPane jTabbedPane1;
private javax.swing.JTextArea jTextArea1;
private javax.swing.JTextField jTextField1;
private javax.swing.JTextField jTextField2;
private javax.swing.JTextField jTextField3;
private javax.swing.JTextField jTextField4;
// End of variables declaration
}
162
Αρχείο ProxyCard.java
/*
* ProxyCard.java
*
* Created on 24 Νοέμβριος 2007, 12:06 μμ
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 216
*
* To change this template, choose Tools | Template Manager
* and open the template in the editor.
*/
package new_diploma;
import javax.smartcardio.*;
import java.util.List;
import javax.swing.*;
import java.io.IOException;
import org.dyndns.widerstand.OpenPlatform.*;
import java.lang.*;
import java.io.PrintStream;
/**
*
* @author GEORGE VERANIS
* A.M. MIS2706
*/
public class ProxyCard {
private static Card univCard;
private static CardChannel channel;
final static int SW_OK = 36864; //9000
final static int SW_FALSE = 6999;
final static byte CLA = ( byte )0xB0; //CLA
final static byte GET_STID = ( byte )0x01; // INS
final static byte GET_NAME = ( byte )0x02; //INS
final static byte GET_LASTNAME = (byte)0x03; //INS
final static byte VERIFY = (byte)0x04; //INS for pin verify
final static byte CREDIT = (byte) 0x05; //INS
final static byte DEBIT = (byte) 0x06; //INS
final static byte GET_BALANCE = (byte) 0x07; //INS
final static byte P1 = (byte) 0x00;
final static byte P2 = (byte) 0x00;
final static byte Ne = (byte) 0x02; // FOR BALANCE
final static byte MAX_ID_SIZE = ( byte )0x07;
final static byte MAX_NAME = ( byte )0x06;
final static byte MAX_LASTNAME= ( byte )0x07;
163
/** Creates a new instance of ProxyCard */
public ProxyCard() {
try {
ProxyInit();
} catch (Exception ex) {
ex.printStackTrace();
}
}
public void connect_card() throws IOException
{
TerminalFactory factory = TerminalFactory.getDefault();
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 217
try{
List<CardTerminal> terminals = factory.terminals().list();
// get the first terminal
CardTerminal terminal = terminals.get(0);
// establish a connection with the card
univCard = terminal.connect("T=0");
channel = univCard.getBasicChannel();
}
catch(CardException ex)
{
throw new IOException("Connection failed");
}
}
public void selectAID(byte[] appletAID) throws IllegalArgumentException,
IOException,
IllegalStateException
{
byte appLength = (byte)(appletAID.length & 0xFF);
try{
byte[] c1 = {(byte)0x00, (byte)0xA4, (byte)0x04, (byte)0x00, (byte)appLength,
(byte)0xa0, (byte)0x00, (byte)0x00,
(byte)0x00, (byte)0x62, (byte)0x07, (byte)0x01, (byte)0x0C,
(byte)0x02, (byte)0x01};
ResponseAPDU r = channel.transmit(new CommandAPDU(c1));
int status = r.getSW();
switch(status)
{
case 36864:
return;
default:
throw new IllegalArgumentException("Applet not found");
164
}
}catch(CardException ex){
throw new IOException("Connection failed");
}
}
public static byte[] toBinArray( String hexStr ){
byte bArray[] = new byte[hexStr.length()/2];
for(int i=0; i<(hexStr.length()/2); i++){
byte firstNibble = Byte.parseByte(hexStr.substring(2*i,2*i+1),16); //
[x,y)
byte secondNibble =
Byte.parseByte(hexStr.substring(2*i+1,2*i+2),16);
int finalByte = (secondNibble) | (firstNibble << 4 ); // bit-operations
only with numbers, not bytes.
bArray[i] = (byte) finalByte;
}
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 218
return bArray;
}
public boolean verify_pin(char[] PIN) throws IllegalArgumentException,
IOException,
IllegalStateException
{
byte[] PINBytes = String.valueOf(PIN).getBytes();
byte pinLength = (byte)(PINBytes.length & 0xFF);
try
{
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,VERIFY,P1,P2,PINBytes));
int status = r.getSW();
switch(status)
{
case 36864:
return true;
case 25344:
throw new IllegalArgumentException("PIN is invalid");
default:
return false;
}//end switch
} // end try
catch(CardException ex)
{
165
throw new IOException("PIN verification has failed");
}//end catch
}
public String getBalance()
throws IllegalArgumentException, IOException,IllegalStateException
{
try
{
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,GET_BALANCE,P1,P2,Ne));
int status = r.getSW();
String balance = OPSPUtil.toHexString2(r.getData());
switch(status)
{
case 36864:
return balance;
default:
throw new IllegalArgumentException("Error in getBalance"+status);
}
}
catch(CardException ex)
{
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 219
throw new IOException("Method GetBalance Failed");
}
}
public String getName() throws IllegalArgumentException,
IOException,IllegalStateException
{
try
{
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,GET_NAME,P1,P2,MAX_NAME));
int status = r.getSW();
String balance = OPSPUtil.toHexString2(r.getData());
switch(status)
{
case 36864:
return balance;
default:
throw new IllegalArgumentException("Error in getName"+status);
}
166
}
catch(CardException ex)
{
throw new IOException("Method getName Failed");
}
}
public String getID() throws IllegalArgumentException,
IOException,IllegalStateException
{
try
{
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,GET_STID,P1,P2,MAX_ID_SIZE));
int status = r.getSW();
String id = OPSPUtil.toHexString2(r.getData());
switch(status)
{
case 36864:
return id;
default:
throw new IllegalArgumentException("Error in getID"+status);
}
}
catch(CardException ex)
{
throw new IOException("Method getName Failed");
}
}
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 220
public String getLastName() throws IllegalArgumentException,
IOException,IllegalStateException
{
try
{
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,GET_LASTNAME,P1,P2,MAX_LASTNAME));
int status = r.getSW();
String balance = OPSPUtil.toHexString2(r.getData());
switch(status)
{
case 36864:
return balance;
167
default:
throw new IllegalArgumentException("Error in getLastName"+status);
}
}
catch(CardException ex)
{
throw new IOException("Method getLastName Failed");
}
}
public void creditcard(String s)
throws IllegalArgumentException, IOException,IllegalStateException
{
try
{
short amountShort = Short.parseShort(s);
byte[] amountBytes = new byte[1];
amountBytes[0] = (byte)(amountShort & 0xFF);
int AmountByteLength = (int)amountBytes.length;
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,CREDIT,P1,P2,amountBytes));
int status = r.getSW();
switch(status)
{
case 36864:
return;
case 27267:
throw new IllegalArgumentException("You cannot credit the card more
than 127 € per time");
default:
throw new IllegalArgumentException("Error in debit money "+status);
}
}
catch(CardException ex)
{
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 221
throw new IOException("Method Debit Card Failed");
}
}
public void debitcard(String s)
throws IllegalArgumentException, IOException,IllegalStateException
{
try
168
{
short amountShort = Short.parseShort(s);
byte[] amountBytes = new byte[1];
amountBytes[0] = (byte)(amountShort & 0xFF);
int AmountByteLength = (int)amountBytes.length;
ResponseAPDU r = channel.transmit(new
CommandAPDU(CLA,DEBIT,P1,P2,amountBytes));
int status = r.getSW();
switch(status)
{
case 36864:
return;
case 27269:
throw new IllegalArgumentException("You don't have enough money
in your card to buy this");
case 25345:
throw new IllegalStateException("You don't enter your password, you
are not a validated person");
default:
throw new IllegalArgumentException("Error in debit money "+status);
}
}
catch(CardException ex)
{
throw new IOException("Method Debit Card Failed");
}
}
public void disconnect_card() throws IOException
{
try{
univCard.disconnect(false);
}
catch(CardException e)
{
throw new IOException("Cannot Disconnect!");
}
}
public static void main(String[] args) {
ProxyCard proxycard = new ProxyCard();
}
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 222
private void ProxyInit() throws Exception { }
}
169
Αρχείο MyDBConnection.java
/*
* MyDBConnection.java
*
* Created on 30 Νοέμβριος 2007, 11:01 μμ
*
* To change this template, choose Tools | Template Manager
* and open the template in the editor.
*/
package new_diploma;
import java.sql.*;
/**
*
* @author GEORGE VERANIS
* A.M. MIS2706
*/
public class MyDBConnection {
private Connection myConnection;
/** Creates a new instance of MyDBConnection */
public MyDBConnection() {
}
public static void main(String[] args) {
MyDBConnection myConnection = new MyDBConnection();
}
public void init() throws SQLException , ClassNotFoundException {
try{
Class.forName("com.mysql.jdbc.Driver");
myConnection=DriverManager.getConnection("jdbc:mysql://localhost/MyNewDat
ab
ase","root", "root");
}
catch(SQLException e){
throw new SQLException("Failed to connect " + e.getMessage());
}
catch(ClassNotFoundException ce)
{
throw new ClassNotFoundException("Failed to find class " +
ce.getMessage());
}
170
}
public Connection getMyConnection(){
return myConnection;
}
public void close(ResultSet rs){
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 223
if(rs !=null){
try{
rs.close();
}
catch(Exception e){}
}
}
public void close(java.sql.Statement stmt){
if(stmt !=null){
try{
stmt.close();
}
catch(Exception e){}
}
}
public void destroy(){
if(myConnection !=null){
try{
myConnection.close();
}
catch(Exception e){}
}
}
public String Studentvote(String id,int p) throws SQLException {
String response=null;
int sqlflag=0;
int addvote=0;
String datevote = null;
String timevote =null;
171
Statement stmt = null;
ResultSet rset = null;
if(myConnection == null) return response;
if(p==0) return response="You don't enter your Password";
try {
// Create a Statement object
stmt = myConnection.createStatement();
// Retrieve the department id and name
rset = stmt.executeQuery("SELECT datevoting,timevoting,flagvoting FROM
voting WHERE id_student='"+id+"'");
// Add the department id to a string array and department name to Combo Box
while (rset.next()) {
sqlflag = rset.getInt("flagvoting");
datevote = rset.getString("datevoting");
timevote = rset.getString("timevoting");
}
if(sqlflag==0)
{ //Leave the student to vote
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 224
rset = stmt.executeQuery("SELECT countvotes FROM party WHERE
id_party="+p);
while (rset.next()) {
addvote = rset.getInt("countvotes");
}
addvote = addvote+1;
stmt.executeUpdate("UPDATE party SET countvotes="+ addvote +"
WHERE id_party="+p);
response="Your vote has submitted \n successfully";
String sql = "UPDATE voting SET flagvoting=1, datevoting=CURDATE() ,
timevoting=CURTIME() WHERE id_student='"+id+"'";
stmt.executeUpdate(sql);
response = response.concat(" \n You cannot vote until next year");
}
else if(sqlflag==1)
{ //The student has already voted!
response = "You have already voted \n at " + datevote+ " on "+timevote+".";
}
// Close ResultSet and Statement objects
rset.close();
stmt.close();
return response;
} catch (SQLException sqlEx) { // Handle SQL Errors
172
throw new SQLException(" Error in procedure of voting : " +
sqlEx.getMessage());
}
}
public int populateBuyList(int s) throws SQLException {
int setret = 0;
// Connect to database
// myConnection.init();
Statement stmt = null;
ResultSet rset = null;
if(myConnection == null) return setret;
try {
// Create a Statement object
stmt = myConnection.createStatement();
// Retrieve the department id and name
rset = stmt.executeQuery("SELECT `value` FROM products WHERE
id_product="+s);
// Add the department id to a string array and department name to Combo Box
while (rset.next()) {
setret = rset.getInt("value");
}
// Close ResultSet and Statement objects
rset.close();
stmt.close();
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 225
return setret;
} catch (SQLException sqlEx) { // Handle SQL Errors
throw new SQLException(" Error populating Product details : " +
sqlEx.getMessage());
}
}
}
173
Αρχείο OPSPUtil.java (βρίσκεται μέσα στο package
org.dyndns.widerstand.OpenPlatform )
/*
* Util.java
*
* Created on 7. Februar 2005, 01:09
*/
package org.dyndns.widerstand.OpenPlatform;
import java.io.*;
/**
* Some helper functions.
* @author Karsten Ohme
*/
public class OPSPUtil {
/**
* The symbols for the hex digits.
*/
private static final char[] HEX_DIGITS =
{
'0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F'
};
/** Creates a new instance of Util */
private OPSPUtil() {
}
/**
* Parses a hex string into a byte array.
* @param hex The hex string.
* @return The byte array presentation of the hex string.
*/
public static byte[] bytesFromHexString(String hex) throws
NumberFormatException {
if (hex.length() == 0) return null;
// String myhex = hex + " ";
String myhex = hex;
int len = myhex.length();
if ((len % 2) != 0) throw new NumberFormatException();
byte[] buf = new byte[len / 2];
int i = 0, j = 0;
while (i < len) {
try {
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 226
buf[j++] = (byte) ((fromDigit(myhex.charAt(i++)) << 4) |
fromDigit(myhex.charAt(i++)));
} catch (IllegalArgumentException e) {
174
throw new NumberFormatException();
}
// if (myhex.charAt(i++) != ' ') throw new NumberFormatException();
}
return buf;
}
/**
* Returns the value of the hex character.
* @param ch The hex character
* @return The value of the hex character.
*/
private static int fromDigit(char ch) {
if (ch >= '0' && ch <= '9')
return ch - '0';
if (ch >= 'A' && ch <= 'F')
return ch - 'A' + 10;
if (ch >= 'a' && ch <= 'f')
return ch - 'a' + 10;
throw new IllegalArgumentException("invalid hex digit '" + ch + "'");
}
/**
* Returns a hex string representing the byte array.
* @param ba The byte array to hexify.
* @return The hex string.
*/
public static String toHexString( byte[] ba ) {
int length = ba.length;
char[] buf = new char[length * 3];
for (int i = 0, j = 0, k; i < length; ) {
k = ba[i++];
buf[j++] = HEX_DIGITS[(k >> 4) & 0x0F];
buf[j++] = HEX_DIGITS[ k & 0x0F];
// buf[j++] = ' ';
}
//return new String(buf, 0, buf.length-1);
return new String(buf, 0, buf.length-2);
}
//My method George Veranis
public static String toHexString2 ( byte[] b )
{
StringBuffer sb = new StringBuffer( b.length * 2 );
for ( int i=0; i<b.length; i++ )
{
// look up high nibble char
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 227
sb.append( HEX_DIGITS [( b[i] & 0xf0 ) >>> 4] );
175
// look up low nibble char
sb.append( HEX_DIGITS [b[i] & 0x0f] );
}
return sb.toString();
}
//My method George Veranis
public static String displayHexString ( String s )
{
StringBuilder sb = new StringBuilder( s.length() * 5 - 1 );
for ( int i=0; i<s.length(); i++ )
{
char c = s.charAt(i);
if ( i != 0 )
{
sb.append( '_' );
}
// encode 16 bits as four nibbles
sb.append( HEX_DIGITS [ c >>> 12 & 0xf ] );
sb.append( HEX_DIGITS [ c >>> 8 & 0xf ] );
sb.append( HEX_DIGITS [ c >>> 4 & 0xf ] );
sb.append( HEX_DIGITS[ c & 0xf ] );
}
return sb.toString();
}
/**
* Saves a Load File Data Block DAP.
* @param file The file to save.
* @param dapBlock The OPSPDAPBlock to be saved.
*/
public static void saveDAP(File file, OPSPDAPBlock dapBlock) throws
IOException {
BufferedOutputStream out = null;
try {
out = new BufferedOutputStream(new FileOutputStream(file));
byte securityDomain[] = dapBlock.getSecurityDomainAID();
byte signature[] = dapBlock.getSignature();
out.write(securityDomain.length);
out.write(securityDomain);
out.write(signature.length);
out.write(signature);
} catch (IOException e) {
throw e;
} finally {
if (out != null) {
out.close();
}
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 228
}
}
176
/**
* Saves a Load or Install Token.
* @param file The file to save.
* @param token The token to be saved.
*/
public static void saveToken(File file, byte[] token) throws IOException {
BufferedOutputStream out = null;
try {
out = new BufferedOutputStream(new FileOutputStream(file));
out.write(token);
} catch (IOException e) {
throw e;
} finally {
if (out != null) {
out.close();
}
}
}
/**
* Loads a Load or Install Token.
* @param fileName The file name of the token to load.
* @return The loaded token.
*/
public static byte[] loadToken(String fileName) throws IOException {
File file = new File(fileName);
int size = (int)file.length();
if (size != 128) throw new IOException("Invalid token file format.");
BufferedInputStream input = null;
byte token[] = null;
try {
input = new BufferedInputStream(new FileInputStream(file));
token = new byte[size];
input.read(token, 0, size);
} catch (IOException e) {
throw e;
} finally {
input.close();
}
return token;
}
/**
* Loads a 2 key 3DES key.
* @param file The file of the token to load.
* @return The loaded 3DES key.
*/
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 229
public static byte[] load3DES(File file) throws IOException {
177
int size = (int)file.length();
if (size != 16) throw new IOException("Invalid 3DES key file format.");
byte key[] = null;
BufferedInputStream input = null;
try {
input = new BufferedInputStream(new FileInputStream(file));
key = new byte[size];
input.read(key, 0, size);
} catch (IOException e) {
throw e;
} finally {
if (input != null) {
input.close();
}
}
return key;
}
/**
* Tries to parse a file into a OPSPDAPBlock instance.
* @param fileName The file to parse.
* @return The OPSPDAPBlock instance.
*/
public static OPSPDAPBlock loadDAP(String fileName) throws IOException {
File file = new File(fileName);
BufferedInputStream in = null;
byte securityDomain[] = null;
byte signature[] = null;
try {
in = new BufferedInputStream(new FileInputStream(file));
int size = in.read();
if ((size == -1) || (size > 16)) throw new IOException("Invalid DAP file
format.");
securityDomain = new byte[size];
int read = 0;
int tmp = 0;
while (read < size) {
tmp = in.read(securityDomain, read, size-read);
if (tmp == -1) throw new IOException("Invalid DAP file format.");
read+=tmp;
}
size = in.read();
if ((size == -1) || ((size != 128) && (size != 16))) throw new
IOException("Invalid DAP file format.");
signature = new byte[size];
read = 0;
tmp = 0;
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 230
while (read < size) {
tmp = in.read(signature, read, size-read);
if (tmp == -1) throw new IOException("Invalid DAP file format.");
178
read+=tmp;
}
} catch (IOException e) {
throw e;
} finally {
if (in != null) {
in.close();
}
}
return new OPSPDAPBlock(securityDomain, signature);
}
/**
* Saves a OPSPReceiptData.
* @param file The file to save.
* @param receiptData The OPSPReceiptData to be saved.
*/
public static void saveOPSPReceiptData(File file,
OPSPReceiptData receiptData) throws IOException {
BufferedOutputStream out = null;
try {
out = new BufferedOutputStream(new FileOutputStream(file));
byte receipt[] = receiptData.getReceipt();
byte confirmationCounter[] = receiptData.getConfirmationCounter();
byte cardUniqueData[] = receiptData.getCardUniqueData();
out.write(receipt.length);
out.write(receipt);
out.write(confirmationCounter.length);
out.write(confirmationCounter);
out.write(cardUniqueData.length);
out.write(cardUniqueData);
} catch (IOException e) {
throw e;
} finally {
if (out != null) {
out.close();
}
}
}
/**
* Tries to parse a file into a OPSPReceiptData instance.
* @param fileName The file to parse.
* @return The OPSPReceiptData instance.
*/
public static OPSPReceiptData loadOPSPReceiptData(String fileName) throws
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 231
IOException {
File file = new File(fileName);
BufferedInputStream in = null;
byte receipt[] = null;
179
byte confirmationCounter[] = null;
byte cardUniqueData[] = null;
try {
in = new BufferedInputStream(new FileInputStream(file));
int size = in.read();
if ((size == -1) || (size != 8)) throw new IOException("Invalid Receipt Data
file format.");
receipt = new byte[size];
int read = 0;
int tmp = 0;
while (read < size) {
tmp = in.read(receipt, read, size-read);
if (tmp == -1) throw new IOException("Invalid Receipt Data file format.");
read+=tmp;
}
size = in.read();
if ((size == -1) || (size != 2)) throw new IOException("Invalid Receipt Data
file format.");
confirmationCounter = new byte[size];
read = 0;
tmp = 0;
while (read < size) {
tmp = in.read(confirmationCounter, read, size-read);
if (tmp == -1) throw new IOException("Invalid Receipt Data file format.");
read+=tmp;
}
size = in.read();
if ((size == -1) || (size != 10)) throw new IOException("Invalid Receipt Data
file format.");
confirmationCounter = new byte[size];
read = 0;
tmp = 0;
while (read < size) {
tmp = in.read(cardUniqueData, read, size-read);
if (tmp == -1) throw new IOException("Invalid Receipt Data file format.");
read+=tmp;
}
} catch (IOException e) {
throw e;
} finally {
if (in != null) {
in.close();
}
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 232
}
return new OPSPReceiptData(receipt, confirmationCounter, cardUniqueData);
}
}
180
Αρχεία περιγραφής δομής πινάκων της βάσης δεδομένων.
Για τον πίνακα party
CREATE TABLE `party` (
`id_party` int(11) NOT NULL,
`title_party` varchar(10) NOT NULL,
`countvotes` int(11) NOT NULL default '0',
PRIMARY KEY (`id_party`),
KEY `party_title_party_idx` (`title_party`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8;
Για τον πίνακα products
CREATE TABLE `products` (
`id_product` int(11) NOT NULL,
`title` varchar(30) default NULL,
`value` int(11) default NULL,
PRIMARY KEY (`id_product`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8;
Για τον πίνακα voting
CREATE TABLE `voting` (
`id_student` varchar(7) NOT NULL,
`datevoting` date default NULL,
`timevoting` time default NULL,
`flagvoting` int(11) default NULL,
PRIMARY KEY (`id_student`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8;
3εδομένα εφαρμογής
Για τον πίνακα party
INSERT INTO `party` (`id_party`, `title_party`, `countvotes`) VALUES
(1, '9ΑΠ', 0),
(2, 'ΠΑΣΠ', 0),
(3, 'ΠΚΣ', 0),
(4, 'ΕΑΚΚ', 0);
Για τον πίνακα products
INSERT INTO `products` (`id_product`, `title`, `value`) VALUES
(1, 'coffee', 1),
(2, 'Drink', 5),
(3, 'Meal A', 10),
(4, 'Meal B', 15),
(5, 'Tee', 2),
(6, 'Tickets 5', 1),
181
(7, 'Tickets 10', 2),
(8, 'Tickets 20', 3),
(9, 'Fine Library', 2);
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 233
Για τον πίνακα voting
INSERT INTO `voting` (`id_student`, `datevoting`, `timevoting`, `flagvoting`)
VALUES
('MIS0627', NULL, NULL, 0),
('MIS0628', NULL, NULL, 0),
('MIS0629', NULL, NULL, 0),
('MIS0630', NULL, NULL, 0);

SMART CARDS
Table of Contents
1
INTRODUCTION ................................................ .......................................
........... ........................... 4
1.1 General ............................................... 5
2 Clever
Cards ............................................... .................................................. .......
...... 8
2.1 GENERAL, DEFINITIONS ..............................................
.................................................. ................ 8
2.2 Background .............................................. Smart
Cards .................................................. .8
2.3 TYPES .............................................. Smart Cards
.................................................. ..... 9
2.4 APPLICATIONS ................................................
.................................................. .................... 10
Wallet 2.4.1 ............................................. ...............................................
10
2.4.2 Use of smart cards in
transport .......................................... ......................... 11
2.4.3 Card durability and customer service (loyalty cards ).........................
11
2.4.4 Control access to
buildings ........................................... ........................................ 12
2.4.5 Access to open or closed
networks ......................................... ........................... 12
2.4.6 Health and
Insurance ............................................ .................................................. ....
. 13
2.4.7 Advanced Electronic signatures on electronic

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 234
documents ................................ 13
2.4.8 GSM cards and calling
cards ........................................... .......................................... 13
2.4.9 Other
applications ............................................. ..................................................
........ 14
2.5 security and
benefits .............................................. ...................................... 17
3 EXISTING SITUATION .............................................. Surveying ...........
18
3.1 The situation in
Europe ............................................. .............................................. 18
3.2 Clever CARDS IN
GREECE ............................................. ........................................ 24
3.3 INSTITUTIONAL
FRAMEWORK ............................................... ............................................
...... ........... 25
3.3.1 Institutional framework 'directly' to 'smart cards
»................................... .... 25
3.3.2 Institutional framework related (indirectly) with "smart
cards" .......................... 25
3.3.3 Other provisions indirectly related to "smart
cards" ............................ 27
4 ACTIVITIES OF WORKING
GROUP ............................................. .............. 28
4.1 1st Public consultation 'Clever Cards in Public Administration
».................... 28
4.1.1
Program .............................................. .................................................. ....
........... 28
4.1.2
Participants .............................................. ..................................................
........... 29
4.1.3
Conclusions .............................................. .................................................
. .......... 31
4.1.4 Results Questionnaires Imprint Existing Conditions ............... 32
4.2 PUBLIC CONSULTATION 2H 'Clever Cards - MARKET RESEARCH
& "............................ 32
4.2.1
Program .............................................. .................................................. ....
........... 33
4.2.2
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 235
Participants .............................................. ..................................................
........... 34
4.2.3
Conclusions .............................................. .................................................
. .......... 37
4.2.4 Results Questionnaires Imprint Existing Conditions ............... 38
4.3 3rd Public Consultation - "Clever & BANK CARDS -
Telecommunications' 47 ...
4.3.1
Program .............................................. .................................................. ....
........... 47
4.3.2
Participants .............................................. ..................................................
........... 48
4.3.3
Conclusions .............................................. .................................................
. .......... 50
4.3.4 Analysis of Existing Questionnaires Imprint
Conditions ....................... 50
4.4 4th Public Consultation - "All relevant stakeholders in
'................................ 50
4.4.1
Program .............................................. .................................................. ....
........... 51
Deliverable Task C3 'Smart
Cards' 3 from 110 final
4.4.2
Participants .............................................. ..................................................
........... 51
4.4.3
Conclusions .............................................. .................................................
. .......... 56
5 CONCLUSIONS AND SUGGESTIONS
STRATEGY ............................................. .59
5.1 General AXES (PROPOSALS TO THE
STATE )......................................... ................ 59
5.1.1 Proposals for the Public
Sector .......................................... .................................. 60
5.1.2 Information and
Awareness ............................................ ................................ 60
5.2 Technical Issues -
Standards ............................................. ............................................ 61
6 BIBLIOGRAPHY -
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 236
SOURCES .............................................. ..................................................
62
6.1 Smart Cards PROMOTIONAL
INITIATIVES ............................................. ............... 62
6.2 STANDARDS -
GUIDANCE .............................................. ................................................
62
6.3 INTERNATIONAL MARKET INITIATIVES FOR PROMOTION
standards and applications
Smart
Cards ................................................ .................................................. ......
............... 63
6.4 European Research
Project .............................................. .......................... 63
6.5 INTERNATIONAL - Manufacturers /
Suppliers ........................................... ........... 63
6.6 News - Articles -
NEWS ............................................ .................................................. .... 64

7
ANNEXES ................................................ ..................................................
............... 65
7.1 STANDARDS AND GUIDELINES FOR Clever
Cards ........................................... ............. 65
7.1.1
General .............................................. .................................................. .....
.................. 65
7.1.2 International Standards Organisation -
ISO .......................................... ........................... 65
7.1.3 Standards contactless cards - Contactless card
standards ................................ 67
7.1.4 Pilot / Check Card - Card
Testing ........................................ .................. 68
7.1.5 Protocols Messaging - Message Exchange Protocols ..................
69
7.1.6 Standards for Security Issues - Security Related
Standards .................... 69
7.1.7 European Organisation for Standardisation -
CEN .......................................... .................. 69
7.2 TERMINOLOGY INDEX Smart
Cards ............................................. ........................ 71
7.3 QUESTIONNAIRES FOR CONSULTATION Clever
Cards ......................................... 82
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 237
7.3.1 Questionnaire for consultation on smart cards with the "Public
Administration"
82
7.3.2 Questionnaire Consultation on Smart Cards to "Market & Research"
88
7.3.3 Questionnaire Consultation on Smart Cards with "Banks -
Telecommunications' ................................................ .................................
................. ................... 94
7.4 ORGANIZATIONS respondents
have ............................................ ................ 99
7.4.1 Questionnaire for consultation on smart cards with the "Market &
Research 99
7.4.2 Questionnaire Consultation on Smart Cards with "Banks -
Telecommunications' ................................................ .................................
................. ................. 102
7.5 WORKING GROUP meeting
notes ............................................. ................. 103
7.5.1 Proceedings of the 1st Meeting, 05 June
2002 ........................................ ................. 103
7.5.2 Proceedings of the 2nd Meeting, June 19,
2002 ........................................ ................... 103
7.5.3 Proceedings of the 3rd Meeting, July 9,
2002 ........................................ ..................... 104
7.5.4 Proceedings of the 4th Synantisis____________, August 27,
2002 ........................................ .............. 105
7.5.5 Proceedings of the 5th Meeting, September 10,
2002 ........................................ ........... 107
7.5.6 Proceedings of the 6th Meeting, October 2,
2002 ........................................ ............... 108
7.5.7 Proceedings of the 7th Meeting, October 9,
2002 ........................................ ............... 109
Deliverable Task C3 'Smart
Cards' 4 by 110 final
1 Introduction
1.1 General
Internationally, over the last decade, smart card technology used to
approach and solve problems of access, management and information
handling in almost all sectors of the economy and society. This is done
extensively in research and pilot projects on a smaller scale sectoral
projects in local or national scale, eg health card, identification, electronic
purse or card access to transport etc. It is now generally accepted that
smart card technology offers many operational advantages in
implementing modern electronic services. Their role is primarily focused
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 238
on developing and safeguarding the environment of trust in transactions
between citizens and service providers across all sectors of modern
economy. The main issues which impede the promotion and widespread
use of smart cards are the following: 1. lack of coordinated approach to
the utility and functionality of Smart Cards by all parties involved in both
decision making and the implementation of applications.
2. lack of widely accepted standards at all levels of smart card technology
(cards, card readers, software, packaging information, etc.) to ensure
interoperability (interoperability) between systems at sectoral,
intersectoral and transnational levels.
For the European Union, Smart Cards are one of the roteraiotites the
eEurope Action Plan in the development of secure and fast network and
support of e-business. The European Commission is promoting the issue
by organizing the summit on smart cards and identification of necessary
actions (trail-blazers) to achieve the objectives of eEurope. The trail-
blazers who initially
created are: Public Identity, Identification & Authedication, Certification &
Protection Profile, Generalized Card Reader, e-Payments, Contactless
Smart Cards, Multi-application Smart Cards. Then created additional four
other trail-blazers, relating to: User Interface-Consumer Issues, Public
Transport, Healthcare and e-Government. For the study themes of the
trail-blazer set up relevant working groups
consisting of representatives of social groups and service providers,
industry and academia and research space
The working groups dealing with issues of Public Identity, Identification &
Authedication, Certification & Protection Profile and Multi-application
Smart Cards are significantly active and produced the first results for
public consultation. The Greek participation in these working groups is
very limited.
Additionally, under the CSF III discussed or announced plans for various
smart card applications, such as health cards, welfare, education,
employment - insurance cards, stock cards, tax authorities, toll cards, etc.
The situation in our country and the mobility established at European and
international development issues smart card applications suggest the
setting up interdisciplinary working group on assessment of the Greek
situation, taking into account issues that either have arisen in other
countries, or have not been addressed yet. Deliverable Task C3 'Smart
Card 5 of 110 final
1.2 Objectives of the Working Group
Objectives of the Working Group is to assess the current situation in our
country, identifying the key problems of development smart card
applications and propose actions to address the basis of international
experience. It will focus its work in surveying and studying the various
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 239
approaches to smart card applications
studied in our country, to identify the critical factors of development
applications composing a framework of strategic and technological
choices that will contribute to the necessary inter-sectoral collaboration
and synergy. Specifically, this working group aims to:
• to capture the current situation in Greece with emphasis on mapping of
places - the views of all stakeholders in the design and implementation of
new services with the use of smart cards including collegiate society. The
fix would be to some extent complementary and comparative research
conducted on the requirements of the users on the trail-blazer - User
Interface & Consumer Issues.
• identify key barriers application development in our country and
proposed actions to address.
• studying the existing legal framework in our country
• identify actions to inform citizens and stakeholders in
designing and implementing new services using smart cards.
1.3 Composition of the Working Group
The composition of the Working Group was formed by people from the
following
locations:
􀀹 Public Sector: 3 people
􀀹 Academic - Research area: 10 people
􀀹 Market: 23 people (IT companies, consultants and system integrators)
􀀹 Banks: 2 people
􀀹 Telecommunications: 3 people
􀀹 Industry: 4 people
􀀹 Other: 3 people
Further, the Working Group consists of the following:
ENTITY NAME COMPANY-E-MAIL
1. Georgiadis University of Athens
Panagiotis georgiad@di.uoa.gr
2. Mellon Technologies Karapetsas Stephen stefanos.karapetsis @
mellon.
Deliverable Task C3 'Smart
Card 6 of 110 final
com.gr
3. NTUA Karounos Royal karounou@netmode.ntua.gr
4. Lawyer Karntasiadou Life zoikard@spark.net.gr
5. Accenture Tsiambaos
Constantina dinats@yahoo.com
6. PLEFSIS Inc. Systems
Information
Charalampakis
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 240
John jchar@plefsis.com
7. Systema Informatics
SA Tsoronis Theodore Thodoris.Tsoronis @ systema
. Gr
8. OTE SA Chochliouros John ic152369@ote.gr
9. Head
Business & Product
Applied Technology
COSMOTE
Kapsoulakis John jkapsoulak@cosmote.gr
10. Alpha Bank Sotiris Kyriakos skyriakos@alpha.gr
11. Cytech Ltd Antoniadis Evangelos vanton@cytech.gr
12. INFORM P. WOLF cheese pieces Andreas a.tirakis @ lykos.gr
13.
INFORM P. WOLF Pantis Peter p.pantis @ lykos.gr
14. Intersys SA cock Dimitris D. Petinos @ intersys.gr
15. INTRACOM Bobolou George gbob@intracom.gr
16. Truth AE Mizara Claus vmizaras@truth.com.gr
17. Athens Bar Association Sioulas Chris CSioulis@interbank.gr
18. ASYK SA Karanasios
Constantine k.karanassios @ asyk.ase.gr
19. PAPASOTIRIOU SA Vavourakis John vavourakis@papasotiriou.gr
20. World Organization of
Greek Kyvernonafton
(P.O.T.E.K)
Chasapidis John yianni@4u.net
21. University of Athens Dimitris Gouskos d.gouscos @ e-gov.gr
22. University of Athens Maria Ioannou marias@mm.di.uoa.gr
23. University of Athens bumps
Panagiotis pkarou@e-gov.gr
24. University of Patras Vogiatzis Artemios bogart@ee.upatras.gr
Deliverable Task C3 'Smart
Card 7 of 110 final
25. University of Patras Dimitris Serpanos serpanos@ee.upatras.gr
26. Nikos Saridakis YPESDA ypesdda@gspa.gr
27. IS SA Drinos John ydrinis@ktpae.gr
28. APOLLO A.E. Kakoulidis George kakoulidis@apollo.gr
29. ENCODE SA Zoulovits Mina minazoulovits@hotmail.com
30. SIDCO S.A. Ghulam Dastgir Yama yamart@hellasnet.gr
31. NTUA George Rigopoulos grigop@epu.ntua.gr
32. INTRACOM SA cber@intracom.gr Chris Burson
33. Ideal Group Ioannis Giannoulis y.yiannoulis @ ideal.gr
34. OTE Vassilis Rigopoulos vrigopoul@ote.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 241
35. BSE Petalas Claus vpetalas@ath.forthnet.gr
36. Siemens Moustopoulos
Lycurgus
Lykourgos.Moustopoulos @ s
iemens.gr
37. Siemens Bogris Nicholas Nikolaos.Bogris @ siemens.g
r
38. GROUP D
Aggelopoulou
Psiropoulos
Panagiotis kossivas@angelopoulos.gr
39. Microsoft Hellas Draganidis Fotis fdragan@otenet.gr
40. INTRACOM Velidou Freedom ebel@intranet.gr
41. Mitrakas Andreas andreas.mitrakas @ globalsig
n.net
42. Microsoft Hellas Flouris Myron myron@microsoft.com
43. NTUA Royal Gogos vgogou@biomed.ntua.gr
44. IBS George Paschalidis ibs@kav.forthnet.gr
45. Prefecture
Pella China George kinasgeorg@pel.forthnet.gr
46. Aegean University Lambrinoudakis
Costas Clam@aegean.gr
47. Combank Kotsikopoulou
Basilica
kotsikopoulou.v @ combank.
gr
48. ARXIS ELECTRONICS Chtouris John info@arxis.gr
Deliverable Task C3 'Smart
Card 8 of 110 final
2 Smart Cards
2.1 General Definitions
Many of us already use one or more smart cards in our daily lives. For
example, smart card is a SIM card used in mobile system GSM. Smart
cards are essentially tiny computers, the size and form a credit card on
which is built an integrated circuit (chip), the front left side. The integrated
circuit containing the contact entry and exit, and can contain only memory
or microprocessor. The chip can provide a secure multi-level structure
and to enable hierarchical access, making it difficult to access the data
and the manipulation thereof to compute cryptographic functions
(cryptographic functions) and perceived attempts to access directly,
which is valid for as example, blocking the SIM card in case of import
wrong PIN more than three-times-typically the main feature of smart
cards is the ability to store and process information in a secure manner.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 242
The advantages of smart cards is to protect the data they contain,
portability and ease of use. In order to complete it can be used in
terminals or readers who do not have the size required for the import of
the entire card, allowing the production of cards with notches around the
full order was removed and placed in the terminal. Classic example cards
SIM.
2.2 History of smart cards
The ancestors of smart cards are credit cards issued by Diners Club
agency in the 1950s. These cards were the size of a business card
(business card) and had printed the name of the holder of the front. The
show was enough for the service provider (eg hotel or restaurant) to
provide credit to the holder. Thus facilitated business travel. Later the
name was printed in relief (for example, now on the cards to withdraw
money from ATMs of banks) to facilitate the recording of the name of the
holder. Some years later, the cards became a magnetic stripe (magnetic
stripe), which allow the mechanical recording of the data holder. In this
way the raw data could be made electronically, speeding
Deliverable Task C3 "Smart Cards" 9 out of 110 final
transactions. But still the problem of fraud, and anyone having the right
equipment could create fake cards.
We could say that smart cards are the result of the simultaneous
improvement of plastic cards and microchip. In 1969 occurred in France,
journalist Roland Moreno, a concept for an integrated circuit card. Thus
was born the smart card. Smart cards u954 developed independently in
Germany (1967)
Japan (1970) and the U.S. (1972). Smart cards flourished in the 1980s.
During 1982-84 the Cartes Bancaire (Banking Card Association of
France) ran the first pilot project for smart cards. The Union has worked
with companies Bull, Philips and Schlumberger doing tests in the French
cities of Blois, Caen, and Lyon. The
tests were a huge success and only minor problems. One improvement
that resulted from the pilot project was to integrate the magnetic strip in
order to maintain compatibility with the then existing systems.
After a very successful test, the French banks have introduced the use of
smart cards for banking operations to the public. The use is the first
example of a public function smart cards for banking operations. In
parallel, a large advertising campaign when it introduced the term "smart
card» (smart
card)

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443


ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 243

2.3 Types of smart cards


Nowadays, smart cards can be categorized by two main criteria:
cpu capacity and potential entry and exit.
Under the first criterion, distinguished three categories of smart cards:
1. Memory cards - cards store information (memory cards). These cards
contain a memory and logic in hardware (hardware logic), which can set
or delete values in memory. Memory cards are improperly listed as smart
cards, as they are not capable of processing data.
2. Smart cards (smart cards, IC cards, microprocessor cards). It is
"traditional" smart cards or microprocessor cards. The CPU, in addition to
storage and insurance information to take decisions in the specifications
of the project which will be used
.
3. Smart cards are generic (multi-application smart cards). The latest
generation of smart cards come with open operating systems (Java,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 244
MULTOS) and can carry more than one application. It also provides the
user to "upload" new applications, or delete other according to their
needs. The $ __________, microprocessor cards except CPU, ROM
memory available for storing the card operating system, RAM for fast
performance calculations and EEPROM memory for storing applications
and data. This is essentially accomplished tiny PCs, which only lack of
input / output. So in order to communicate with computers are using the
smart card accepting devices (card readers) A second classification how
to contact smart card with the external environment. Based on this
criterion, we distinguish the following categories:
Deliverable Task C3 'Smart
Cards' 10 of 110 final
1. Smart cards with contacts (Contact Cards). These cards communicate
with electrical
contacts and be introduced to a reading device to read or
introduction of information.
2. Wireless Smart Card (Contactless Cards). These cards have a tiny
built-in internal antenna and can communicate with an antenna without
physical contact with a reader so that the information be updated,
changed or treated.
3. Hybrid cards and combination cards (Hybrid and Combination Cards).
These cards incorporate both modes of transmission and therefore can
not communicate if either wired or wirelessly.
Smart card accepting devices (card readers)
As mentioned above, in order to communicate with smart card devices
are necessary for acceptance of smart cards.
These devices are divided into two main categories:
1. Terminals, which have all the necessary equipment for
communication with the card eg keyboard, printer, monitor, modem, etc.
(EFT / POS,
mobile phones, pay phones, vending machines and decoders)
2. Readers - register for smart cards. These devices do not have
equipment and are connected to terminals that do not have smart card
reader (PC, info kiosks, controllers, etc.) A key subset of readers are
secure readers, who have a screen
LCD display and PIN pad. Other subgroups are readers without cable,
contactless readers, desktop, integrated into other devices (keyboard,
CPU), etc.
2.4 Applications
Smart cards are a practical notebook with enhanced security features on
a natural level. The continuous progress in technology integration
process currently provides features to smart cards that were available to
the first personal computers.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 245
We present below some examples of using smart cards to make
understandable the value and usefulness.
2.4.1 Wallet
The smart card can store currency, greatly facilitating payments and
purchases. Examples are the uses of controlled parking, toll roads,
paying a ticket to public transportation (subway, train, bus), buying soft
drinks from machines located in public places (venting machines),
automatic payment of photocopies at public libraries and consumer
markets species in any store.
Deliverable Task C3 'Smart Cards' 11 by 110 final
This will facilitate the immediate payment of outstanding amount as well
as clearance between shops and banks. Successful examples are the
electronic purse card and corresponding Mondex1 of Visa2.
2.4.2 Use of smart cards in transport
Transport is implementing key - because they are abundant and stable
audience. Applications Transport can offer smart cards are oiexis:

 
• Pay fare on Public Transportation
• Payment of tolls
• Rights of parking
• Booking air ticket reservations
hotels and baggage transport
• Documentation holder, electronic passport.
Of these, the most important application, consistent with the analysis
presented in this
document is public transport, although in some years can be considered
equally important and the implementation of toll collection. In addition, the
application for parking rights may be combined effectively with the toll
and / or public transport. Such a combination may authorize payments for
parking to be credited even if someone parked his car and continued his
journey by public transport. Yet air tickets booking service
can be made by a separate card or included in a general smart card for
citizens.
2.4.3 Card durability and customer service (loyalty cards)
Retailers have the option to use smart cards to how effectively serve their
customers and keep them loyal. For example, they know how to reward
their customers with some of the points in each market and to reward
them by giving them gifts to the redemption of these points when they
reach a certain level of points. The fact that the points are stored in the
chip offers two main advantages:
a. There is no need to network between offices to inform a
central database on the points of the customer.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 246
1 URL: http://www.mondex.com
2 URL: http://www.visa.com/pd/ewallet/main.html
Source: ITS International,
Deliverable Task C3 'Smart Cards' 12 by 110 final
b. The client directly reward the achievement of maximum points, giving
him extra incentive markets.
By doing this they keep their customers loyal while getting information
about their consumption habits, valuable information for both marketing
strategy and sales and to better serve customers.
2.4.4 Control access to buildings
A smart card can store the identification of an individual to control access
to buildings and non-high-security workplace and in universities, schools,
libraries and clubs. For higher security needs and access to specific
services or information, a smart card can be a device for storing
information such as images or other biometric features (eg fingerprints,
iris of the eye) of the user. The same card can then keep a record of the
identification of the individual
computer systems of the body. An example is the card Mcard, which
used than 110,000 members of the University of Michigan3 and that
there
information on the identity of each student and can be used
financial transactions, purchase food, books, photocopying and other
uses.
2.4.5 Access to open or closed networks
Smart cards can store digital certificates (digital certificates) and
other information to control user access rights to be
use computing and network systems safely.
The security here refers to both the authentication of the user, and in
creation of virtual private network (VPN) to access corporate systems
from
public networks, such as the trade Internet.Trapezikes
Large banks such as Visa and American Express view
Smart cards are already in the next step in banking, and offer
significant advantages over magnetic stripe cards.
For this reason the company has established EMVco (EUROPAY-
MASTECARD-VISA co) is
which process the EMV specifications which will be followed by all
parties (banks, card makers and equipment developers
software terminals and back office systems, etc.) to be
achieve EMV transactions. The newest version EMV specifications are
EMV2000.
The EMV cards will replace credit and debit cards, magnetic circuit,
while he could support and extra applications such as loyalty, electronic
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 247
purse
etc.
3 URL: http://www.mcard.umich.edu/
Deliverable Task C3 'Smart
Card 13 of 110 final
The EMV cards can also be used in banking transactions on
distance (internet banking, mobile banking), using electronic certificates
for
authentication of the user.
2.4.6 Health and Insurance
The smart card can be used for secure storage of identification,
Insurance and medical data of an individual or to store the location
data are medical records (pointer cards). In this way the information is
timely and accurate available to patients and physicians supporting and
facilitating
considerable freedom of movement for patients who can travel within and

abroad, bringing with them the insurance and their medical file.
Moreover, the smart cards in health care are used in applications
identification of the patient and health professionals (doctors, nurses,
etc.), electronic
signatures for integrity and authenticity of medical data
data is encrypted to ensure confidentiality (health professional
cards), secure access to health networks, etc.
2.4.7 Advanced electronic signatures in electronic documents
Smart cards, with the potential to create a pair of keys, and secure
storage of private keys and electronic certificates provide an
reliable part of "creation-devices" required by the European
Directive 93 of 1999 "for electronic signatures, and the corresponding
Greek Testament
150/2001- so their keepers, confirming their identity with "recognized
certificates (under PD) from an appropriate "Service Provider
Certification, be able to sign electronic documents with procedural value
equal to
that of handwritten signatures on paper documents.
By applying these involved three (3) distinct entities:
1. Certification Service Provider (¨ Tuesday Trusted Entity)
2. End entity (recipient's e-signature and certificate,
else "based party"), usually a service provider to secure network
customers (eg banks)
3. End user signatures (eg customer Bank)
2.4.8 GSM cards phonecards _____________kai
Smart cards have found application in many areas of everyday life. Two
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 248
of the
most successful applications are in the telecom sector and even the
simplest
them (prepaid phone card) and more complex (GSM cards) form.
Currently marketed worldwide billions and hundreds of phone cards
million SIM cards after the GSM phones is estimated at 500,000,000.
Deliverable Task C3 'Smart
Card 14 of 110 final
2.4.9 Other applications
Other applications of smart cards is their use in set-top boxes, Internet
access,
product tracking, driver's license (ideal for storage of penalty points and
immediate removal
diploma), etc.
Deliverable Task C3 'Smart
Cards' 15 by 110 final
Known and potential smart card applications by sector and type of card
Stored Value Cards Data / Information Files Identification /
Access / Security
Membership
cards
Bank
Sector
􀂃 Wallet
􀂃 Banking
􀂃 Online Payments
􀂃 Insurance application
􀂃 Access to
This account
􀂃 Security
using
internet from home
􀂃 Credit
Cards
􀂃 Debit
Cards
Telecom Prepaid phone card 􀂃 􀂃 number 􀂃 Storage Cards SIM / GSM
Public Sector Account Manager 􀂃
(Pensions, allowances, etc.)
􀂃 Advanced electronic
signatures in electronic
documents
􀂃 Passport
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 249
􀂃 Identity
􀂃 Driving
Transport 􀂃 Electronic Tickets
(Temporary validity contracts -
daily, monthly or annual
tickets)
􀂃 Automatic toll payment
􀂃 payment modes
electronic wallet
(Bus, taxi, train, etc.)
􀂃 boarding pass - pass
free boarding
􀂃 card right
vehicle access
controlled area
access
􀂃 Card
compliance post
payment
contract
􀂃 Health Payments Security 􀂃 Storage / recovery 􀂃 Health cards
Deliverable Task C3 'Smart
Cards' 16 by 110 final
􀂃 Medical Payments
medical history
􀂃 Storage Information
Donor
Other 􀂃 Hotel Reservations
􀂃 Payroll Payments
staff
􀂃 payment via TV
􀂃 money transfers from person
a person
􀂃 Program sustainability
and service (eg
prizes)
􀂃 micro (eg sites
parking, phone calls,
etc.)
􀂃 Information / background
staff
􀂃 Academic
Information / Background
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 250
􀂃 Storage Personal
Information
􀂃 rental Archives
cars
􀂃 Staff profile (eg
preferences for
service project
customers)
􀂃 Express check in / out
􀂃 Access Club House
Airport
(Lounge) / room
Departure
􀂃 room in Keys
hotel
􀂃 Internet Access
􀂃 Access to buildings
􀂃 Access Networks
􀂃 Keys Rental
Car
􀂃 Program
Frequent
traveler
􀂃 Card
diatirisimot
itas &
Service
reviews
(Loyalty cards)
Deliverable Task C3 'Smart
Cards' 17 by 110 final
2.5 Safety and Benefits
􀂃 A typical tolerance to malicious manipulation (tamper-resistant)
􀂃 can detect and react to malicious manipulation (tamper-proof)
􀂃 Ensomatonoun the rapid developments in semiconductor technology,
enabling continuous improvement of the characteristic
􀂃 The majority are reprogrammable
􀂃 feature calculation capabilities and operations (computing &
calculating)
􀂃 feature logic and memory circuits
􀂃 process data and store information
􀂃 They can compare and manage complex information
􀂃 usually used for high security applications (high security)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 251
􀂃 allow off-line verification of data, as opposed to a card with magnetic
stripe
􀂃 They option of what information the card can be accessed by different
applications
􀂃 enable high security, and this is due to the complex cryptographic
techniques used to
decode the "movement" of information between smart cards and other
devices
􀂃 offer high storage capacity information
􀂃 m__________e is compatible portable electronics 􀂃 Προσφέρουν
􀂃 Reducing financial crime
􀂃 efficiency and effectiveness of sales
Business
Customer
Deliverable Task C3 'Smart
Cards' 18 by 110 final
3 Presentation of Existing Conditions
3.1 The Situation in Europe
For the European Union, Smart Cards are one of the
priorities of the eEurope Action Plan under development
safe and fast networks and strengthening of electronic services and
e-business.
A recent survey carried out by the company EDS Days
and with the cooperation of the trailblazer 10 eEurope Smart Card
Charter aimed
to capture and study the applications of smart cards in electronic
Governance cards - G2G (government-to-government), G2B
(government-tobusiness),
G2C (government-to-citizens) and e-Procurement in the public sector
showed that applications of smart cards implemented in Europe on
the following sections:
􀀹 Electronic signature
Identification 􀀹 staff (civil servants, health professionals,
etc.)
􀀹 Identification of companies and public administration
agencies
Electronic identity 􀀹 citizens
Electronic identity 􀀹 members
􀀹 support services to relatively small areas (public transport,
􀀹 recreation, etc.)
Specifically, the survey identified the following applications for each
member country
European Union.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 252
Country Project Name Description / Comments
Austria citizen card
(Bürgerkarte)
Common framework social security and other citizen
identity cards
belpic BELgian Personal Identity Card for citizens and civil
servants
Belgium
sis Social security card
fineid Finnish identity cards
satakunka Macro-pilot covering health and social security information.
Finland
North karelian
hospital district
Management and exchange of health data (FINEID card
used for authentication)
titre fondateur Common basis for electronic identity cards, potentially
covering: personal identity card, driver licence, other
specific cards
teleprocedures Tax teleprocedures
France
sesam vitale Identification of insured persons (social security)
Deliverable Task C3 'Smart
Card 19 of 110 final
Country Project Name Description / Comments
gip cps Health Professional Card s
adep A group of small and mid-sized towns to test usage of eprocedures
with the citizen and with the administrations
media @ komm Initiative for the development of e-procedures in
townships
and urban districts. The cities of Bremen, Nürnberg and
Esslingen are pilots.
Land of Baden-
Württenberg
Multifunctional cards to citizen and public e-procurement
Germany
beschaffungsamt e-procurement for administrations
Ireland public services
broker
Secure access to public services.
ieic Italian Electronic Identity Card
aes Advanced Electronic Signature based on IEIC
Italy
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 253
msc Multi Services organisation Card based on IEIC
Netherlands pki overheid Government PKI for civil servants
- Digital Signature
- Health project (under development)
Norway
- National betting system (under development)
Spain national PKI Usage of smart cards in public sector's PKI based
applications: identification / authentication + e-sign for civil
servants.
Sweden ID CARD Multipurpose identity card
Internal use within the Administration: National Taxboard,
Social Insurance Board
e-tendering System to allow UK departments to exchange tendering
information (pilot stage)
dfee Connections card: a scheme for 16-19 year olds in
education, covering attendance monitoring, access to
facilities, credits, etc.
U.K.
SMARTCITIES Local services with the City of Southampton as first pilot
Source: study EDS - TA 10
This study suggests that the underlying problems - problems that have
arisen
the design and implementation of these projects may u948
summarized as follows:
􀀹 lack of equipment (card reader) from individuals and small companies
an obstacle in implementing applications G2C
􀀹 the normal composition of jobs (workstations) is not sufficient
and the number of users believe that the additional equipment required is

relatively expensive compared to expected results from the use of


smart cards.
Deliverable Task C3 'Smart
Cards' 20 of 110 final
􀀹 that the number of users feel that technology of smart cards
are not ripe and there is likely to change in the near future.
􀀹 that some categories of workers - users consider that the use of
Smart cards represent a shift in work habits and fear
imposition of additional audits by national authorities to implement smart
cards.
But in all cases the projects were studied, showed that the smart
cards are accepted and used effectively after the period
adjustment.
It is a general view that the evolution and effectiveness of applications
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 254
smart cards in Europe depends on the standards supported the
content of applications and the ability to use one card for
many different uses (multi-application usage).
On the institutional context of two issues mentioned:
1. The protection of personal data under the national legislation and
European Directive 97/66/EC
2. The electronic signature based on national legislation and European
Directive 1999/93/EC
Finally, the study shows that smart card applications in electronics
Governance will focus mainly on health cards and social security
as well as identification cards to citizens and public servants with
electronic signature capabilities.
The picture on the current status of smart cards in Europe
given in-depth study "Open Smart Card Infrastructure for Europe
prepared by the working groups worked within the eEurope
Smart Card Charter. This study includes detailed mapping and
evaluation of projects implemented to date in Europe, America
and Japan as well as guidelines and standards for development
interoperable smart card applications by sector. Here's the list
Contents of the study «Open Smart Card Infrastructure for Europe",
which is
available on the website of the eEurope Smart Card Charter
www.eeuropesmartcards.
org.
Volume Number and
Title
PART
NUMBER
PART TITLE AND SUBTITLE
Part 1-1 eGovernment white paper on smart card applications and
evolution .- Part 1 Analysis of developments
Vol 1 Application White
papers
Part 1-2 eGovernment white paper on smart card applications and
evolution .- Part 2 Survey
Deliverable Task C3 'Smart
Cards 21 to 110 final
Part 1-3 eGovernment white paper on smart card applications and
evolution .- Part 3: Survey on secure smart card based
eGovernment Applications
Part 2-1 ePayments .- Part 1: Migration of EMV / CEPs, status and
roll-out plans
o o EMV Migration Synchronization in Europe
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 255
o o e-Purse situation in Europe
o o EMV Country summary (EXCEL sheet)
oo EMV Migration (pointer to web-based information)
Part 2-2 ePayments .- Part2: Blueprint on Mobile Payments
Part 2-3 ePayments .- Part 3: Mobile payment business requirements
Part 3 Public transport: White paper on smart card transport
applications and evolution incl. Spreadsheet for Annex B
Part 4 Healthcare: White paper on Smart Card evolution in the
Health area
Vol 2 User
Requirements
Part 1 Best practice manual incl. Requirements for cost
transparency and Privacy code of conduct for multi
application IAS
Part 1 Contextual and conceptual modelling
Part 2 Requirements for IAS functional interoperability
Part 3 Recommendation for IOP specifications
Vol 3 Global IAS
interoperability
Framework
Part 4 Deployment strategies for generic IAS
Part 1 Electronic Identity White Paper
Part 2 Study on legal issues in relation to the use of public ID
(Electronic Identity)
Part 3 Bionorm. Need for Specifications and Standardisation to
Achieve Interoperability in the Field of Smart Cards and
Biometrics
Part 4 Requirements Specification. Visual ID on smart card used
as a travel document
Part 5 Whitepaper on PKI Requirements
Part 6 PKI Pre-inventory Survey Report
Vol 4 Public
electronic identity,
Electronic signature
and PKI
Part 7 Network Authentication Module for internet End-users -
Electronic Signature (NAME-ES)
Deliverable Task C3 'Smart
Cards' 22 by 110 final
Part 8 Requirements of terminal manufacturers and convergence
model for multiplatform access to services
Part 9 Telecom operators' requirements
Part 1 Legal framework for multi-application cards and systems
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 256
Part 2 Current and future business models for multi-application
systems
Part 3 Basic Multi-application technologies for cards and systems
Part 4 MAS prerequisites: Core Cross-Sectorial Architecture for
Interoperable Multiapplication Systems
Vol 5 Multiapplications
Part 5 Integration of multi-application systems
Part 1 White paper on requirements for the interoperability of
Contactless Cards
Part 2 White paper on Security and Threat Evaluation relating to
Contactless Cards
Part 3 White paper on the Future Roadmap for Contactless Cards
(Draft to be available 10 December)
Part 4 White paper on the Certification of Contactless Cards
Vol 6 Contactless
Technology
Part 5 Field Trials Specifications and Guidelines for Contactless
Card Systems
Vol 7 Generalised
Card Reader
Part 1 Generalised Card Reader (relation to FINREAD and
Embedded FINREAD CWAs)
Part 1 The Application of Attack Potential to Smart Cards
(Common Criteria Supporting Document)
Part 2 The Application of CC to Integrated Circuits (Common
Criteria Supporting Document)
Part 3 ETR-lite for Composition (Common Criteria Supporting
Document)
Part 4 ETR-lite for composition: Annex A Composite smart card
evaluation: Recommended best practice (Common Criteria
Supporting Document)
Part 5 ST-lite (Common Criteria Supporting Document)
Vol 8 Security &
Protection profiles
Part 6 Guidance for Smart Card Evaluation (Common Criteria
Supporting Document)
Deliverable Task C3 'Smart
Cards' 23 by 110 final
Vol 9 Referenced
standards
Executive Summaries and online pointer to
􀂃 􀂃 referenced EESSI standards and specifications
- Area K "Application Interface for smart cards used as
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 257
secure signature creation devices WD1v012Draft
􀂃 􀂃 Summary and references to CEN / ISSS Workshop
Extended User Requirements Information.
􀂃 􀂃 Summary and references to CEN / ISSS Workshop
Fastest
􀂃 􀂃 Summary and references to FINREAD CWAs and
CEN / ISSS Workshop Embedded FINREAD Business
Plan
􀂃 􀂃 Japan's NICSS specifications
o o Prerequisites
o o Framework Scheme Overview
o o Registration Operation Interface
o o Operation System Interface
o o Card Adapter Interface
o o Card Interface Specification
o o RW Card Communication Interface
o o Operation Guideline
o o Contract & Covenants Example
􀂃 􀂃 USA GSC Specification NISTIR 6887/GSC-IS
(V2.0)
Vol 10 Glossary Part 1 eESC Glossary of Smart Card Terms and
acronyms (Excel)
Part 1 eEpoch Management Summary (DOW)
eEpoch Announcement Press Release
Vol.11Implementation
and deployment
demonstrators
Part 2 Netc @ rds Management Summary (Presentation)
Netc @ rds Announcement Press Release
Annex A eEurope Smart Card Charter Brochure
Annex B Clustering information on smart card projects
Annex C Weblinks pointers and summary information on selected
standards
forums and workshops relevant to smart cards
Deliverable Task C3 'Smart
Cards' 24 by 110 final
3.2 Smart Cards in Greece
The first pilot smart card applications have emerged in our country
1988 in the health sector. Since then various applications, mainly in
research - a pilot environment and the use of smart cards
Telecommunications - mobile phones and pay phones. The
important uses and applications of smart cards in our country are:
Telecommunication Cards
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 258
• mobile phone cards SIM - a few million
• OTE - Prepaid cards (Memory) - Tens of millions
Banking Cards
• Several banks - Smart Card as Security Application Modules -
Tens of thousands
• E-Wallet National Bank - Several hundred
• E-Wallet Cafe and National Commercial Bank - Some
hundreds
• National Bank - Project IST Starfish - A few dozen
Health Cards, Social Security
• Public AMAROUSIOU (implementation of the European project
Cardlink) -
Thousands
• EODEAP (Insurer) - Several thousand
• Red Cross - card diabetics - Several hundred
• Hospital of Nice - card heart disease - Several hundred
Loyalty Card customer
• Ethnocarta - Show (loyalty) - Tens of thousands
• Shopping VETO (loyalty) - Several thousand
Various applications
• ASE - ASYK (PKI - digital signatures) - Several thousand
• TEO - Attiki Odos - TILEKARTES (prepaid) - Tens chiliadesKarta
toll, public transport and parking in
Thessaloniki (implementation of the European Project ADEPT II) - Some
hundreds
Deliverable Task C3 'Smart
Cards' 25 by 110 final
• multifunction card for payment of transport services, services
Health and personalized access to information in
Thessaloniki (implementation of the European project DISTINCT) - Some

hundreds
• Company petrailoeidon distribution (fleet card) - Tens of thousands
• Secure cargo weighing AGET - Several hundred
3.3 Institutional Framework
3.3.1 Institutional framework 'directly' to 'smart cards'
Smart cards, given the recent emergence as a 'medium of exchange, but
and the emerging diversity in their use and applications
, does not have (at least yet), 'unchanged object' of a
regulation, both national and European level.
Feature is that the phrase 'Smart Cards' to our national
law occurs only once (according to data from the 'Bank Legal
Information, the Athens Bar Association, www.dsanet.gr) and that the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 259
Ministry
Decisions. 3227/31-1-2002 (FEK 23/13-02-02) of the Ministry of Foreign
Affairs, on
Publication of Decision 1382/2001 of the UN Security Council "as
product forms (conditional) to the embargo (sanctions) against Iraq!
Of course, smart cards (smart cards) referred to in many
'Preparatory texts' (ie texts not immediately mandatory)
European Union, such as announcements, resolutions,
recommendations,
opinions, etc., particularly in the context of the approved action plans
eEurope2002 (and, more recently, eEurope2005) which reflected the
intention
promotion and adoption of the medium as a key factor for
achieve the much sought safety in the "Information Society".
Also, identification, technical specifications, and creating relevant
'Technical standards' by standardization bodies (eg ETSI, CEN, ISO,
ITU,
etc.) or by various private consortiums (eg EMVCo)-specific
uses or otherwise, are not alone, institutional framework, the extent
however, there are no relevant laws, regulations or administrative
provisions that refer or refer them! (Since the 'standard'
even been published by 'approved bodies', not-from
themselves, required!)
3.3.2 Institutional framework related (indirectly) with "smart cards"
On the other hand, at least at European level (to the extent
in line with what our national legislation and national) have
establish a set of provisions (mainly European Parliament Directives
and the Council) on issues of specific applications
of 'smart cards'.
Thus, depending on the type of application that uses a smart card
can be made and features the following instruments:
Deliverable Task C3 'Smart
Cards' 26 by 110 final
􀂾 Smart card as a 'device for conditional access' (in
'Protected services')
- Directive 98/84/EC "on the legal protection of services based
or consisting of, conditional access "
With this directive, measures against illicit devices
providing unauthorized access to protected services, and
will be protected (art. 3 § 2) 'the free movement of apparatus for
conditional access'.
The term "access device terms, given (No. 2, approx c) the following
definition:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 260
"Any equipment or software designed or adapted to
enabling access to a service in an intelligible form "and apparently
finds application in many cases the smart card is used as
(Part) of such equipment eg for decoding satellite television
labels for access to the network GSM (mobile phone), even
access to specific telematics services, such as system
'HERMES' the Athens Stock Exchange using smart cards
for identification of users!
􀂾 Smart Card as (part of) the 'safe-creation device
(E) signature-
- Directive 99/93/EC "on a Community framework for electronic
signatures
With this directive (which has been incorporated into our national law by
presidential decree
150/2001), although not mentioned by name in 'smart cards', they offer
the basic
standards to be met by operators (not only) of private keys
("Signature-creation data ') end-users to ensure
the required level of safety to create (and if there
other conditions, such as the issue 'qualified certificates')
'Qualified electronic signature' (n 5 § 1 of the Directive, or 3 § 1 of the
Greek PD), which enjoys absolute equivalence to the corresponding
hand
signature.
Although as 'bodies of signature creation data' can be
use other means (eg USB tokens), the use of 'smart card'
(Which will keep the 'technical' and 'Standards' issued by the
European standardization organizations and specialize in custom-
relative 'epitropis'-the provisions of that Directive) as a key safe
means for storing private keys and an 'accredited
signatures', is given! (Due to those mentioned above for
approved action plan 'eEurope2005').
􀂾 Smart Card as' electronic purse 'or, failing that, the' operator
credits'
Although specific applications of smart cards are already used in
pilot programs (eg BalcanCard) or practical applications (eg
known, calling cards, the prepaid units), but not yet
Deliverable Task C3 'Smart
Cards' 27 by 110 final
relevant legal framework and related (evidentiary) contracts are governed
entirely
the principle of freedom of contract "where users and providers
related services according to their own data and evidence
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 261
operation of the equipment they use!
Under the directive expected "for the distance marketing
consumer financial services "(see No. 11 of the Preamble
Directive, the e-commerce) are likely to settle on
issues and they are put some 'safety standards' in 'in' with
used for them.
However, it is assumed that the extent appropriate, apply for the 'smart
Cards any provisions governing the use and operation of analogue
instruments
payment '(eg' Decision of the Council on 28.5.2001
combating fraud and counterfeiting of means of payment
Non-cash ', OJ L 149, 2.6.2001, p. 1)
3.3.3 Other provisions indirectly related to "smart cards"
Other important provisions-related, but mainly how
development of applications using 'smart cards' and not directly
they themselves are numerous and apply as appropriate. For example:
􀀹 Directives 95/46/EC and 97/66/EC on data protection
nature
􀀹 Directive 97/7/EC on consumer protection in distance
contracts
􀀹 00/31/EK Directive on electronic commerce.
Deliverable Task C3 'Smart
Cards' 28 by 110 final
4 Working Group Activities
The Working Group held four public consultation:
􀀹 1st Public Consultation "Smart Cards in Public Administration
􀀹 2nd Public Consultation "Smart Cards - Buy & Research
􀀹 3rd Public Consultation - "Smart Cards & Banking -
Telecommunications'
􀀹 4th Public Consultation - 'All stakeholders'
Furthermore, requested by the representatives of actors to fill
questionnaire for surveying services, products or applications
Smart cards offer, have implemented pilot or operating
production and future plans and views on technology
Smart Cards.
The sections below present the topics, participants,
conclusions of public consultation and the information obtained

4.2 2nd Public Consultation "Smart Cards - Buy & Research


The 2nd Public Consultation on Smart Cards held in
Hotel Holliday Inn, Cosmos Hall B Wednesday, October 2, 2002,
3:00 pm - 7:00 pm Invited representatives of universities, research
centers,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 262
IT companies, consultants, manufacturers
cards and related equipment and service companies using
Smart Cards.
The 2nd Public Consultation had three objectives:
1. to illustrate the various approaches to smart card applications
considered or implemented in our country
2. to identify the critical factors of development applications, "Smart
Card '
3. to discuss possible areas of cooperation - synergy between the
involved
bodies.
Deliverable Task C3 'Smart
Cards 33 of 110 final
4.2.1 Program
14:30 to 15:00 Arrival
15:00 to 15:15
Introduction by the chairman of the event, Prof. P. Georgiadis
Moderator Group C3
Greetings from GRNET
15:15 to 15:25
Presentation Goals Working Smart Card - Plan
Work and Work to date, B. Karounos - Rapporteur Group
C3
15:25 to 15:40
Achievements and prospects of the eEurope - Smart Cards Charter,
St. Karapetsas - Moderator Group C3
15:40 to 16:10
Presentations by Companies - Systems Integrators
• TRUTH SA, B. Mizara
• Datamed - Group ALTEC,
• Mellon Technologies, Amsterdam. Angelopoulos
____________16: 10 - 16:40
Presentations by Industry
• INTRACOM
• Group A. Angelopoulos Angelopoulos-
• ARCADIA TECHNOLOGIES SA, I. Kouroglou
16:40 to 17:00 Coffee Break
17:00 to 17:30
Presentations by companies - Service Providers
• ASYK SA, K. Karanasios
• LYKOS GROUP, A cheese pieces
• HELLASNET S.A. (FORTHNET Group), P. Ioannidis
• ADACOM S.A, P. Vasiliadis
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 263
• Institutional Framework, Ch Sioulas, MSW
17:30 to 17:40
Presentations by Companies - Software Providers
• Microsoft Hellas
17:40 to 18:30
Presentations of Research and Development
• Biomedical Engineering Laboratory, NTUA
• Computer Systems Laboratory, Univ. Patras, D. Serpanos
• INTRACOM
• TRUTH SA
• Mellon Technologies
Deliverable Task C3 'Smart
Cards 34 110 final
• General Secretariat for Research and Technology
18:30 to 19:00 Discussion and conclusions Coordinator - P. Georgiadis
4.2.2 Participants
ENTITY NAME COMPANY-E-MAIL

4.2.3 Conclusions
Presentations by representatives of different companies and
research institutions showed that the smart card applications in real
production environment is very low compared with the hitherto
participation of companies and academics - research institutes
schetikaprogrammata research and development of the General
Secretariat for Research and Development and the European Union. As
key issues impeding the development of applications for smart cards in
our country, reported the following:
• High cost of development applications in relation to expected benefits -
high cost of terminal, non-cooperation between various agencies with
similar
applications.
• Delay in adoption of technology by public bodies in particular -
inadequate infrastructure
• Not familiar with the technology
• Lack of adequate standards on the part of the wider public sector
• Lack of mechanism for the transfer of results and know-how
research in production from all the attendees noted the need to create
frameworks for cooperation and search for new alternative business
models from large users - government bodies, semi-public Deliverable
Task C3 "Smart Cards" 38 110 final and the private sector to address
issues of cost
necessary infrastructure, and promote interoperability and infrastructure
applications. It also noted the need for our country a body (not profit) to
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 264
promote European - International standards and guidelines development
of interoperable applications, supporting both the public and the private
sector in planning and implementing smart card applications . A
significant number of attendees agreed to contribute financially to the
creation and operation of that institution.
4.2.4 Results Questionnaires Imprint Existing Situation
The Questionnaire for consultation on smart cards with the "Buy &
Research "were sent to 50 institutions of public and private partnerships
participate in research and development of the European Union, the
three companies manufacture cards in our country, in universities,
technical institutes and research centers participating in the National
Network for Research and Technology as well as links to IT Companies
in Greece and consulting firm to notify its members them.
Questionnaires completed by 24 institutions (see Annex - section
7.4.1). The table below shows the number of bodies
completed the questionnaire, depending on the type of business
activity.
Body Type * Number of responses
AEI Research Laboratory 4
8 Software Company
Consulting Firm 3
System Integrator 10
Company diathesisKarton 4
Unit production Karton3
Other 2
* Many organizations say more than one kind of business and thus
included in the above
one type of business
Deliverable Task C3 'Smart
Cards 39 110 final
The following table shows the entities by type
business activity and whether they provide or plan to develop products -
services smart card, respectively.
Type of Institution Number of agencies providing products -
Services Number of players who design products -
services;
Research Laboratory University 4 4
Software Company 5 8
Company Advisors 2 3
System Integrator 6 10
Company diathesisKarton 4 4
Card Production Unit 2 3
Other 1 2
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 265
* Includes entities that provide products - services and plan to continue
developing the business of
The completed questionnaires were relatively weak. Of the 20 questions
only 6 completed a sufficient number of operators and provide practical
information and specialization are:
Question 1: Describe the services, products or smart card applications
you deliver or offer.
The following responses were specific to each organization:
ADACOM S.A
􀀹 SIM Cards - SIM APPLICATION TOOLKITS CARDS
􀀹 EMV SMART CARDS
􀀹 SMART CARD FOR E-GOVERNMENT APPLICATIONS (Electronic
Identity Card, Health Card, Digital Signature Card
􀀹 SMART CARDS FOR LOYALTY SHEMES
(Expertnet), ICCS-NTUA
Services and smart card applications have been implemented at pilot
level in
part of the project La Mer. The project aims to provide a
Deliverable Task C3 'Smart
Cards' 40 of 110 final
practice-a mechanism for the development of electronic commerce in
developing countries to present a scalable business
experiment, which aims to secure interconnection of the chambers
developing countries of Southeast Europe, whereas
technical, legal and social issues positions and tactics.
The La Mer is determined by the use of smart cards in the infrastructure
of trusted third entities to provide additional privacy;
confidentiality. Smart cards used for secure authentication
access, storage media and multi-license applications
electronic commerce.
NETMODE-ICCS-NTUA
􀀹 Develop pilot management u921 Medical History CSP using electronic
cards.
􀀹 System Electronic Health Card for Diabetics and European
Research Project AIM - DIABCARD.
􀀹 European Research Programme for Health Telematics - Cardlink II.
􀀹 Participation in the Concerted Action EUROCARDS Project AIM
GREEK ORGANIZING (HOTech)
Study 􀀹 mask card Health, safety and production data
personalization software components and use the card
􀀹 data encryption software for the production of phonecards
using SAM
􀀹 management software to access and record keeping visitors using
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 266
visitor card
􀀹 Develop an integrated monitoring system of production
connection with the machines, managing data security and
access to premises and personnel work, computerization of
quality assurance, information and statistics reports
Evaluation and costing
ID SYSTEMS CORPORATION
CONSTRUCTION - TRADE ELECTRONIC - Software APPLICATIONS
FOR CARDS WITH
CHIP - MAGNITIKIS Movie - Microprocessor (M-CPU) - Wireless card
(RFID)
ARCADIA TECHNOLOGIES SA
Production:
􀀹 Chip module cards,
Deliverable Task C3 'Smart
Cards' 41 by 110 final
􀀹 Prepaid scratch off cards,
􀀹 Access cards,
􀀹 Loyalty cards,
􀀹 Electronic purse cards etc.
LYKOS GROUP
􀀹 Cards recharge mobile
􀀹 Banking cards visa classic / gold / electron - mastercard - maestro
􀀹 Card loyalty: smart club shell
Cards 􀀹 internet connection
􀀹 All types of membership cards (thermal, embossing, inkjet printed -
encoding
of magnetic stripe - printing of barcodes, pictures etc)
Mellon Technologies
􀀹 Implementation of the European project CARDLINK II - Medical card -
Medical
File - Municipality of Maroussi
􀀹 Implement access control system in the harbor DEPOT using
contactless smart card (contactless) - Thessaloniki Port Authority (Port
Authority
Thessaloniki)
􀀹 Supply prepaid smart card, smart readers
cards and library (DLL) to integrate the card system
in automated fare collection system of toll - TEO (National Fund
Road)
􀀹 software development, supply terminals and smart cards for
loyalty card stores PRESENTATION - Cooperation with
Ethnocarta
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 267
􀀹 supply smart card readers and application development
personalization for the implementation of medical records on smart cards
-
Working with DATAMED - EDOEAP
􀀹 Installing PKI infrastructure with the capacity to store
ensomato__________meni
private keys and certificates on smart cards - ASYK
􀀹 card purchase of fuel for large oil companies. Development
software, data capture, procurement cards and terminals, personalization

Card - FLEET CARD


Pilot program 􀀹 Electronic wallet subsidized by the EU
- OPERA
Microsoft Hellas
Deliverable Task C3 'Smart
Cards 42 110 final
􀀹 PKI applications
􀀹 e-banking,
􀀹 development libraries Smart cards,
􀀹 Interoperability with Certificate Server - PKI, which is included in
platform Windows &. NET Server
UNIVERSITY OF THE AEGEAN
PKI - RSA smart cards
ENVIRONMENTAL CORPORATION
Construction - marketing telephone cards with chip, smart cards with
processors,
memory, magnetic tape and scratch area for telecom operators.
Systema Technologies S.A.
􀀹 Provision and Planning Smart Cards and the Kartanagnoston
HID
􀀹 Integrated Security Systems to store biometric
data (iris eye, fingerprints) on smart cards
Secure physical access
Communication Networks Laboratory, Department of Computer Science
University
Athens
Using Smart Cards in the program EURO-CITI,
funded by the European Union. The program involves
Elections for local issues and provide
advisory services to citizens. Users of this product is
Local authorities and municipalities to promote electronic democracy and
the direct involvement of citizens in various aspects of their region.
ASYK Inc. (Systems Development and Support
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 268
KEFALAIGORAS SA)
􀀹 development of public key infrastructure (PKI) and services
certification (CA services) under PD 150/2001
􀀹 Complete Digital Certification Services (PKI / CA Services)
the ASYK A.E. system Hermes Athens Stock Exchange
(ASE)
ATMEL HELLAS A.E.
Deliverable Task C3 'Smart
Cards 43 of 110 final
The company has integrated circuits for all applications, smart
cards. These products are produced in factories of the company in the
U.S.
France and England.
DATAMED A.E.
􀀹 X / / carta: Smart Card Health, manages the laptop
documentation to provide high quality health services in
point of care (Point-of-care). Accompanied by Platform
IT solutions tailored to the needs of each
business sector.
􀀹 Smart card health of European travelers. R & D project of the EU at
DATAMED which developed the smart card subsystem health.
topos communications sa
Smart card system for drivers ILPAP. Within
ILPAP telematics system (a system in normal
function) has implemented a pilot working hours of drivers with
Readers smart cards installed in 5 vehicles and a depot. The application
aims to record hours of driving time from beginning to shift the vehicle or
depot, as well as recording breaks and ending time of the shift. Apart
from recording the time the application is running as well use the card for
handling data from the database of the telematics system, in which
interfaces the reader of the reader depot of the vehicle where the
computer is informed of the vehicle.
TRUTH Inc.
Consultancy:
􀀹 Technical and Business Planning Implementation and enforcement
Smart card systems
􀀹 Consultant project management smart cards
Pilot Applications:
􀀹 Electronic toll payment
􀀹 Electronic payment in Public Transportation
Electronic payment 􀀹 Parking
􀀹 Access Control in parking
􀀹 Vehicle Zone Access control
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 269
􀀹 Card Driver
􀀹 Multi-application Smart Card
Deliverable Task C3 'Smart
Cards 44 of 110 final
􀀹 Application User Related Information (URI) for customization user
interface
according to profile owner
Product Development: Multi-application smart card for hotels (Smart
Hotel)
Question 9: Provide research - pilot projects, services, products or smart
card applications that you plan to develop and provide.
The range of applications reported by the various stakeholders on the
following:
􀀹 Installation complete development of PKI countries
South East Europe with the use of smart cards u941
􀀹 Incorporation services smart card applications in the field of
telemedicine
􀀹 Electronic signature - data security - identifying user
Jump to Environment 􀀹 Contact less Microprocessor Cards current
smart card applications
􀀹 system for access - security control, bonus system
􀀹 e-payment energy savers, electronic purse, medical card, electronic
ticket for public transport
􀀹 SIM Cards / access chip cards / electronic purse / health cards / loyalty
cards etc
􀀹 EMV CREDIT CARDS
Various 􀀹 SMART CARDS APPLICATIONS, eg
􀀹 Smart Campus Cards to first pilot in Universities
􀀹 Loyalty-Access Control Smart Cards
􀀹 Microsoft is implementing major research programs in the Smart
Cards (total R & D investment over 5 billion USD - PKI applications,
ebanking,
Full support of Smart Card technology to all products
􀀹 wireless card, construction and research on medical card Karga
identity
driver's license.
􀀹 transport applications
􀀹 Applications for m-commerce
􀀹 Integrated circuits:
- GSM
- Banking Applications
- Public Key Infrastructure (PKI)
- Application ID (identity cards, health cards, etc.)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 270
- Transport (transportation)
Deliverable Task C3 'Smart
Cards' 45 of 110 final
Question 10: Do you see a demand for such services and
applications from citizens and administration "
The answer is affirmative, and particularly related to categories of
operators and applications, including:
• Telecommunications Companies
• Public Agencies
• Credit Institutions
• Retail Companies
• Safety - Access Management
• Fast & Secure Transactions
• Loyalty Schemes
• Medical applications (patient history)
• Wallet
• Tourist units - access control
• Large businesses
• Visa cards
• Identification cards
• Cards for tolls
• Biometrics
• Multi Application cards
• Authentication, secure e-mail, web-based applications
• Sports Facilities
• SYZEFXIS - Sub 9
Question 16: Indicate any problems you find that
prevent adequate dissemination and use of these services and
applications by end users.
The main issues - the problems reported are the following:
• High cost compared to the magnetic card
• Additional cost of card-reader as they are incorporated in
more PCs
• Delay in adoption of technology from mainly public bodies
• Lack of information koinoupar Deliverable Task C3 'Smart
Cards 46 110 final
• Economic situation, course of technological development in the country
• Prejudice
• Problems of proper management of personal data
• Inadequate infrastructure
• Not familiar with the technology
• Lack of communication and information
• Inadequate legislation - The PKI infrastructure is not adequate in
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 271
Greece
• Not enough preparation on the part of the wider public sector
• Problems of compatibility of technologies and understanding of
technology
end users
• Cost of terminal non-cooperation between different clients with similar
applications.
• For users: incomplete information, lack of advertising, but
variety of different cards for such applications.
• Distrust in electronic data management
• Uncertainty regarding data loss / theft
• Legal framework
Question 18: Is your agency organized structure or personnel to
necessary expertise to implement or provide services, products or smart
card applications?
The replies are:
Yes: 17
No: 1
No Response: 7
Question 19: "I need to create a scientific - Steering Committee will
monitor and support the implementation of Smart Card projects in our
country;"
The replies are:
Yes: 19
No: 1
No Response: 5
Deliverable Task C3 'Smart
Cards' 47 of 110 final
Add the following comments were received regarding the need for a
scientific - Steering Committee will monitor and support the
implementation of Smart Card projects in our country.
• H committee should be composed of knowledgeable and smart card
has
very good theory - technical training.
• Please note that all the working groups and the forum involved with
any way to work smart cards should be taken seriously what is
happening in the EU to prevent development projects that do not comply
with common European standards.
• The committee should consist of experienced individuals with
experience
and very good technical training on the field of smart cards to
take quick and effective decisions on all relevant issues
and implementation of international standards.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 272
• The existence of science - Steering Committee will be meaningful only
in
When there is a specific timetable and commitment
state for introduction of smart cards in a wide range of applications. In a
this case, the role of the committee will be very important for
identification of appropriate technologies, transfer of experience
other countries and quality standards will be met by
end systems. Issues to be addressed:
- Standardization
- Legal framework
- Awareness
4.3.2 Participants
ENTITY NAME COMPANY-E-MAIL
1. METRO Kasampalis D. dkasabalis@ametro.gr
2. ASPIS BANK Nikos Papageorgiou
3. ABG Card Inc. Bubbles
Dimitris dibou@atekarta.gr
4. Novabank Giannopoulou Christina christina@novabank.gr
5. Winbank Orphanidou Elena orfanidou@winbank.gr
6. Systema
DATA Tsoronis Theodore Thodoris.Tsoronis @ system
a.gr
7. NTUA George Rigopoulos grigop@epu.ntua.gr
8. Commercial Bank Duke Catherine douka.a @ combank.gr
Deliverable Task C3 'Smart
Cards' 49 of 110 final
9. Commercial Bank Tzouras Menelaos
10. National Bank Eleni Spiliopoulou espil@nbg.gr
11. Commercial Bank Kotsikopoulou
Royal kotsikopoulou.v @ combank. gr
12. ABG Card Inc. Komninos Dimitris komninos@atekarta.gr
13. Greek Union
Banks Vasileios Panagiotidis vpanagio@hba.gr
14. Greek Union
Anna Banks Garyfallia hbal@otenet.gr
15. Info-quest Smyrnios Chris xsmyr@quest.gr
16. Panagiotis Ioannidis Hellasnet ioant@hellasnet.gr
17. METRO Simopoulos Anthony asimopoulos@ametro.gr
18. Inform P. Lykos Robust Konstantinos l.nikolopulou @ lycos.gr
19. Inform P. Lykos Nicholas Danos n.danos @ lykos.gr
20. Egnatia Bank Chairs Peter petros.Kareklis @ egnatiaba
nk.gr
21. General Cards Inc. George Maris gmaris@geniki.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 273
22. Winbank Pappou Dimitra pappoud@winbank.gr
23. Commercial Bank Eleni Sotiriou sotiriou.e @ combank.gr
24. Adacom Skiadopoulos Claus vskiadop@adacom.com
25. Inform P. Lykos Nikolopoulou Lina l.nikolopulou @ lycos.gr
26. EFG Eurobank Ergasias Andreas Vlachiotis avlachiotis @
eurobankcards.
gr
27. IDEAL Group Panos Vassiliadis Panos@idealnet.net
28. HSBC Perpinia Julia PersonalBanking.Cards @ hs
bc.gr
29. e-card Papioannou George Georges.Papaioannou @ ecard.
fr
30. Novabank Georgopoulos
Dimitris Dimitris@novabank.gr
31. Novabank Malesovas John MalesoYi@novabank.gr
32. NTUA embittered John gpik@telecom.ntua.gr
Deliverable Task C3 'Smart
Cards 50 110 final
33. Costas Papageorgiou Ethnocarta kpapag@ethnokarta.nbg.gr
34. Cosmote Spiro Magoulas smagoulas@cosmote.gr
35. Cosmote Athena Kollias akollia@cosmote.gr
36. Cosmote Kapsoulakis John jkapsoulak@cosmote.gr
37. Intracom Tzelepis Konstantinos ktzel@intracom.gr
38. Intracom cber@intracom.gr Chris Burson
39. NAMAKO Ritsos Panos ritsos@namako.com
40. Accenture A.E. Taya Andreas andreas.tagios @ accenture.c
om
41. Accenture A.E. Makrystathis
Aristotle
aristotelis.makristathis @ acc
enture.com
4.3.3 Conclusions
Although the participation of representatives from the banking sector was
not significant
there were no presentations by institutional banks or banks
because the design of products - services by using technology
smart card is a high confidence - secrecy. Both
the presentation of the representative of COSMOTE and the remaining
attendees highlighted the contribution of smart card development
new telecommunications and banking products - services and
mobilebanking
as well as security of financial transactions and has
extensive reference to the need for strategic partnerships between
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 274
banks, telecom operators, public transport operators and
public sector. The creation of common infrastructure was identified as a
key
factor in the viability of such products - services.
Finally, there was talk of creating in our country a body (not
profit) to promote European - international standards (EMV), proposed in
prior consultation with market research and a significant number of
attendees agreed on the need for both the project and the financial
contribution for the creation and operation of that institution.
4.3.4 Analysis of Existing Conditions Imprint Questionnaires
The Consultation Questionnaire for Smart Cards with "Banks -
Telecommunications "were sent to 16 agencies were received poorly
completed 3 questionnaires (see Annex - section 7.4.1) which do not
result in usable data for the current situation in the Banking and
Telecommunications. Deliverable Task C3 'Smart Cards' 51 from 110
final
4.4 4th Public Consultation - 'All stakeholders'
The 4th Public Consultation on Smart Cards held in
Hotel Holliday Inn, Cosmos Hall B Wednesday, October 30, 2002,
9:00 a.m. to 2:00 pm Invited the representatives of the bodies were
participate in previous consultations and those who were invited but did
not participate in previous consultations. Also issued a press release to
inform any other interested persons or bodies The 4th Public
Consultation was to present and discuss problems and prospects of
smart cards in various fields of application and final formulation of
strategic proposals of the Working Group for the state .
4.4.2 Participants
ENTITY NAME COMPANY-E-MAIL
1. BULL Tsilagas Costas k.tsigalas @ bull.gr
2. 01 Information Panos Takis tpanos@01p.gr
3. 01 Computer Tsiakaliaris Chris ctsiakal@01p.gr
4. ABC Professional
Services S.A. Karabasi Evangelos vkaraba@abc.gr
5. ABC Professional
Services S.A. Nick Monanteras nmonant@abc.gr
6. Adacom Giaourtopoulos Minas giaourtopoulos@adacom.c
om
7. Adacom Kalimeris Katerina k.kalimeri @ adacom.com
8. AIS tiated Vicky vzomenou@ais.gr
9. ALTEC Garbis Dimitris gard@altec.gr
10. ALTEC Kanavos John gik@altec.gr
11. ALTEC Papadeas Andreas anpa@altec.gr
12. Arcadia Technologies Weyland Lars lweyland@arcadiagrp.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 275
13.
Arcadia Technologies Kouroglou Theodore tkouroglou@arcadiagrp.gr
tkouroglou@sanyo.gr
14. Archetypon Inc. Vatikiotis Dinos dva@archetypon.gr
15. Archetypon Inc. Timmy Tambouris tambouris@archetypon.gr
16. ASPIS Bank Tsavdaridis John tsavdaridis.ioannis @ aspisb
ank.gr
17. ATMEL-Hellas Bournakas John ybournakas@patras.atmel.c
om
18. Business Innovation Saponidou Wisdom sophia@bi.gr
19. Cosmote John Karidis ykaridis@cosmote.gr
20. DATALEX Sgouros Stamatis stamos@datalex.gr
21. Datamed A.E. Billiris Anthony abil@datamed.gr
22. Datamed A.E. Pavlopoulos Sotiris spav@datamed.gr
23. Delta Singular Papastamatiou George gp@delta-inf.gr
24. e-card Papioannou George Georges.Papaioannou @ eParadoteo
Working Group C3 "Smart
Cards' 53 by 110 final
card.fr
25. EFG (e-solutions) Gerosideris Miltos mgerosideris @ esolutions.
gr
26. EFG Eurobank Ergasias Andreas Vlachiotis avlachiotis @
eurobankcards.
gr
27. Expertnet Kaliontzoglou
Alexander
alexandros.kaliontzoglou @
expertnet.gr
28. General Data Business Lessi Alice alessi@gdb.gr
29. Panagiotis Ioannidis Hellasnet ioant@hellasnet.gr
30. HITACHI Moumouris Chris chris.moumouris @ hitachieu.
com
31. Ideal Group Panos Vassiliadis panos@idealnet.net
32. Info-quest Georgios Papadopoulos gpap@info.quest.gr
33. Info-quest Harare George george_chararis @ decision.
quest.gr
34. Inform P. Lykos Konstantinos Lagios k.lagios @ lykos.gr
35. Inform P. Lykos Spyros Manias s.manias @ InformPS.gr
36. Inform P. Lykos Nicholas Danos n.danos @ lykos.gr
37. Nicos Charalambous Informer ncha@informer.gr
38. Infratech Bereris Spyros info@infratec.gr
39. Intracom Corporal Venus afrodite.dekanea @ intraco
m.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 276
40. Intracom Eleftheriou Minos minos.eleftheiou @ intraco
m.gr
41. ITEC Ch Theofanis FanisG@itec.edu
42. KPMG Kyriazoglou John jkyriazoglou@kpmg.gr
43. Lino Media Charikiopoulos Peter pharikiopoulos@lino.gr
44. Master Hellas Delapaschos Athanasios tdel@masterhellas.gr
45. Master Hellas Chatzistamatiou
Theodore tcha@masterhellas.gr
46. MDI Kipiadis Chris ckip@mdi.gr
47. MDM Pagourdakis John mdm@compulink.gr
Deliverable Task C3 'Smart
Cards' 54 of 110 final
48. Mellon Technologies Angelos Angelopoulos a.angelopoulos @
mellon.co
m.gr
49. Mellon Technologies Delaki Panagiotis p.delakos @ mellon.com.gr
50. Mellon Technologies Marco Vala v.marcou @ mellon.com.gr
51. Mellon Technologies Orfanoudaki Alexia a.orfanoudaki @ mellon.co
m.gr
52. Microsoft Hellas Liakos Constantinos kostasl@microsoft.com
53. Microsoft Hellas Dodos George georgedo@microsoft.com
54. Microsoft Hellas Skiathos Maria mariaski@microsoft.com
55. PCS Batoudakis Stavros stavrosb@pcs.gr
56. PCS Penne Spyros spyrosp@pcs.gr
57. Printec A.E. Challak Anthony a.hallak @ printecgroup.co
m
58. Siemens A.E. Nick Houliaras nikolaos.chouliaras @ sieme
ns.gr
59. Space Hellas Mavroidis P rmav@space.gr
60. Space Hellas Tselios Panagiotis ptsel@space.gr
61. Truth S.A. Mizara Claus vmizaras@truth.com.gr
62. Charles Forst Winbank ForstK@winbank.gr
63. EVENING Xeniotou Beatrice veatrikix@yahoo.com
64. ABG Card Inc. Komninos Dimitris komninos@atekarta.gr
65. METRO Simopoulos Anthony asimopoulos@ametro.gr
66. Gen. Secr Social
Insurance Department
Transnational Social
Insurance
Tsamis Friday ptsami@hotmail.com
67. General Cards Inc. George Maris gmaris@geniki.gr
68. PROCEDURE Inc. New Chris info@diadikasia.gr
69. DIAS SA Sidiropoulou
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 277
Panagiota
sidiroyg @ diasinterbank.
com.gr
70. National School Public
Administration apost@ekdd.gr John Apostolakis
71. National Bank of Magadha Claus vmag@nbg.gr
Deliverable Task C3 'Smart
Cards 55 110 final
72. Police Sfendourakis
Constantine sfendour@mopo.gr
73. NTUA embittered John gpik@telecom.ntua.gr
74. Commercial Bank Kotsikopoulou
Basilica
kotsikopoulou.v @ combank
. Gr
75. Commercial Bank Eleni Sotiriou sotiriou.e @ combank.gr
76. Greek Union
Anna Banks Garyfallia hbal@otenet.gr
77. Greek Union
Banks Vasileios Panagiotidis vpanagio@hba.gr
78. NSS General
Registry Catania Stratis sty@statistics.gr
79. C. Vlachopoulos SA Panagiotis Deredinis sales@vlachopoulos.gr
80. KIFKY Sklias Leonidas khykyb@ath.forthnet.gr
81. Loading Vamiedaki Vicky vvam@naftemporiki.gr
82. Panhellenic Federation
Hoteliers Rerres Kyriakos pox@otenet.gr
83. University of Patras Dimitrios Serpanos serpanos@ee.upatras.gr
84. Takis Zarifopoulos
SA Chatzivagias Manolis infoath@zarifopoulos.com
85. TEI Epirus Meletiou G. gmelet@teiep.gr
86. WTR Mylosis Konstantinos milosis@mopo.gr
87. YEN Sakarellou Helen helsak@mail.yen.gr
88. MTT Maravegias
Constantine k.maravegias @ yme.gov.gr
89. Ministry of Development, Secretary Trade Parliaros
Constantine parl@gge.gr
90. Michael Karahalios YPESDDA gskp.ggdd @ syzefxis.gov.g
r
91. YPESDDA Moschonas Chris c.mos @ syzefxis.gov.gr
92. Ministry of the Interior / NGDD /
UNHCR Kingdom John j.vas @ syzefxis.gov.gr
93. Ministry of the Interior / NGDD /
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 278
UNHCR Vlavianos Dimitris d.vla @ syzefxis.gov.gr
94. Ministry of the Interior / NGDD / stop Anthony a.sta @ syzefxis.gov.gr

Deliverable Task C3 'Smart


Cards 56 of 110 final
UNHCR
95. Ministry / NGDE,
Department of Information Emmanuel Drakakis mkd@tee.gr
96. Ministry of Labour &
Social
Insurance, General Secr
Social Insurance
Gravvanis George gravvanis@ggke.gr
97. Garyfalos John ygary@internet.gr
98. Corot Dimitrios
99. Daniel Labrianidis danoplia@yahoo.com
4.4.3 Conclusions
The findings of 4 Consultation on the problems and prospects
smart cards in our country may be summarized as follows:
The use of smart cards is indicated where data portability
The application is essential (or desirable) or the data or applications must

be available in more than one information system or a


need for off line data information upon request or need
increased data security. In all these cases, the smart
cards are the best, safest and most effective means of
processing and data transfer or high availability applications.
It is estimated that smart cards can contribute effectively to:
In 􀀹 secure access to personal - confidential data
􀀹 to inefficient management and dissemination of information
􀀹's dynamic update information in a safe and timely manner
􀀹 coordination procedures between different
􀀹 in improving relations service providers and citizens
􀀹 The fast and efficient service to all citizens
Generally regarded as critical factors retarding the development of
intelligent applications
cards generally indicate the following:
􀀹 lack of infrastructure
􀀹 lack Standards
􀀹 lack of legislative framework
􀀹 high costs
Deliverable Task C3 'Smart
Cards' 57 of 110 final
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 279
􀀹 lack of open operating systems
􀀹 lack of social acceptance
In the discussion mentioned the following items of development
evaluation
technology in our country to some extent weaken the above
factors and create a positive outlook for the development of applications
smart cards in our country.
􀀹 About the lack of infrastructure cited data:
􀀹 Many thousands of POS terminals market
􀀹 Many thousands of telephone terminals
􀀹 All ATM's are delivered with smart card readers and all
banks have plans upgrade of old
􀀹 The new CPU's and keyboards come with built-in readers
About the lack of standards to ensure interoperability
systems, the data cited:
􀀹 Since the late 90s, ISO and the CEN had been reached
standards relating to physical and electrical characteristics of the cards.
􀀹 The effort today is focused on standardizing the technology no longer
«Per se», but applications that use it.
􀀹 The International Organisation for Standardization, the European
Community - eEurope
smart card charter, and many other organizations and agencies agree
that the smart card technology is ready to be used effectively in all
proposed areas.
About the lack of legislative framework, the data cited:
􀀹 The laws have more to do with confidentiality, the
confidentiality of sensitive personal data and protection
consumer.
􀀹 Many European countries have begun to modernize the legislative
framework where necessary (DIR 93/99, Decree 150/2001)
About the high cost compared with alternatives, given the
elements:
􀀹 A higher initial investment costs
􀀹 effectively reduce costs in production processes
operation of the project (management costs, lifetime Card, off line,
multiple applications)
􀀹 Falling prices of cards and equipment
Deliverable Task C3 'Smart
Cards' 58 of 110 final
About the "closed" operating systems cards, cited by
Java card technology and MULTOS
About the problems of acceptance of smart card technology by
specific social groups, estimated that the reactions are almost
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 280
disappeared and are familiar because tilektarton, cash cards, SIM
Finding general acceptance among the attendees is that maturity
The market is the only critical factor for the development and success
works today. Specifically, the maturity in the formulation of necessary
partnerships to meet the various technical issues as
a very small number of strains possessing the required knowledge and
well as the use of international / European standards.
Deliverable Task C3 'Smart
Cards 59 110 final

5 Conclusions and Recommendations Strategy


5.1 General axles (Proposals for the state)
Smart cards are selected worldwide as a safe place infrastructure
security of information systems, particularly as a means of access
open networks. Branches of banks and mobile operators have
invest invest billions of euros and new users are
Organizations Mass Communications and the Public Sector for a number

applications.
In Europe and the U.S. and Japan, the responsible government agencies

implement large-scale projects with smart cards and promote research


and
similar development in complementary technologies such as biometrics.
In Greece, apart from the telecom operators have made massive
investments. Indeed, the success of calling cards to Greece during the
last decade has led to the construction of three factories which
look at emerging markets.
H Working Group of e-business forum, the Ministry of Development, he
managed to
together for the first time all stakeholders-users,
researchers and suppliers of smart cards in the media and
exchange views.
The Working Group proposed unanimously to continue this effort
through:
1. The creation of a non-profit organization that Smart Cards
funded by private and public sectors. The purpose of this
group is to elaborate issues:
􀀹 staff training in these technologies together
academic institutions
􀀹 Promotion of Research and Development
􀀹 ensure the legal and institutional framework
line with the European
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 281
􀀹 ensure interoperability of various infrastructure
branches
􀀹 exploring joint investment in various sectors
􀀹 alignment with European initiatives as
developed after publication of the Open Smart Infrastructure
Cards for Europe as part of the initiative e-Europe.
􀀹 The effort to promote solutions to neighborhood
2. Organizing Greek Conference (possibly exposure products
and applications) smart cards that will be repeated annually.
3. To prepare a proposal Greek Research Roadmapping
Project, probably within the upcoming project of e-business
GSRT. The project must include all players in the Greek
Deliverable Task C3 'Smart
Cards' 60 of 110 final
Market (Academic & Research Institutes, Industries and cards
readers, software companies, consultants). Objectives of the project will
must be:
􀀹 Smart cards technology foresight for the next 5 years
􀀹 Smart cards business development foresight for the next 5 years
􀀹 Recognition needs to search for the development of Greek
Smart Card Industry
􀀹 Identify infrastructure needs and structures to support
Entrepreneurship in Greek industry smart card
􀀹 Determination of measures to meet these needs.
􀀹 Pilot efforts to develop technology and applications for
Validation of these results
5.1.1 Suggestions for Public Sector
The first meeting of the Working Group concerning the Public Sector
attended by representatives of 8 ministries and agencies. There is
interest
for this technology and lack of familiarity of users but also
technology risk wasting resources to study and develop separate
systems uncooperative or duplication. It is characteristic that the cards
tolls Attica Road and National Road Fund do not cooperate.
The proposal to create a body to coordinate the development of
infrastructure and issuing the cards can prevent such unnecessary
wastage. At the same time can be created for this purpose - in the
institution - a commission for the purpose only in the public sector.
Already at the European level - and acceding countries - are well
coordination of such initiatives: The Porvoo Group which brings together
15 countries
and aims to trans-European Electronic Identity, aided by
European Commission project eEpoch, initiative eEurope Smart Cards
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 282
and other
dealing with specific applications such as E-111 card, etc.
The proposed body would ensure that no Greek involvement and
involvement in all initiatives and antiresonance
between these initiatives. In particular there is a participation
self-financed by the Greek Ministry of Interior, Public Administration
Decentralization and the work eEpoch.
A particularly important issue is the transfer of know-how
developed internationally in public administration. This can be achieved
through a
A series of seminars, workshops etc, but especially through some pilot
to be implemented at local level in order to gain their own experience.
5.1.2 Information and Awareness
The findings of the Smart Card Group, along with their deliverables
eEurope
Smart Cards, can and should be promoted to all stakeholders.
Deliverable Task C3 'Smart
Cards' 61 by 110 final
They are recording the most relevant information, white papers,
proposals and standards in Greece and Europe. The promotion and
view should be the first members of the proposed institution.
5.2 Technical Issues - Standards
Deliverable in the Open Smart Card Infrastructure for Europe
u963 prepared under the initiative e-Europe, a detailed report
both the basic technical issues and the standards, and new needs
standardization. The initiative involved and participate actively to
Standardization key centers such as the CEN / ISSS and ETSI, and
many experts
participate in committees ISO. As the participation of our country is
limited - only two people involved in the committees of eEurope Smart
Card
Charter and the Hellenic Organization for Standardization not participate
in committees
smart card standards will be promoted to relevant information
stakeholders.
Deliverable Task C3 'Smart
Cards 62 from 110 final
6 Bibliography - Sources
6.1 Smart Card Marketing Initiatives
http://eeurope-smartcards.org/ (The eEurope Smart Card (eESC)
initiative, launched
in December 1999 by the European Commission. It aims to accelerate
and harmonize
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 283
the development and use of smart cards across Europe, etc.)
http://smart.gov/ (USA Smart Cards and e-government solutions, etc.)
6.2 Templates - Directions
http://www.cenorm.be/isss (CEN / ISSS - provides market players with a
comprehensive and integrated range of standardization-oriented services
and products,
in order to contribute to the success of the Information Society in Europe,
etc)
http://www.finread.com (Financial Transactional IC Card Reader
standards, etc.)
www.cepsco.org (The Common Electronic Purse Specifications (CEPS)
define
requirements for all components needed by an organization to implement
a globally
interoperable electronic purse program, while maintaining full
accountability and
auditability, etc.)
www.emvco.com (provides information on EMVCo and allows you to
view or
download Integrated Circuit Card Specifications for Payment Systems
and related
Type Approval process and requirements specifications, etc.)
www.opencard.org (common interface for both the smart card reader and
the
applications on the card, based on Java technology)
http://www.javacardforum.org/ (java card specifications)
www.pcscworkgroup.com (promote standard specification to ensure that
smart cards,
readers and computers made by different manufacturers)
http://www.cenorm.be/isss/Workshop/URI/Default.htm (User related
information
extended to multi-application smart cards)
http://www.cenorm.be/isss/Workshop/fastest/default.htm (Facilitating
smart card
technology for electronic ticketing and seamless travel)
http://www.cenorm.be/isss/Workshop/Triangle/Default.htm (Interoperable
& multiapplication
smart cards related to the mobility of the user)
http://www.contactless-club.comm (CLUB is a non-profit association
established
March 3rd 1995 in Konstanz, born from an initiative of the cities of
Venice, Lisbon,
Paris and the Bodensee Region. At this time, only a few "pioneer"
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 284
companies had
started working on contactless technology applications, and the need for
a "gettingtogether"
of these pioneers became obvious in terms of reflections and helping
each
other, etc.)
http://www.etsi.org (ETSI - the European Telecommunications Standards
Institute -
is a not for profit organization whose mission is to produce the
telecommunications
standards that will be used for decades to come throughout Europe and
beyond, etc.)
http://www.anec.org (The European consumer voice in standardization,
etc.)
Deliverable Task C3 'Smart
Cards' 63 of 110 final
www.linuxnet.com (Movement for the Use of Smart Cards in a Linux
Environment,
etc.)
6.3 International Market Initiatives to promote standards and applications
Smart Cards
www.smartex.com (Smartex - a global organization - creates and
manages forums in
which companies and individuals in the smart card industry meet to
exchange ideas,
learn about new developments, etc.)
http://www.apsca.org (The Asia Pacific Smart Card Association is the
Asia Pacific
division of an international affiliation of Smart Card associations around
the world
founded by the Smartex organisation (www.smartex.com). Through
Smartex, APSCA
is affiliated with smart card forums in the United Kingdom, Europe and
Southern
Africa and has close links with organisations in the USA, etc.)
www.eurosmart.com (the voice of the smart card industry)
www.scia.org (Smart Card Industry Association, a global trade
association
provides information on, Smart Card Technology, Applications of Smart
Card
Technology, Smart Card industry News, Links to other Smart Card sites,
SCIA
Members & Products, and the SCIA organization, etc.)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 285
www.smartcardalliance.org (The Smart Card Alliance is the leading not-
for-profit,
multi-industry association of over 185 member firms working to
accelerate the
widespread acceptance of multiple application smart card technology,
etc.)
http://www.globalplatform.org (GlobalPlatform was formed in 1999 by
organizations
interested in issuing multiple application smart cards to their customers.
These
founding organizations decided to provide the resources and leadership
necessary to
move this opportunity forward. A major goal of GlobalPlatform is the
definition of
specifications and infrastructure for multi-application smart cards, etc.)
6.4 European Research Projects
www.cordis.lu/ist/cpt/cpa5r.htm (IST projects "related" to 2000CPA5
Smart Cards
and the available fact-sheets may provide useful information for
prospective
proposers in terms of the kind of ongoing related activities and of the
organizations
involved, etc)
http://www.cordis.lu/ist/projects.htm
6.5 International Market - Manufacturers / Suppliers
Schlumberger Sema http://www1.slb.com/smartcards/
Gemplus http://www.gemplus.com/
OBERTHUR http://www.oberthurcs.com
SETEC http://www.setec.fi
Visa http://www.visa.com/
Deliverable Task C3 'Smart
Cards 64 110 final
MasterCard http://www.mastercard.com/
American Express http://www.americanexpress.com/
Orga http://www.orga.co.uk/
STMicroelectronics http://www.st.com/
Mondex http://www.mondex.com/
Microsoft http://www.microsoft.com/smartcard/
http://java.sun.com/products/javacard/
6.6 News - Articles - News
www.e-smartransaction.com (Portal for smart cards)
www.smartcard.co.uk (Smart Card Group provides international news
and
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 286
information about the Smart Card Market, through its popular hardcopy
newsletter
and its website. SCG issues the following printed publications: Monthly
Newsletter,
Supplements, Technical Tutorials, Reports, etc.)
Deliverable Task C3 'Smart
Cards' 65 of 110 final
7 Annexes
7.1 Standards and guidelines for smart cards
7.1.1 General
The integrated circuit card using a smart metallic contacts,
have been set based on international standards:
• VCC - Power Supply Voltage
• RST - Reset the Microprocessor
• CLK - Clock Signal
• GND - Ground
• VPP - Programming or Write Voltage
• I / O - Serial Input / Output Line
• RFU - Future Use
Of these only the I / O and the Ground is necessary for the card and
should follow international standards, everything else is optional.
7.1.2 International Standards Organization - ISO
The global standards set by an organization known
as ISO (International Standards Organisation-International Standards
Organization), the
which is based in Geneva. The agency IEC (International
Electrotechnical
Commission) is interested in standards in the field of electronics. In many

Where standards of both organizations were combined and reported as


ISO / IEC standards.
The ISO / IEC has appointed a committee JTC1 (Joint Technical
Committee), which
monitor patterns of computers. Part of this is the JTC1 SC17, o
which deals with 'ID cards. The SC17 consists of 6 groups
Work (WG). The group WG4 deals with standards of cards
Integrated circuit and contacts (Contact Integrated Circuit), while group
WG8
deals with standards of wireless smart card (Contactless Integrated
Circuit).
Deliverable Task C3 'Smart
Cards 66 110 final
7.1.2.1 Standard cards with contacts - Contact Card Standards (ISO /
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 287
IEC 7816)
ISO / IEC 7816-1:1998 Physical Characteristics of IC cards, physical
dimensions
o Improvement 1 (1998): Re-issue March 1998
It defines the physical dimensions of the card (width, length and
thickness)
which are the same as a normal credit card.
Additional features referred to in ISO / IEC 7816 -1, and those
refer to X-rays, points of contact surface, mechanical
power, electromagnetic characteristics and static electricity
• ISO / IEC 7816-2:1999 Position of Module and Contacts on IC cards
Sets the size and the area in which the contacts are placed
• ISO / IEC 7816-3:1997 Electrical specifications and communication
protocols
o Improvement 1 (1992) Protocol T = 1
o Better 2 (1994): Review of the selection type
Protocol
o Better 3 (1998): Introduction 3 Volts ICCs
Check the characteristics of electrical signals and
transfer protocols and the standardization of card
«Reply Restore"
• ISO / IEC 7816-4:1995 Command set for microprocessor cards
o Improvement 1 (1998): Review of Safe Shipping
Message (Secure Messaging)
Controls:
􀀹 orders between different industries,
􀀹 the specifications of the APDU,
􀀹 historical features «Answer to Reset»,
􀀹 the file structures,
􀀹 methods of access
􀀹 and secure messaging
• ISO / IEC 7816-5:1994 Application identification
Registrar system that holds data for recognition
applications and allows several terminals to choose
undoubtedly an application from the card
• ISO / IEC 7816-6:1996 Inter-industry data elements
Provides data elements for sharing
Deliverable Task C3 'Smart
Cards of 67 110 final
• ISO / IEC 7816-7:1999 Inter-industry commands for Structured Card
Query
Language (SCQL)
Sets SCQL and commands that allow the management
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 288
relational databases in the smart card
• ISO / IEC DIS 7816-8 Security related inter-industry commands
Provides security for commands used between
Industries
• ISO / IEC DIS 7816-9 Additional inter-industry commands and security
aattributes
Provides additional security for commands and features
used between industries
• ISO / IEC DIS 7816-10 Electronic signals and answer to reset for
synchronous cards
Provides electronic signals and "reset reply" to
smart cards using modern data transmission
7.1.3 Standards contactless cards - Contactless card standards
The contactless cards are recognized by the Organization ISO (SC17-
WG18) as
"ID cards". The physical characteristics are in line with ISO
7810 and ISO 7813. Their only difference is the thickness of a card and
past the card without contact was thicker.
There are 3 types of contactless cards that are recognized by the ISO
and other relevant agencies. There are 3 different groups
dealing with these cards
7.1.3.1 First Team (Task Force 1)
This group deals with the strict proximity cards (Close Proximity Cards),
which need to be close to the card reader function
correctly.
• IS 10536 -1 Physical Characteristics
Control the physical characteristics of the card but also includes
other elements such as profiles of the surface electromagnetic
capabilities, and operating temperature
• IS 10536 - 2 Dimensions and locations of coupling areas
Raises different possibilities
• DIS 10536 - 3 Electronic Signal and mode switching
Deliverable Task C3 'Smart
Cards 68 110 final
Is still in its early stages and includes information on
electronic signals and reset procedures on the cards
their initial conditions
• CD 10536 - 4
Is still in its early stages and includes information on
protocols, especially for implementing full-duplex communication
7.1.3.2 Second Group (Task Force 2)
This group deals with the category "Remote Coupled" cards without
contacts, and interesting facts are labeling / handling problems when
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 289
one or more cards are in the "card reader"
• CD 14443 - 1
Is still in its early stages and includes information on
physical characteristics
• 14443 - 2
Is still in its early stages and describe radio frequency
interface
• 14443 - 3
Is still in its early stages and describe protocols
Transport
• 14443 - 4
Is still in its early stages and describe characteristics
safe transport
7.1.3.3 Third Group (Task Force 3)
This group deals with contactless cards operating at a distance. The
This group is still in its early stages and there are no
Results
7.1.4 Pilot / Check Card - Card Testing
• ISO 10373
Refers to methods of control used to control
smart cards, such as bending the card horizontal and vertical axis
control at different temperatures and humidity, etc.
Deliverable Task C3 'Smart
Cards' 69 in 110 final
7.1.5 Protocols Messaging - Message Exchange Protocols
• ISO 8583 Financial transaction card originated messages - interchange
message specification
Message standards from financial cards
trade - identify and messaging standards
• ISO 9992 Financial transaction cards - messages between the
integrated
circuit card and the card accepting device
Card standards for financial transactions - messages between
IC card and card reader
7.1.6 Standards for Security Issues - Security Related Standards
• ISO 9564 Banking - PIN management and security
Standards for banking operations, management and security
Personal security code
• ISO 9796 IT security techniques - digital signatures
Standards for security techniques - Digital signatures
• ISO 9797 IT security techniques - data integrity mechanism
Standards for security techniques - a mechanism that controls the
accuracy
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 290
of stored data using a cryptographic
operation
• ISO 9798 IT security techniques - entity authentication
Standards for security techniques - entity authentication
• ISO 10202 Financial transaction cards - security architecture using IC
Cards
Card standards for financial transactions -
• ISO 11568 Banking - key management (retail)
Standards for banking operations - retail
7.1.7 European Organisation for Standardisation - CEN
The standardization of card driven by the Technical Committee
(Technical
Committee 224 - TC224) of the European Standards Organisation and
some
groups dealing with the following:
• WG1 - Physical Characteristics Cards
• WG5 - Primarily to obtain payment messages
• WG6 - Surface Machine
• ERWG8 - Thin and flexible cards
Deliverable Task C3 'Smart
Cards 70 from 110 final
• WG9 - Applications in Telecommunications
• WG10 - Electronic wallet in various fields
• WG11 - Applications in transportation
• WG12 - Application health
The European standards organizations publish standards with the prefix
EN.
Standards are currently being tested, which can last as
a maximum of 3 years and used in areas where technology
rapidly growing bear the prefix ENV. All members of CEN should be
published EN standards as their own and promote such standards as
ISO
Two useful standards are EN 726 and EN1546.
Deliverable Task C3 'Smart
Cards 71 110 final
7.2 Terminology Smart Card Index
ABS (Acrylonitrile Butadiene Styrene) Akrylonitriko Voutaniediko
Styrene. The plastic used for injection of
skeletons of cards for various cards
Acceptor earnings. The agency (usually a dealer), who
receive a card (for example, a payment).
Acquirer Mediator transactions. The Bank, which processes
transactions a merchant and forwarding system
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 291
clearance (px clearing system). It may also be a
organization that manages the exchange of information
and data between a system administrator
payment and the person providing the various
services.
AID
Application Identifier. Application identifier. The AID
recognizes an application on a smart card. Defined in
Standard ISO / IEC 7816-5. Part of AID may
enshrined in national or global level. In this
case, the application referred to is unique
recognizable. The AID consists of two parts: RID
(Registered Identifier) and PIX (Proprietary Identifier).
ALD (Application Load Certificate) is used by
Multos specification and similar systems for
"Formalize" an application that is loaded on a card
generic
Algorithm Algorithm. A mathematical process used
to make calculations (in cryptography: algorithm
Encryption)
Analog Analog. Used as opposed to
"Digital"
Anti-collision avoidance conflict. An algorithm used
to identify two or more wireless smart
card when operating simultaneously.
Anti-tearing One feature of the card, which protects
data in memory when the card
depart before completing a transaction.
APDU
(Application
Protocol Data
Unit)
Application Protocol Data Unit. It is a
"Box" database software, used for
encapsulation of data, so they can
exchanged between a smart card and a
terminal.
ASIC (Application-Specific Integrated Circuit) integrated
Deliverable Task C3 'Smart
Cards 72 110 final
Special circuits purposes. These circuits
minimize production costs by implementing
circuits have all the features of high
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 292
Technology
Asymmetric
Cryptography
Symmetrical or asymmetric cryptography (also
"Public key cryptography. Refers to the method
encryption where there are two encryption keys.
One is used to encrypt the text
and the other for decryption.
ATC
(Application Transaction Counter) counter which is
media card and increases by one unit each time
that a transaction
ATM
(Automated Teller Machine) special terminal, which
placed in public places and enables
financial transactions.
ATR (Answer To Reset) is a sequence of byte, which
sent from a smart card after (hardware)
reset. Among other things contains several parameters
on the transmission protocol card
Authentication Identification. The process of proving the authenticity of a
entity (eg smart card or through the holder)
using cryptographic methods
External
Authentication
Outdoor Identification. The process used to
identify the "outside" world (eg a terminal) by
smart card.
Internal
Authentication
Internal Identification. The process used to
to establish a smart card that is genuine.
BIP (Bearer Independent Protocol) protocol that allows
a SIM card to communicate directly with
remote servers
Black list Black list. H list, usually in a database
containing all the cards are no longer authorized
use in a system
CA (Certification Authority)
Certification Authority. The organization that issues certificates
and be accountable for liabilities arising from
validity of the data holder
CAM (Card Authentication Method) Method of Authentication
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 293
card. This method is used to determine
If the card is from a valid publisher
Card accepter accepting cards. Entity which can
use smart cards for a particular
Deliverable Task C3 'Smart
Cards 73 110 final
application
Card body House card. Plastic card, the intermediate product in
construction of the Smart Card. In the next step
construction, incorporating the integrated circuit
Card issuer issuers. Entity responsible for issuing smart
cards. Typically, the application provider and publisher of
same card on a smart card application.
Card manufacturer Manufacturer card. The entity, which constructs
houses
card incorporates an integrated circuit and by
implement the plan (eg memory cards) or simply
prepare to be scheduled by another entity.
Card owner Owner card. It is the natural or legal entity
the legal control of the card. In the case of cards
debit or credit card, the cardholder is
usually the bank issuing the card. Customers
use the card is usually just "hold
card "(cf. Cardholder).
Card possessor main card. The entity that owns a
card
Card reader apparatus with a relatively simple electrical and mechanical
construction
that can accept smart cards and to interact
them
Card user The person using the card. Not necessarily the
lawful holder
Cardholder Cardholder. Refers to the entity which is
real right of possession and use of the card. The
cardholder does not need it and
cardholder
Certificate Certificate. Archive digitally signed by an authority
Certification
CEN (Centre European pour la Normalisation - European Standards
Centre)
The European standards body CEN is on
Brussels. Consists of all (European)
national standards organizations and is the official
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 294
European Union Agency for European standards
Challengeresponse
Method of identification, the system requires
authentication sends a random "challenge". The product
identification of object (eg a smart card) calculates
"reply" to the "challenge". The system can be
confirm the authenticity of the object based on that
«Reply.
Deliverable Task C3 'Smart
Cards 74 of 110 final
Chip card card chip. Referred
also "smart card", but often used
such a way as to include memory cards,
which are not 'intelligence'
Clearing / Clearance The process of transmission, alignment and
validation
prompt financial institutions
Clearing system Information System, which performs a central
implementation arrangements for trade between
financial institutions or financial
institutions and third
Cloning Cloning. Trying to "attack" a system of smart
card by copying the ROM and EEPROM memory a
true to a fake card
CMS (Card Management System) tools and procedures
used to develop and manage applications
smart cards. To CMS is used primarily for
life cycle management of cards and applications
their
COS (Chip Operating System / Mask) sequence embedded
prompt memory ROM of the smart card
Confidentiality Confidentiality. Refers to methods and procedures
ensuring that information is accessible only
by entities authorized to have access
Combined Combination Card Card. Smart card which combines the
two technologies (with connections and wireless)
Contact Smart
Card
Smart Card contacts. Smart card, which requires
physical contact with the reader, to share
data
Contactless Smart
Card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 295
Without contacts or smartcards. Refers to
u954 smart cards, which transmit and receive data
using RF
Coupler Computer system - implement used to
can read the usual wireless smart card
CQL (Card Query Language) subset of SQL (Structured Query
Language) has been implemented on a smart card
CRC (Cyclic Redundancy Check) method of sound transmission
Data
Cryptography Cryptography. The science and art of transformation
strings (eg texts, arithmoseiron etc.) in
unintelligible form, for those who do not have adequate
mechanism to restore its original form (key)
Deliverable Task C3 'Smart
Cards' 75 by 110 final
CVM (Cardholder Verification Method) Method of Verification
Cardholder
DDA (Dynamic Data Authentication) Method of certification
card using the response mechanism
DF (Dedicated File) Organization of memory cards with
microprocessor. A DF is a logical entity, which
consists of EF (elementary file)
The Diffie-Hellman invented public key cryptography
Digital Cash (e-
Cash)
Digital money that can be stored in a bank
account, personal computer or smart card
Dual Slot Dual Deposit. Smart card reader that can be
2 use smart cards simultaneously. Used
payment systems, to identify the Bank
both the merchant and the customer
Dual Interface
Card (Combicard)
Smart Card, which has two media:
wired through electromechanical contacts and wireless
communication, through an appropriate antenna
Duplication
(Cloning)
Transfer of original data in a second pass
to create an identical card
e-Cash Digital / electronic money that can be stored in
bank account, personal computer or smart card
Code.Enas ECC Error Correction Code Error Correction
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 296
detects errors in data in many
Where can correct
EEPROM (Electrically Erasable Programmable Read-Only Memory)
ROM type of memory that can be reprogrammed to
applying an electric field
EF (Elementary File) Elementary File. Part of the rationale
organization of a memory card with a microprocessor, the
a similar data file
Embedding Integration. The process of integrating a
oloklirom__________enou
circuit in a smart card body
EMV (Europay – Mastercard – Visa)
A series of international standards for payments based on
smart card, developed by the agencies
Europay, Mastercard and Visa
Encryption Encryption. The transformation process
string into unintelligible form using a
appropriate key
ETU (Elementary Time Unit) Unit Standard Time. The basic
Deliverable Task C3 'Smart
Cards 76 of 110 final
time unit of the smart card, which are all based
The timings of the communication card. Defined as the time
transfer one bit of data from a smart card
Fabrication The fabrication process of integrated circuit
smart card
Filtered Filtered. Characterization data or functions of the
which have been loaded into memory of the smart card
Memory Flash Memory which can be written once but
be removed, should be deleted
corresponding block
FRR (False Reject Rate) Unit of measurement error rejection

an entity in a system. Used in the main


Biometric systems
GSM (Global System for Mobile communications, Group
Speciale de
Mobile)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 297
Cellular system widespread in
Europe
Garbage
Collection
Operation type smart card Java Card, which collects
the memory no longer in use by an application and
converts to free memory for use by other
Applications
Hard Mask
In a smart card with a hard mask the greater part of
program code is implemented in ROM memory
HSM (Host Security Module) device, used for
secure storage of keys and the (internal)
implementation of cryptographic functions, driven by
a computer
Hybrid Card Hybrid Card. Type of smart card that uses two
different media. SD. Dual Interface Card
ID-I card smart card with an ISO standardized dimensions.
IFD (Interface Device) Another reader called smart
card
Initialization
The first stage of issuing cards. The purpose
this process is to load data from
implementation of smart cards
Intelligent memory
card
Intelligent memory card. An additional memory card
detailed logical circuit design that allows / provides
additional security features that record the
memory usage
Integrity Integrity. Refers to methods and procedures
Deliverable Task C3 'Smart
Cards' 77 of 110 final
ensure that the information has been amended only by
entities have been appointed to
Interoperability Interoperability. The ability of different
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 298
systems
manufacturers to interact.
ISO (International Standards Organization) The organization
ISO
including working in the area of smart cards, with
to ensure, through the standards requires that the
integrated manufacturers, developers and
smart card companies follow the same standards
ITSO (Integrated Transport Smart Card Organisation) body
founded in the UK to help
deployment of smart card systems to media
transport
ITU (International Telecommunications Union) Body
coordinates, standardizes, and creates the world
telecommunications
A Java Card specification for implementing a subset of
Java language on a smart card
JCRE (Java Card Runtime Environment) The execution
environment
which runs Java Card. The JCRE responsible for
any management actions such as loading and
initialization of applications
Key management Key management. All management
functions
related to the creation, distribution, storage,
update the cryptographic keys
Key escrow method of filing the private key to a third party
usually to ensure recovery of data
has been encrypted or signed with the private key.
The filing of the private key, especially in the case of
use electronic signatures, is prohibited in
most jurisdictions.
Lifecycle Lifecycle. Refers to the stages of preparation
operating a smart card, since the
construction of an integrated, up withdrawing from the
use and destruction of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 299
MAC (Message Authentication Code) Identification Code
Message. Process, usually by using algorithms
encryption, which guarantees that the message comes
the original recipient, but has changed to
course
Magnetic Strip
Card
Card with magnetic strip, on which data can
be stored and read
Deliverable Task C3 'Smart
Cards' 78 by 110 final
Memory card Memory card. Refers to cards that contain only

selective memory and logic built into the hardware


(Hardwired logic). It is used in contradistinction to the term
chip card or smart card, which indicated the ability
processing
MF (Master File) is the root directory of the tree
file that implements the logical organization of a memory
smart card. The main file is automatically selected each
time starts the smart card
Microprocessor
Card
Card microprocessor. Card which includes:
Processor (CPU), memory (RAM, ROM, EEPROM) and
selective arithmetic coprocessor (NPU, numerical
coprocessor), which allows direct execution of
algorithms. It is used in contradistinction to the term
"Memory Card» (Memory Card).
Mono-application
smart card
Single smart card application. Card is
ability to execute a single application, usually
preinstalled in this
Mono-functional
smart card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 300
Smart card single operation. Card whose
operating system supports only one specific
application
Multi-application
smart card
Smart Card Multiple Applications. Refers to
younger generation smart cards, which allowed
to perform multiple applications from different
manufacturers, unlike previous ones, which
executing applications on a single manufacturer
Multi-functional
smart card
Card of which operating system supports
more than one application and contain adequate
management functions to record and delete
applications and files
mP card different name on the card mikroexergasti. SD.
Microprocessor card
Non-Volatile
Memory
Stable memory. It refers to memory which maintain
their data when power is interrupted (as in
example, data stored in memory
a smart card)
Numbering Numbering. Is making up the numbers
Smart cards
OCF (OpenCard Framework) architecture for cards and
terminals is designed to standardize the terminal
Applications
Open application applications in the smart card to make it
available to u954
Deliverable Task C3 'Smart
Cards 79 110 final
various service providers without having to
mutual legal relationship between
Optical memory
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 301
card
Optical memory card. Card, in which information is
enrolled in a reflective surface visually,
similar to the operation of the CD.
OSI (Open Systems Interconnection) model of the ISO
organization
Communications
PAC (PIN Authentication Code) Code Certification Personnel

Password
Padding
A method whereby one or more bit
add a message to acquire
size required
Passivation layer mattress hibernation. A material that
covers the
integrated circuit card to be
resilient to the effects of external environment
PCC (Proof-carrying code) code which includes
proof of compatibility with a given security policy
PC / SC Architecture communication terminals and smart
cards.
The PC / SC was proposed by Microsoft and others
Manufacturers of smart cards and PC
to standardize the interfaces and hardware
Software smart cards to communicate with
PC
PKCS (Public-Key Cryptography Standards) Informal
standards
relating to cryptography public kleidiou.Echoun
published by the company RSA Inc
PKI (Public Key Infrastructure) Public Key Infrastructure.
It shall apply in the case of asymmetric encryption
and refers to the existence of a pair of keys, the
public and private) for security.
Composed by appropriate software and hardware.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 302
Plug-In Smart Card with a small shape and arrangement
used
especially for mobile phones
Processor card SD. Microprocessor card
PVC (Polyvinyl Chloride) polyvinyl chloride. The plastic from
which made the body of the smart card
RAM (Random Access Memory) Random Access Memory
RISC (Reduced Instruction Set Computer) architecture A
Computer Design
Retry Counter Counter efforts. Meter, comprising
Deliverable Task C3 'Smart
Cards' 80 of 110 final
negative work / results and decide whether
any key will continue to be used. If
surveyor reached the maximum number of unsuccessful
u964 efforts since the key is disabled and can not
unusable
ROM (Read Only Memory) read-only memories. A type
memory, where data originally entered can
only be accessed
RSA (Rivest-Shamir-Adleman) encryption algorithm
public key, which takes its name from the three
inventor, the Rivest, Shamir and Adleman
SAM (Security Access Module) module, which is used
as part of a terminal for the safe storage
keys and algorithms
SDA (Static Data Authentication) The method of identifying a

card by signing a copy from


selected card data
Secret Key Secret key. 1. The public key encryption
key which must remain secret. 2. The key to
symmetric encryption key. In this
case the key must remain secret
Session
Session. Refers to the time between two reset a card or the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 303
time between the supply (power up) and Cut-off (power down) SET
(Secure Electronic Transaction) Secure Electronic Transaction. Protocol
developed by MasterCard and Visa for sending encrypted numbers credit
cards via the Internet (Internet). According the SET, the merchant never
learns and the number of credit card, thus reducing the risk of fraud SHA-
1 (Secure Hash Algorithm 1) NIST standard body of U.S., which refers to
the creation of cryptographically coin safe (small data) from more dataset
Signed Applets Signed Applications. Refers to Java applications or Java
Card, which are accompanied by digital signature. The signature proves
the identity of the manufacturer application or distributor SIM (Subscriber
Authentication Module) Authentication Module Subscriber SMG9 (Special
Mobile Group 9) team of experts determine the specification of
interactions between smart cards Deliverable Task C3 'Smart Cards' 81
by 110 final and mobile phones Super Smart Card Indicates a smart card
with embedded complex elements, such as display and numerical
pliktrologio SVC (Stored-Value-Cards) Term used for Prepaid cards have
a predetermined value and used __________mechri exhaustion of that
value TASI (Terminal Application Services Interface) The way an
application which interfaces with the "outside world" TC (Transaction
Certificate) Certificate of Transaction TTP (Trusted Third Party) Tuesday
Trusted Entity Transfer Card movement. It is a smart card, which used as
a means of transferring data between two entities. Usually contains a
large memory data this purpose and typically contains keys for
identification entities and their actions (read / write data) Transmission
Protocol Transfer Protocol. The set of rules for transmission used for data
transfer between terminal and smart card Application Verifier that
processes the incoming code and ensure compatibility with the planned
safety Virgin Card Card which is not yet the microprocessor and not yet
personalized Volatile Memory Unstable memory. It refers to memories
that lose their data when power is interrupted (such as memory RAM of a
personal computer) VOP (Visa Open Platforms) ambiguous system
architecture which allows the rapid development of global practices
Smart card systems White List White list. The list, usually in a database,
which contains all the cards may be used in a This system WORM (Write
Once Read Many) refers to the memory of the smart Cards can be
written on the card only once and read many Deliverable Task C3 'Smart
Cards' 82 by 110 final 7.3 Questionnaires Consultation on Smart Cards
7.3.1 Questionnaire for consultation on smart cards with the "Public
Administration » Working Group C3 "Smart Cards" in e-businessForum
invites stakeholders to submit views and comments building on the
following questionnaire: Contact details of person completing
questionnaire: Name: Title / Position: Organization: Phone: e-mail: Body
Type: 􀂉 Ministry 􀂉 utilities 􀂉 Regional Administration / Local Government
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 304
Other 􀂉 Date completion: 1. Services, products, or smart card
applications offered or function

Q1: Describe the services, products or applications, smart cards


have complete or offer. If you do not continue to question Q9.
Deliverable Task C3 'Smart Cards 83 110 final Q2: What are
cooperating agencies in the implementation or provision of
services, products or smart card applications. Q3: What are the end
users. Q4: Which actors involved in the development of user
requirements and what method used for collecting user
requirements (eg survey, mapping processes and user behavior);
Q5: What are the signs of use (eg home, kiosks, point of
transaction presence of an operator) Q6: Please provide figures for
use. Card Number: number of card readers: number of transactions:
Q7: Please indicate any problems you find that preventing adequate
dissemination and use of these services and applications from end
users. Deliverable Task C3 'Smart Cards' 84 of 110 final Q8:
Please provide a summary of technologies using smart cards (Eg
contact, contact less, way of reading cards) 2. Future development
plans and infrastructure services Q9: Please research - pilot
projects, services or applications Smart Cards are planning to
develop and provide in the Operational Programme Information
Society or other program. Q10: Do you see a demand for such
services and applications? Yes 􀀀, No. 􀀀. If yes, provide a list of
priority order. Q11: Who are the stakeholders in the
implementation or provision of services products and smart card
applications planned. Deliverable Task C3 'Smart Cards 85 from
110 final Q12: What are the end users. Q13: Which players will
participate in the formulation of requirements users and what
method of collecting user requirements to be use (eg research,
surveys and behavioral processes users)? Q14: What will be the
points of use (eg home, kiosks, point transactional presence of an
operator) Q15: Please provide an assessment of quantitative data
(eg card number, number card readers, number of transactions).
Card Number: number of card readers: number of transactions:
Q16: Identify the issues that might be considered difficult for
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 305
implementation or provision of services, products or smart card
applications. Q17: Provide a summary of the Smart Card
technology to be use (eg contact, contact less, way of reading
cards) Deliverable Task C3 'Smart Cards' 86, 110 final Q18: Has
your agency organized structure or personnel with the necessary
expertise to implement or provide services, products or smart card
applications Yes 􀀀, No. 􀀀. If yes, briefly describe. Q19: It is
estimated that there is a need for a scientific - Steering Committee
will monitor and support the Smart Card projects in our country;
Yes 􀀀, No. 􀀀. Q20: Comments Deliverable Task C3 'Smart Cards'
87 of 110 final Deliverable Task C3 'Smart Cards 88 from 110 final
7.3.2 Questionnaire for consultation on smart cards with the "Buy
& Research » Working Group C3 "Smart Cards" in e-
businessForum invites stakeholders to submit views and comments
building on the following questionnaire (for any clarifications - B.
Karounos, karounou@netmode.ntua.gr, tel 0973 53 35 14) Contact
details of person completing questionnaire: Name: Title / Position:
Organization: Phone: e-mail: Body Type: 􀂉 Research Laboratory
University 􀂉 Research Laboratory Research Center 􀂉 Software
Company 􀂉 Consulting Company 􀂉 System Integrator 􀂉 Society
of cards Unit production 􀂉 Cards Other 􀂉 Date completion: 1.
Services, products, or smart card applications offered, have
implemented pilot or operating Q1: Describe the services, products
or u949 smart card applications that you complete or offer. If you
do not continue to question Q9. Deliverable Task C3 'Smart Cards'
89 of 110 final Q2: What are cooperating agencies in the
implementation or provision of services, products or smart card
applications. Q3: What are the end users. Q4: Which actors
involved in the development of user requirements and what method
used for collecting user requirements (eg survey, mapping
processes and user behavior); Q5: What are the signs of use (eg
home, kiosks, point of transaction presence of an operator) Q6:
Please provide figures for use. Card Number: number of card
readers: number of transactions: Q7: Please indicate any problems
you find that preventing adequate dissemination and use of these
services and applications from end users. Deliverable Task C3
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 306
'Smart Cards' 90 of 110 final Q8: Please provide a summary of
technologies using smart cards or offer. 2. Future development
plans and infrastructure services Q9: Please research - pilot
projects, services, products or smart card applications that you plan
to develop and provide. Q10: Do you see a demand for such
services and applications citizens and the administration? Yes 􀀀,
No. 􀀀. If yes, please provide a list of priority order. Q11: Who are
the stakeholders in the implementation or provision of services
products and smart card applications planned. Deliverable Task C3
'Smart Cards' 91 of 110 final Q12: What are the end users. Q13:
Which players will participate in the formulation of requirements
users and what method of collecting user requirements to be use
(eg research, surveys and behavioral processes users)? Q14: What
will be the points of use (eg home, kiosks, point transactional
presence of an operator) Q15: Please provide an assessment of
quantitative data (eg number _________karton, number card
readers, number of transactions). Card Number: number of card
readers: number of transactions: Q16: Identify the issues that might
be considered difficult for implementation or provision of services,
products or smart card applications. Deliverable Task C3 'Smart
Cards 92 of 110 final Q17: Provide a summary of the Smart Card
technology to be use or offer. Q18: Has your agency organized
structure or personnel with the necessary expertise to implement or
provide services, products or smart card applications Yes 􀀀, No.
􀀀. If yes, briefly describe. Q19: It is estimated that there is a need
for a scientific - Steering Committee will monitor and support the
Smart Card projects in our country; Yes 􀀀, No. 􀀀. Q20: Comments
Deliverable Task C3 'Smart Cards 93 from 110 final Deliverable
Task C3 'Smart Cards, 94 of 110 final 7.3.3 Questionnaire
Consultation on Smart Cards with "Banks - Telecommunication »
Working Group C3 "Smart Cards" in e-businessForum invites
stakeholders to submit views and comments building on the
following questionnaire: Contact details of person completing
questionnaire: Name: Title / Position: Organization: Phone: e-mail:
Body Type: 􀂉 Bank 􀂉 Company Management Card 􀂉 Company
Service Card Date completion: 1. Services, products, or smart card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 307
applications offered, have implemented pilot or operating Q1:
Describe the services, products or applications, smart cards have
complete or offer. If you do not continue to question Q9. Q2: What
are cooperating agencies in the implementation or provision of
services, products or smart card applications. Deliverable Task C3
'Smart Cards 95 from 110 final Q3: What are the end users. Q4:
Which actors involved in the development of user requirements
and what method used for collecting user requirements (eg survey,
mapping processes and user behavior); Q5: What are the signs of
use (eg home, kiosks, point of transaction presence of an operator)
Q6: Please provide figures for use. Card Number: number of
terminals accepting cards: number of transactions: Q7: Please
indicate any problems you find that preventing adequate
dissemination and use of these services and applications from end
users. Q8: Please provide a summary of technologies using smart
cards or offer. Deliverable Task C3 'Smart Cards 96 110 final 2.
Future development plans and infrastructure services Q9: Please
research - pilot projects, services, products or smart card
applications that you plan to develop and provide (Eg debit, credit,
electronic wallet, key web-banking, loyalty, transport, etc.) Note:
The data will fill kept strictly confidential. Q10: Who are other
stakeholders in the implementation or provision of services,
products or applications, smart card programming. Q11: What are
the end users. Q12: What will be the points of use (eg point of sale,
machinery ATM, home, kiosks, ..) Deliverable Task C3 'Smart
Cards' 97 in 110 final Q13: Please provide an assessment of
quantitative data (eg card number, number card acceptance
terminals, expected number of transactions). Card Number: number
of terminals accepting cards: expected number of transactions:
Q14: Identify the issues that you think that might be difficult for
implementation or provision of services, products or smart card
applications. Q15: Provide a summary of the Smart Card
technology to be use or offer (eg, types of cards, contact cards, etc.)
Q16: Has your agency well-organized structure or personnel with
necessary expertise to implement or provide services, products or
u949 smart card applications or should be trained in the current
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 308
staff or to recruit and another Yes 􀀀, No. 􀀀. Give a brief
description of the response Deliverable Task C3 'Smart Cards' 98
of 110 final Q17: Do you think that there is a need for a
coordinating committee monitor and support the implementation of
Smart Card projects in our country; Yes 􀀀, No. 􀀀. Q18: Comments
Deliverable Task C3 'Smart Cards' 99 by 110 final 7.4 Respondents
to the questionnaires 7.4.1 Questionnaire for consultation on smart
cards with the "Buy & Research » The questionnaire was answered
by the following: Body Body Type Manager e-mail 1. Laboratory
Network Communications Section Information University Athens
Research Laboratory Universities Anastasios
Ioannidisaioann@di.uoa.gr
ICCS - NTUA Research Laboratory Universities
Despina War Despina.polemi @ expertnet.net.gr
3. NETMODE - ICCS - NTUA
Research Laboratory Universities Basilica Karounos
karounou@netmode.ntua.gr
4. Section Engineering Information and Communication
Systems University Aegean Research laboratory
Universities Lambrinoudakis Konstantinos
clam@aegean.gr
5. ASYK Company SA Software /
Company Consultants / System
Integrator Konstantinos Karanasios
k.karanassios @ asyk.ase.gr
6. Expertnet SA Company Advisers
Despina War Despina.polemi @ expertnet.net.gr
7. M.D.I. SA System Integrator
Chris Kipiadis xkip@cpi.gr
8. topos communications Company Software /
Apostle Feroukas apos@n-topos.gr
9. DESPEC MULTIMEDIA SYSTEMS Company
Software RODOLFO ONTONI
Rodolfo@despecmulti.gr
10. ID SYSTEMS SA System Integrator
AMPATZIS KONSTANTINOS
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 309
ampatzis@angelopoulos.gr
11. Systema Technologies S.A. Company
Software / System Integrator /Company
disposal Cards Anastasios Charissis
tasos@systema.gr
12. Mellon Technologies System
Integrator Angel Angelopoulos
a.angelopoulos @ mellon.com.gr
13. GREEK ORGANIZING (
HOTech) Company Software / Company
Consultants / system Integrator
GALERIDIS DIMITRIS
dgg@hotech.gr -
info@hotech.gr
14. ADACOM SA Company
Software / System Integrator /Company
disposal Cards
P. Vassiliadis panos@idealnet.net
15. HELLASNET SA FORTHNET)
Panagiotis Ioannidis ioant@hellasnet.gr
16. Microsoft He Society Software
Athanasius Vamvakas
athvam@microsoft.com
17. DATAMED A.E. System
Integrator Sotiris Pavlopoulos
spav@datamed.gr
18. BYTE A.E. System Integrator Cheropoulos,
Konstantinos khairop@byte.gr
19. Computer science Expertise Company Software
Alexander Pantelakis apantelakis@multiland.gr
20. INTRACOM Freedom Velidou
21. ARCADIA TECHNOLOGIES SA
Company disposal Card / Unit production Cards
Theodore Kouroglou tkouroglou@arcadiagrp.gr
22. ENVIRONMENT SA Unit production Cards
FLOKOS DIMITRIS cards@angelopoulos.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 310
23. LYCOS GROUP Unit production Cards
Andreas cheese pieces a.tirakis @ lps.gr
24. ATMEL HELLAS A.E Company production
Integrated Circuits smart Cards
JOHN BOURNAKAS ybournakas@patras.atmel.com
Deliverable Task C3 'Smart Cards 102 110 final
7.4.2 Questionnaire Consultation on Smart Cards with
"Banks - Telecommunication » Body Body Type Manager e-
mail
1. Cards Division,Piraeus Direct Services Company
Management Cards
Sap, Siwarde sapsiwarde@e-phonia.gr
2. Cosmote Company
Provider Services Cards
Spiro Magoulas smagoulas@cosmote.gr
3. EUROBANK CARDS
Bank Oikonomaki MICHAEL T meconomakis @
eurobankcards.
Deliverable Task C3 'Smart Cards'
7.5 Minutes of working group meetings
7.5.1 Proceedings of the 1st Meeting, 05 June 2002
Present B. Karounos (NTU), pp Karapetsas (APRC), A.
cheese pieces (Inform P. Lykos), D. Rooster (Intersys SA),
G. Bobolou (Intracom), K. Karanasios (ASYK SA), C.
Sioulis (D.S.A.), A. Vogiatzis (Univ. of Patras), C. Tsiambaos
(Accenture), I. Tsoronis (Systema Informatics), D. Gouskos
(Univ. of Athens), D.Stathopoulou (e-Business Forum).
When the meeting was a summary of attendance and
the scope and objectives of the group.
In the discussion that followed was broken for the work to be
completed by the end of the cycle of the working group. Also
proposed to place an event on the first Smart Cards
15-day in July.
Scheduling and distribution operations in the Working
1. Create a glossary of Mrs. K. Tsiambaos and Mr. A.
Vogiatzis.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 311
2. Play CD's and send on the e-Europe Smart Cards by
Mrs. D. Stathopoulos.
Send e-mail to all team members to register now
Links importance beyond those of the e-Europe Smart Cards
by B. Karounos
3. Summary and classification of subjects of the CD on the e-
Europe Smart
Cards and other important Links by Mr. Ch Sioulas, A.
cheese pieces, V.
Karounos D. rooster.
4. Topics to be presented at the event in July by Mr. S.
Karapetsas
The next meeting of core members is scheduled to
Wednesday, June 19 ________kai at 16:00 at the offices of
GRNET SA Mesogeion 56
Ambelokipi.
7.5.2 Proceedings of the 2nd Meeting, June 19, 2002
Present:
B. Karounos (NTU), pp Karapetsas (APR), P. Pantis (Inform
P. Lykos), D.
Rooster (Intersys Inc.), K. Karanasios (ASYK SA), C. Sioulis
(D.S.A.), A.
Vogiatzis (Univ. of Patras), C. Tsiambaos (Accenture), I.
Tsoronis (Systema
Computing), G. Chasapidis (World Organization of Greek
Kyvernonafton
(P.O.T.E.K)), N. Saridakis (YPESDA), D. Stathopoulos (e-
Business Forum).
Deliverable Task C3 'Smart
Cards' 104 of 110 final
At the beginning of the meeting was the presentation of two
new team members
Work Chasapidi C. and N. Saridaki and then discussed the
following
topics:
Minutes of previous meeting
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 312
All participants agreed the minutes of the previous
meeting.
Update on progress of sub-groups
• «Handbook for smart cards
The Tsiambaos Ms. K. and Mr. A. Vogiatzis submitted draft
Handbook,
which were discussed and suggestions for improvement. The
new version will be sent to
States within 10 days.
• «Sort of important links»
Messrs. Ch Sioulas, A. cheese pieces, V. Karounos D.
rooster submitted plan
Classification of important links suggested by members of
the group,
discussed and made suggestions for improvement. The new
version will be sent to
States within 10 days.
Information about the meeting in Madrid eEurope - Smart
Cards Charter by
Mr. St. Karapetsas
The meeting in Madrid that:
• Planning meeting of the eEurope - Smart Cards Charter in
Athens in the spring of 2003, which will become the overall
result
Action 2000-2002 and planning within the eEurope2005.
• Informing the public sector for work eEpoch (e
identity) and a proposal to implement a pilot basis of the
standards
the eEpoch (own resources).
• Create a Commission to investigate / promotion issue
"Smart Card E111" - with members of the (initial): G.
Chasapidis D. cocks,
Sagkrioti T., T. Tsoronis, K. and B. Tsiambaos Karounos.
Planning meeting - consultation on smart cards
Decided to make a closed meeting - consultation with
Public Sector, entitled "Smart Cards - Public Administration
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 313
on July 18
2002, 9:00 a.m. to 1:00 pm with the following key areas:
international experience, key
issues in implementing applications and Greek reality - works

programmed in the public sector. It is a collaboration of


ebusinessForum and YPESDA. The Organizing Committee
are the B.
Karounos, St. Karapetsas N. Saridakis, K. Karanassios.
The next meeting was set on July 9, 2002 at 4:00 pm at the
offices
GRNET SA Mesogeion 56 Ambelokipi.
7.5.3 Proceedings of the 3rd Meeting, July 9, 2002
Present:
Deliverable Task C3 'Smart
Cards' 105 of 110 final
B. Karounos (NTU), pp Karapetsas (APR), P. Georgiadis
(University
Athens), D. Gouskos (Athens), E. Vellidis (INTRACOM), B.
Mizara (TRUTH AE), University Pantis (Inform P. Lykos), Ch
Sioulis (D.S.A.), A.
Vogiatzis (Univ. of Patras), C. Tsiambaos (Accenture), I.
Tsoronis (Systema
Computing), G. Chasapidis (World Organization of Greek
Kyvernonafton
(P.O.T.E.K)), N. Saridakis (YPESDA), D. Stathopoulos (e-
Business Forum).
Topics:
Minutes of previous meeting
All participants agreed the minutes of the previous
meeting.
Update on progress of sub-groups
• «Handbook for smart cards
The Tsiambaos Ms. K. and Mr. A. Vogiatzis filed the 2nd
edition of
Handbook, which will be sent to all members for suggestions
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 314
for improvement. The
next improved version will be distributed at the meeting -
consultation with
Public Sector, entitled "Smart Cards in Public Administration
on 18
July 2002 and placed on the page of the Working Group.
• «Sort of important links»
Today was the first major approach to classification of links
and
placed on the page of the Working Group.
Organization meeting - public consultation on 'Smart Cards
in Public Administration
Finalized the invitation and program of public consultation
On "Smart Cards in Public Administration", to be held on 18
July 2002, 9:00 a.m. to 1:00 pm at Hotel Holliday Inn (room
Cosmos A) with
participation of two speakers from the eEurope Smart Card
Charter (Jan van Arkel & Lutz
Martiny, co-chairman - eEurope Smart Cards Charter), who
will present the international experience
Key issues and the implementation of smart card
applications, respectively.
Public Consultation Questionnaire
Discussed and agreed the questionnaire will be sent to
operators,
which will form the basis for consultation
Planning consultation with the banking sector,
telecommunications, marketing and
research.
Decided to conduct three public consultations with the
banking sector and
telecommunications market research September - October.
The next meeting was set on August 27, 2002 at 4:00 pm at
GRNET SA offices Mesogion 56 Ambelokipi.
7.5.4 Proceedings of the 4th Meeting, August 27, 2002
Present:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 315
Deliverable Task C3 'Smart
Cards 106 110 final
B. Karounos (NTU), pp Karapetsas (APR), P. Georgiadis
(University
Athens), E. Vellidis (INTRACOM), B. Mizara (TRUTH AE), D.
cock
(Intersys SA), A. Vogiatzis (Univ. of Patras), C. Tsiambaos
(Accenture), I.
Tsoronis (Systema Informatics), G. Chasapidis (World
Organization of
Greek Kyvernonafton (P.O.T.E.K)), N. Saridakis (YPESDA).
Topics
Minutes of previous meeting
All participants agreed the minutes of the previous
meeting.
General assessment of the meeting - public consultation on
the "Smart
Cards in Public Administration
All participants agreed that the meeting was successful - it
good turnout of executives of public and parastatal
and presentations for foreign speakers were very
informative. The
presentations - attitudes of executives in the public sector
was relatively
limited. We prepared a detailed report of the meeting until
next
meeting.
Questionnaire Public Consultation Public Administration
Since nobody responded to completion of the
questionnaire, sent prior to the meeting discussed and
agreed
process of promoting the questionnaire from both
Public bodies - ministries participated in the meeting on
18/7/02 as
and others who design projects using smart cards. The
process
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 316
is:
i. Contact with public institutions - ministries involved in
meeting and cooperation in completing the questionnaire by
group members (B. Karounos, S. Karapetsas B. Myzaras E.
Vellidis).
ii. Contact the Society SA (Mr. Drinos) for recording projects
using smart cards and not recorded. (V. Karounos)
iii. Contact the Managing Authority of IS for recording
projects
using smart cards and not recorded. (V.
Karounos)
The aim is to complete the questionnaire by all public bodies
-
Ministries of planning or planning projects using smart cards
to identify areas of potential synergy between them.
Planning consultation with the banking sector,
telecommunications, marketing and
research.
Decided to conduct two public consultations on Banking
Sector -
telecommunications and market - Research in the last week
of September
and first week of October. Members of the Working Group
made
the following tasks:
Deliverable Task C3 'Smart
Card 107 of 110 final
i. Training for state recipients' banking sector -
Telecommunications (D. cocks, S. Karapetsas)
ii. Training for state recipients' market - research (S.
Karapetsas,
B. Karounos E. Vellidis)
iii. Training questionnaire consultation 'banking sector -
Telecommunications (S. Karapetsas)
iv. Training questionnaire consultation 'market - research (B.
Karounos)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 317
These will be sent to all members by Friday 6 / 9 and
finalized at the next meeting.
Manual "Smart Cards"
The Mr. Tsiambaos will incorporate the comments -
suggestions - fill in
Manual for "Smart Cards", which took time.
The next meeting was set on September 10, 2002 at 4:00
pm at
GRNET SA offices Mesogion 56 Ambelokipi.
7.5.5 Proceedings of the 5th Meeting, September 10, 2002
Present:
B. Karounos (NTU), pp Karapetsas (APR), P. Georgiadis
(University
Athens), D. cock (Intersys SA), A. Vogiatzis (Univ. of Patras),
G. Chasapidis
(World Organization of Greek Kyvernonafton (P.O.T.E.K), P.
Pantis
(INFORM P. Lykos), Ch Sioulas (ASYK SA).
Topics
Minutes of previous meeting
All participants agreed the minutes of the previous
meeting.
Public Consultation "Smart Cards - Buy & Research
Were informed about the actions they have done to organize
consultation. The invitation and the questionnaire sent to 160
recipients (Mainly universities and research centers and
institutions involved in European research programs).
Decided to send the invitation and the questionnaire to clubs
APR SESME GCS and to notify their members.
Also discussed the preliminary program of consultation,
which will finalized on Monday, 30 / 9.
Public Consultation "Smart Cards - Banks &
Telecommunications»
The consultation on 'Smart Cards - Banking & Telecom, will
become the Wednesday, October 9, 2002, 3:00 pm - 7:00
pm, at the central hotel of Athens.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 318
Over the next few days will define the place of consultation.
Decided to send the invitation and the questionnaire to state
recipients has been developed so far. (14 recipients)
The next meeting on the discussion on the program of
consultation "Smart Cards - Banking & Telecom" will be held
on Wednesday 2/10/2002, 7:00 pm at the Holliday Inn, at
the end of the consultation on 'Smart Cards -

market & Research.


7.5.6 Proceedings of the 6th Meeting, October 2, 2002 Present: B.
Karounos (NTU), pp Karapetsas __________( APR), P. Georgiadis
(University Athens), D. cock (Intersys SA), A. Vogiatzis (Univ. of
Patras), G. Chasapidis (World Organization of Greek
Kyvernonafton (P.O.T.E.K), K. Tsiambaos (Accenture), E. Vellidis
(INTRACOM) Sioulis C. D. Stathopoulou (e-Business Forum).
Topics Minutes of previous meeting All participants agreed the
minutes of the previous meeting. Assessment of public consultation
"Smart Cards - Market & Research Expressed by all members
present group expressed satisfaction both for participation and for
the concerns and issues discussed Public Consultation "Smart
Cards - Banks & Telecommunications» Were informed about the
actions they have done to organize Consultation: The invitation and
the questionnaire sent to 14 recipients. It also discussed the
preliminary program of consultation, which will be finalized on
Monday 7/10/2002. Public Consultation, "all involved"
Consultation with all stakeholders will be held Wednesday, the
30th October 2002, 9:00 a.m. to 2:00 pm, at the Hotel Holliday Inn.
Deliverable Task C3 "Smart Cards" 109 by 110 final was decided
to send an invitation to all players who were invited in previous
consultations and agencies involved in previous consultations. It
also decided to issue the relevant Bulletin Press the next meeting
on the discussion on the consultation program "Smart Cards - All
Stakeholders" will be held on Wednesday 9/10/2002, 7:00 pm at
the Holliday Inn, at the end of the consultation on 'Smart Cards
Telecommunication & Banking " 7.5.7 Proceedings of the 7th
Meeting, October 9, 2002 Present: B. Karounos (NTU), pp
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 319
Karapetsas (APR), P. Georgiadis (University of Athens stimio) D.
cock (Intersys SA), A. Vogiatzis (University stimio Patras), G.
Chasapidis (World Organization of Greek Kyvernonafton
(P.O.T.E.K), K. Tsiambaos (Accenture), E. Vellidis
(INTRACOM), N. Saridakis (YPESDA) Sioulis__________ C. D.
Stathopoulou (e-Business Forum). Topics Minutes of previous
meeting All participants agreed the minutes of the previous
meeting. Assessment of public consultation "Smart Cards -
Banking & Telecommunications » Expressed by all members
present group expressed satisfaction with the participation of
representatives from banking and telecommunications operators
and their own institutions, but the thinking and the issues discussed
focused mainly on the need for partnerships between institutions to
promote investment and application of smart cards. Public
Consultation, "all involved" were informed about the actions they
have done to organize the consultation: The invitation will be sent
out to all players who were invited in previous consultations and
agencies involved in previous consultations. Also decided to issue
relevant Press Releases Complaints epilythei
http://www.kepka.org/Grk/support/Complaints/c0412.htm The
KE.P.KA. protect consumer rights and intervene in its favor. When
the consumer is not satisfied with the quality of services or goods
received, the mediated KE.P.KA. solves. Daily advice to
consumers, inform and receive many complaints. Of these, a
significant number of resolved quickly and with only a simple
intervention by the KE.P.KA. Some, however, differences require
special effort to solve them. Below indicatively some interesting
cases: Financial Services The KE.P.KA. received the following
consumer complaint, relating to aggressive credit card issuing
banks, which no one knew what it is because the card appeared a
"plain logo. "We back the card you edited irregularly (because
there was none at my request) in my name and I reserve all my
legal rights. We inform you that a complaint was made in
KE.P.KA. - Consumer Protection Center because in your letter
does not indicate either a bank or lending rate. We send a
registered letter and the documents you and please do not repeat. "
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 320
Once discovered, after communication with the Bank of Greece,
which bank was, I forwarded the complaint on December 8, 2005,
the General Secretariat for Consumer Affairs, the Union of Greek
Banks and the Ombudsman for Banking - Investment Services. The
bank responded to us with a bulky letter, which, however, did not
give any substantive response to complaints. The KE.P.KA. in the
letter of reply, to the bank, said: ... In response to your letter of
18/1/2006, we note that the information consumers were
completely inadequate: 1. Consumers do not have to know the
logos of banks. 2. Nor, in a letter accompanying the card, or the
response file, the name of the Bank. Concerned only the logo,
which does not mean anything for the consumer. 3. In all your
mail, nothing tells the consumer, to rate SEPPE, right of
withdrawal, the identity provider and all its elements, such as those
arising from N.2251/94 on Canvassing contracts and contracts
from a distance . 4. It also appears as the reasonable question why
the consumer is not received by you, a copy of the alleged contract
consumer loans and credit cards? 5. Sending credit cards, including
PIN, by ordinary mail in accordance with the complaint, sent to
216/6.1.06 our paper, the Ministry of Development, and the
numerous telephone complaints we receive in KE.P.KA. We invite
you, then fix your practice and adjust to the Greek legislation on
consumer protection. Following this letter, the Bank has
undertaken: "... We would like to inform you in writing that on the
reactions we received from you and other consumers, considering
that the method of communication and delivery of our credit card,
though lawful, was not sufficient for the general public, we decided
to change the first letter of communication with our customers and
since last February has been put into production. The new way of
communication, the card is now sent via registered mail while the
client is informed of the reason the mission name (reminder of its
contract), it is even clearer that the card is issued to our table, and
how to activate the card by phone, while the file is already included
in the brochure repeat the terms of use, regardless of whether the
customer has activated or not. Examples of a consumer loan and
credit card, signed with our customers and the new first letter of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 321
communication are available on request. I say not willing to take
into account any of your observation for the purpose of improving
services offered to consumers and our customers. We are at your
disposal for any clarification " A consumer canceled her credit
card, having arranged all the debts. Six years after the cancellation,
received a bill, which had seemed to 23.94 euros. In this account,
says the date of the previous account, which was, indeed, 6 years
ago. Concerned that a consumer has used the KE.P.KA. which,
with the assistance of the Banking Ombudsman, secured the
removal of the alleged debt and a discharge certificate, so that a
consumer be enforced, against any arbitrary action by the Bank in
future. Credit card For a credit card from a bank, was a prerequisite
for the consumer or underwriting of real estate. The consumer,
listening, random, a member of KE.P.KA. explaining that there is
no compulsory insurance for a credit card, called the bank, cancel
the policy, cancel the amount charged in the card. The bank
refused, and for this reason, the Consumer sent in KE.P.KA. with
the operation of which, the Consumer acquitted from the charge,
and the policy canceled. Consumer member KE.P.KA. lost her
credit card, when he stole his professional bag. Soon realized the
theft, or 17 hours later, alerted the bank that issued the card. The
next day, the bank issued a new card and sent it by registered letter.
However, a month later, the Consumer was informed by a detailed
account that the time of the theft to the statement of loss, made
purchases worth EUR 1101.44. Firms, which made these purchases
were not made in any authentication or signature of the bearer and
the legitimate holder of the credit. The consumer just has this
breakdown, made a statement to the police. The Bank, meanwhile,
began to attract a certain amount. Consumers turned in KE.P.KA.,
having got a negative response from the Bank, cancel the amount
charged, to his credit. Subsequently, the Bank argued that under the
contract concluded with the consumer space of 17 hours is not
considered "immediate" declaration of loss, but gross negligence.
The correspondence KE.P.KA., relevant agencies, lasted eight
months, but ultimately, the Consumer vindicated. The Bank of
antilogise the amount of EUR 1101.44. Insurance Company
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 322
Consumer member KE.P.KA., experiencing problems with an
insurance company. The repair of the car after an accident cost, the
consumer, 1.822 euro. The insurer, however, compensate the
consumer with 1,500 euros, citing the age of the car ('87 model).
The Consumer rough around half-time discussions and
negotiations, which have not been anywhere. Then the KE.P.KA.
intervening paid, the consumer the sum of 1822 euros, was paid to
the workshop. Insurance Company Consuming KE.P.KA. member,
was involved in an accident, liability, which brought the truck
driver who struck the car of the complainant, which had stopped at
traffic lights. The driver took over fully responsible for the accident
and signed a declaration on insurance. The car was driven, in the
garage and repair the damage cost 2402 euros. The insurance
company would also be willing to pay only 2300 euros, citing the
age of the vehicle (model 2002). The problem raised by a
consumer, to the KE.P.KA. and after-effects which were related,
the issue was paid, in consuming the entire amount paid for the
repair of the car. The period from June 1, 2007 to May 31, 2008,
there were 322 complaints and from June 1, 2008 to May 31, 2009
were 1507 complaints. QUESTION  TO THE MINISTER OF
DEVELOPMENT According to the annual report of the Consumer
Ombudsman, have risen excessively complaints against banks and
insurance companies. These records in the Annual Report by the
Consumer Ombudsman. This year's report, published Monday, July
27, for the period from June 1, 2008 through May 31, 2009. The
complaints against banks more than quadrupled compared with the
corresponding period last year. The period from June 1, 2007 to
May 31, 2008, there were 322 complaints and from June 1, 2008 to
May 31, 2009 were 1507 complaints. As a percentage of 56.4% of
the complaints were unfair, illegal, or unspecified charges related
to poor control of the trading taftoprosopeias. Overall, consumer
was 88.8% of the complaints and 3.9% was in favor of the supplier
and 7.3% is not resolved after exhaustion of all means of
conciliation. With regard to insurance services, the Authority finds
more than double the consumer complaints against insurance
companies with 835 against 292 in the corresponding period last
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 323
year. As a percentage of 33.8% were unilateral changes to contracts
of life insurance, high premiums and annual adjustment
terminating annual rate policies while 33.2% were partially or not
losses. Overall, 82.5% rate of complaints found in favor of
consumers at a rate of 7.9 for the supplier but not resolved in 9.6%
of cases. In view of these does the Minister: 1. What measures are
taken to protect consumers against banks and insurance
companies? 2. In light of the foregoing, it intends to take further
action and if so what are they to protect the consumer from the
arbitrariness of banks and insurance companies? PRESS
RELEASE "Complaint for Unlawful and Abusive Collection of
Purchasing Bank" Because no final judicial decisions and the
recent decision of the Minister of Development, referred to in
terms of abuse to some banks, but they still respected by the banks,
especially from the Commercial Bank (Branch of Chania),
according to branded consumer complaints , continue to receive
1.50 Euro to supply "when consumers make a deposit into an
account for a third party, and not only officials generate the correct
treatment of consumers, who are recalcitrant to accept to pay the
etsithelika a premium, but are and violations of the Penal Code, the
general behavior, consumers, call this Bank immediately stop this
practice, and according to the following decisions have held that
unfair requirement, both to inform consumers on how to manage
the problem. How should we respond I. - may write to request our
branch disputing the amount with which unreasonably, illegally
and improperly charged and ask reversal. 2.-addressed to Mr. OP
YMCA with proof of payment of 1.50 euros, which we needed and
we paid. The non-observance of legislation relating to unfair
conditions imposed on consumers by banks, open road is accepted
by the OP Ms Khan for collective actions and demands of
consumer rights and complaint to the competent authority
responsible for imposition of administrative measures. Here are the
decisions of the Greek Courts: * 430/05 and 1219/01/15/2007 Ol.
Supreme Court of Cassation, * 5253/03 and 6291/00 of Appeal of
Athens * 1119/02 and 1208/98 the regional court of Athens, *
961/07 of the regional court of Athens, the party has become
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 324
irreversible, * 1896/2007, 3441/2007, 726/2004 of the Athens
County Court, * Corresponding positions Consumer Ombudsman,
* And from G1 24/06/2008 yp.ar decision of the Minister of
Development, For more information of each consumer can
apeftheinete the OP at T. HAN Phone 2821092666 The President
of the OP K. HAN Joanna Melaki Class action against banks by the
Consumer Association and the Municipality of Volos   Written by:
magnesianews.gr 07/09/2009, 19:45 Class actions against banks
will deposit the Consumer Association of Volos, the claim for
repayment, ie the money illegally and improperly withheld from
borrowers. Already in class actions involving 60 borrowers, as
announced in a joint press conference Prefect Apostle Papatolia
and executives of the Consumers' Association and, according to the
Office of Consumer Prefecture, from January 2009 until today have
been over 3,000 and telephone complaints. As pointed out by the
Prefect "by the complaints and petitions of citizens accept, it has
become apparent that many companies, even the broader public
sector, arbitrary and offend against consumers. On the other hand,
the state, namely the Ministry of Development and the General
Secretariat for Consumers, it seems weak, if not reluctant to impose
rules. Illegal Charges stated that Mr. Papatolias that banks charge
illegally and improperly: -Borrowers with prior authorization and
file charges with penalties discount, -Savers at the expense of
account, banking costs to third parties, costs for accounts not
running etc. The prefect asked the Ministry of Development and
the Bank of Greece, to ensure compliance of Greek banks with the
requirements of society and to impose penalties on banks that
arbitrary and banks to respond directly to their obligations arising
from the liquidity of 28 billion granted to them to help businesses
and individuals to tackle the economic crisis and to pursue
reductions in the rate of the European Central Bank to refrain from
illegal modifications of loan agreements and to comply with laws
and court decisions.

As happened in the past, using frequencies and collars with copper


nails which were based on the explosive mikro-krystal who
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443
ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 325
whistling copper pin at the neck of the prisoners nefelim EL led
them to Tartarus where the sentences, using the same technology
and pistrotikes cards are now attempting to Nefelim trap people
filling their minds with misinformation and anxiety that creates
free rzes air oxidation of the TEM and kills but the WEATHER IS
EGYC. LIAPIC PANAGIOTIC

ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

You might also like