ΜΥΣΤΙΚΟ ΟΠΛΟ ΡΑΔΙΕΝΕΡΓΣ ΑΚΤΙΝΟΒΟΛΙΕΣ

ΜΥΘΙΣΤΟΡΗΜΑ ΑΠΥΘΜΕΝΗΣ ΠΡΑΓΜΑΤΙΚΟΤΗΤΑΣ

1

Mε πολλή αγάπη αφιερωμένο

При большом количестве

посвященный στους γονείς μου любви мои родители στους ΕΛ_ληνες Греки στη Νatalia, Οlga, Οnder В Наталья,Οльга,и Ондер στους Συνεργατες μου к моим коллегам
Με Τιμή / По цене ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ

Συγγραφέας ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ Τίτλος ΤΟ ΠΕΙΡΑΜΑ ΤΗΣ ΦΙΛΑΔΕΛΦΕΙΑΣ Δ/νση Κ.Βάρναλη 12, 15121 Πεύκη, Αθήνα Τηλ. 210-6149149 Κιν. 6937097443 Ε-mail real_estate_liapis@yahoo.gr ΔΙΑΘΕΣΗ 210.8065618 6937097443

Λίγα λόγια από το συγγραφέα / Несколько слов
ΜΥΘΙΣΤΟΡΗΜΑ ΑΠΥΘΜΕΝΗΣ ΠΡΑΓΜΑΤΙΚΟΤΗΤΑΣ. ΔΕΝ ΠΩΛΕΙΤΑΙ. Η ΓΝΩΣΗ ΔΩΡΙΖΕΤΑΙ.

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

2

Φίλοι μου με το σύγγραμμα τούτο, και γνώση, που φυλάσσουν τα σκονισμένα Ελληνικά χειρόγραφα Πλάτωνα Αριστοτέλη κι άλλων αρχαίων φωτοδοτών μέσα από αριστοτεχνικά συνταιριασμένα γεγονότα της οικονομίας, της θρησκείας, της Ελληνικής ιστορίας και μυθολογίας, των επιβεβαιώσεων της ιατρικής και των τις πολυδιάστατων κοινωνικών δομών σας παρουσιάζω με επεισοδιακό τρόπο τους κύκλους των 50 ετών που ανατρέπουν και το πολιτειακό γιγνεσθαι, καταστρέφοντας και αναδημιουργώντας περιοδικά τη κοινωνία όταν η εκμετάλλευση πόρων γης κι ανθρώπου από άνθρωπο φτάνει σε οριακό σημείο που προσβάλει τη ίδια τη φύση. Σας υποδεικνύω ακόμη οικονομικές συμπεριφορές με τις οποίες είναι εφικτό να περάσετε σχεδόν ανώδυνα μέσα από το παλιρροιακό αυτό οικονομικό κύμα, ετοιμαστείτε φίλοι μου για τη καταρευση του δολλαρίου και μι βουτιά χωρίς κανένα δίχτυ ασφαλείας, ιστορίες απύθμενης πραγματικότητας Με μια σειρά γεγονότων πλάνης για τους αστερισμούς, και πιθανής παραποίησης της Κοσμογονίας, με συμβάντα στα οποία εμπλέκονται οι ΝΑΖΙ και οι πιθανές βάσεις τους στο Διάστημα, Ο πρόεδρος Ομπαμα, και το νέο δόγμα Πανθρησκείας που προωθείται σε συσχετισμό με την λατρεία Υποχθόνιων όντων αποτελούν ένα νέο κάτοπτρο μέσα από το οποίο δύναται να ειδωθε το σημερινό γιγνεσθαι Η αλματώδης εξέλιξη στους τομείς του MIND CONTROL, των chip EMV του Bill Gates στις τραπεζικές πιστωτικές κάρτες, το Αναδυομενο Τραπεζικο Συστημα σε σχέση με το Οικονομικό ΚΡΑΧ της Αμερικής, ο ΣΙΩΝΙΣΜΟΣ, και η ΝΕΑ ΤΑΞΗ ΠΡΑΓΜΑΤΩΝ του 4ου ΡΑΙΧ, καθώς και οι ΑΝΘΡΩΠΟΙ ΚΛΩΝΟΙ - Μen in Black, και η CIA σε σχέση με τα αντιδραστικά κι αντικυβερνητικά συνθηματα σε τοίχους προσδιορίζουν μια νέα πραγματικότητα, η οποία για να ελεγχθει ωθεί τις Αστυνομικές Δυνάμεις στη χρήση των από αιώνες κρυμμένα Ηχητικά Οπλα των αρχαίων Ελλήνων, τα οποία αναπτύχθηκαν από τον ΕΛΛΗΝΑ Πυρηνικο επιστήμοινα Γ.Γκιόλβα. Τα δημιουργήματά του Σχέδιο «Βέλος» (ηχητικό κανόνι) Και το ηχητικό «Αρτεμις», ως παρουσιάζουν πηγές του διαδυκτίου παρουσιάζονται κάτωθι διεξοδικά και σε σχέση με Βιολογικό Πόλεμο από Αεροσκάφη των ΗΠΑ –Ψεκασμοι από Αερα χημικών και μικροβίων πάνω από μεγαλουπόλεις. Με τον Μπαντουβά πρότυπ[ο κρητικής παλικαριάς βάσει των οδηγιών του Μαχατμα Γκάντι, γίνεται προσπάθεια μείωσης των βλαπτικών συνεπειών των αντισυνταγματικών αυτών δραστηριοτήτων οι οποίες με χρήση Γενετικής Βιομηχανίας, εκτεταμένων πυρκαγιών, δόμηση μεγαλουπόλεων ως τα νέα Στρατόπεδα Συγκεντρώσεως του Δ Ραιχ, εφαρμόζεται το γεωστρατηγικό σχέδιο εφαρμογής νέου πολέμου στα ΒΑΛΚΑΝΙΑ λογω ΚΟΣΣΥΦΟΠΕΔΙΟΥ όπου

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

3

με το σχέδιο «Μπλέ Ακτίνα» κατόπιν των επερχόμενων ταραχων μέχρι το τέλος του 01/2010, θα χρησημοποιηθούν νέα όπλα χαμηλών συχνοτήτων της Αστυνομίας με φυσικές συνέπειες των ακτινοβολιών στον ανθρώπινο οργανισμό- ΚΑΡΚΙΝΟΥΣ Η όλη διαμάχη θα οδηγήσει σε αναβάθμιση κι επικράτηση της Ρωσίας κι Ελλάδας στα Βαλκάνια, και στην οικονομική και πολιτιστική τους κατάσταση με ταυτόχρονη υποβάθμιση των ρόλων Γερμανίας κι Γαλίας, κι εξέλιξη της κίνας Mε Τιμή ΛΙΑΠΗΣ Παναγιώτης

DON’T KILL MOSKITOES. OTHER DRINK YOUR BLOOD

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

4

Мои друзья в этой книге, и знания, которые держат пыльных греческих рукописей Аристотеля, Платона и других древних fotodoton через мастерски смешаны события экономикой, религией, историей и греческой мифологии подтверждений медицины и многомерной социальной структуры вы представление с эпизодическим образом циклами в 50 лет, революция в основной политикой, разрушение и восстановление общества, журналы, где добыча ресурсов, земли и человека человеком, достигает предела, который затрагивает саму природу. Мы даже экономическое поведение показателя, с которым можно провести практически безболезненно через эту экономическую приливная волна, получить готовый моим друзьям за краха доллара и заработной платы, погружение без каких-либо защиты, рассказы реальность с огромным количеством ошибок событий для группировок, и возможной фальсификации космогонии, инцидентов, связанных с нацистами и возможности базы в пространстве, Президент Обама, и новая доктрина Panthriskeias запущен в сочетании с почитанием адского существа новое зеркало, через которое можно увидеть текущего учета быстрого развития в области контроля разума, чипом EMV Билла Гейтса на банковских кредитных карт, страны с формирующейся банковской системе в связи с финансовым кризисом в Америке, SIONISMOS, и нового порядка 4-го Рейха, и ЛЮДИ клоны Люди в черном, и ЦРУ, чем реактивные и антиправительственные лозунги на стенах определить новую
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

5

реальность, которая ведет к контролю применения полицией веками скрытые винтовки звуки древних греков, разработанной от греческого epistimoina ядерных C. Gkiolva. Творениями Проект "Стрела" (звук правила) и звуком "Артемида", как Интернет-источников подробно представлены ниже в связи с биологическим оружием из американских самолетов распыления химических и микробных воздуха над городами. По модели Bantouva [Критского храбрость в соответствии с инструкциями о Махатме Ганди, пытается уменьшить вредное воздействие этих антиконституционной деятельности помощью генетики промышленность, обширные пожары, строительство новых городов в концентрационных лагерях рейха D, применяется геостратегического плана реализацию новой войны на Балканах из-за Косово, где проект "Голубой луч" на предстоящих беспорядков до конца 01/2010, новое оружие будет chrisimopoiithoun низких частот полиции с физическим воздействием радиации на организм человека KARKINOUS весь спор будет Выпускник и распространенность России и Греции на Балканах, а также экономической и культурной ситуации одновременной деградации роли Германии и Гала, и развитие Китая По цене Liapis Panagiotic

ΜΥΘΙΣΤΟΡΗΜΑ ΑΠΥΘΜΕΝΗΣ ΠΡΑΓΜΑΤΙΚΟΤΗΤΑΣ

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

6

ΠΡΟΣΟΧΗ
ΣΗΜΑΝΤΙΚΕΣ ΕΠΙΣΗΜΑΝΣΕΙΣ ΠΡΟΣ ΤΟΝ ΑΝΑΓΝΩΣΤΗ 1. Το παρόν έργο αποτελει ΜΥΘΗΣΤΟΡΗΜΑ Απύθμενης Πραγματικότητας 2. Αποσαφηνίζω, Δημιουργημα Φαντασίας 3. Κάθε ομοιότητα με πραγματικά πρόσωπα, γεωγραφικα σημεία και γεγονότα είναι φανταστική, καθαρα συμπτωματική, μη υφιστάμενη στη τρέχουσα πραγματικότητα και το παρελθόν αυτής. 4. Τα Πνευματικά Δικαιώματα επί του έργου προστατευονται από το εν ισχύ Σύνταγμα, νόμους και νομολογία 5. Απαγορευεται η ανατυπωση και διάθεση μερους ή όλου του εγγράφου χωρίς την πρότερη γραπτή άδεια του συγγραφέα και τη σύναψη συμβάσεως οπου προσδιορίζονται αριθμητικώς κι ολογράφως η αμοιβή του συγγραφέα, τα δικαιώματα και αμοιβή του Ελληνικού κράτους, η διάρκεια της συμβάσεως και τα συμβαλλόμενα μέρη. 6. Το έγγραφο φέρει κατοχυρωμένο εμπορικό σήμα 7. Το έργο διατίθεται μόνο για ιδιωτική χρήση, απαγορευεται η δημόσια ανάγνωσή ολου ή μέρους του. 8. Το έργο ΔΩΡΙΖΕΤΑΙ στις βιβλιοθήκες του Ελληνικού Κράτους εφόσον ζητηθεί και τηρηθει η προβλέπουσα διαδικασία. 9. Προς τους Ελληνες πολίτες: To βιβλίο δεν πωλείται από βιβλιοπωλεία ή άλλα σημεία λιανικής πωλήσεως. Η ΓΝΩΣΗ ΔΩΡΙΖΕΤΑΙ. 10. Ο Ζητών το βιβλίο αναλαμβάνει τα τυπογραφικά έξοδα αυτου και τα έξοδα αποστολής του. 11. Ο ΣΥΓΓΡΑΦΕΑΣ ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ ΔΕΝ ΛΑΜΒΑΝΕΙ ΑΜΟΙΒΗ (ΧΡΗΜΑΤΑ) ΓΙΑ ΤΗ ΔΙΑΘΕΣΗ ΤΟΥ ΕΡΓΟΥ
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

7

12. Το βιβλίο ΔΕΝ ΕΧΕΙ ΑΝΑΤΡΕΠΤΙΚΗ του ισχύοντος συστήματος έννοια, αλλά αντιθέτως ΚΑΘΑΡΑ ΣΥΣΠΕΙΡΩΤΙΚΗ, όλων των Ελλήνων του Πλανήτη γή, 120.000.000 Ελλήνων προς τη δημιουργία ευνομούμενης κοινωνίας ως αυτή προσδιορίζεται από τους Δημοκρατικά, Κοινοβουλευτικά Εκλεγομένους Αντιπτοσώπους του Λαού (πρωτογενη μορφή εξουσίας) 13. Η ΕΛΛΑΔΑ ΠΑΡ ΟΛΑ ΤΑ ΠΡΟΒΛΗΜΑΤΑ ΤΗΣ ΥΠΑΡΧΕΙ ΧΑΡΗ ΣΤΗ ΣΚΑΝΔΑΛΩΔΗ ΕΥΝΝΟΙΑ ΤΗΣ ΠΑΝΑΓΙΑΣ. ΕΛΛΗΝ ΕΙΝΑΙ Ο ΓΥΙΟΣ ΤΟΥ ΔΕΥΚΑΛΙΩΝΟΣ, ΤΟ ΦΩΣ, ΟΣΟ ΥΠΑΡΧΕΙ ΕΣΤΩ ΚΙ ΕΝΑΣ ΕΛΛΗΝΑΣ ΥΠΑΡΧΕΙ ΕΛΠΙΔΑ, ΥΠΑΡΧΕΙ ΔΙΚΑΙΟΣΥΝΗ. ΑΜΗΝ.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

8

Have you ever thought what accounts for the rapid deterioration of your health; You rat, not the society that says the Communist Party, however, but surely you do. Welcome to the nightmare of hidden pragmatikotitas.Skeftikate what ever you are free to eftnomoumenig democratic society, how many square meters ze'ite true; 100sq.m apartment; Work 600; Come 1500 and put other places; Pass is all your life in two acres of comfortable personal cell and die there; And everyone else; Someone who will never see and die in his own ekainos corresponding two acres or more with fewer amenities; And are they really comforts or guards marksmen adeialeipta put on you; And what these shooters; Those who worked hard to get close to ask you to name a status symbol on the other prisoners, and eventually you normally whipped until fall ikmada without power. Are your electrical appliances. Did you ever go to any electrical appliances when we think that "die" when not working? • What happened to your old tileotasi; old microwave oven fly away; Your first cell; The old your labtop; Did you know ... ... Each device when the throw garbage charge save the environment and our health in ways you never imagined? Or that ... - Each computer monitors are 1.36 to 3.6 pounds of lead and that lead can cause damage to kidneys, liver, blood, dermatitis - allergies, damage to lungs - permanent breathing problems and carcinogenesis. Leave around your apartments snipers shoot you with their comfort and every day to very accurately - 22% of the mercury consumed each year worldwide is used in electrical and electronic equipment. Mercury can be easily accumulated in living organisms and into the food chain through fish. Causes chronic problems and brain injuries. - Asbestos found in electrical appliances (toaster, irons, electric coffee maker) older technology - electric heaters and other heating devices, are carcinogenic material, causing contamination of the gas horizon and a strong toxicity when in contact with eyes - Skin Who came; Hello, Eseis.Kalosirthate in your nightmare Cities, Chambers of exhaust gases Suspended particulate matter, benzene and ozone threatens the inhabitants of large cities without breath at risk of becoming residents of the basin of Athens due to air pollution, which shows the explosion of the snail's pace at which the withdrawal goes old cars, daily traffic jams and ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 9 the large number of new vehicles coming into circulation. Mark with the Fourth Reich bring much smarter than C. If there is no such thing; Of course you were born to this, live each day, up by ar.prot. document the final days of 1944, and indeed works very successfully as a Hitler to exterminate the population had teratio oikonomko costs for both the poleiki the machine and for srtratopeda concentration, now, see Chapter urbanization, the inmates of the camps by erring the propaganda of the media go in their own cities, working to sxklira apokltisoun all means kill them every day and alienate socially. You start to see things from another perspective and to feel uncomfortable; You're right, something like this happens. The most recent incidents involving pollution in particularly high concentrations of ozone and particulate matter, while there is a problem with the carcinogen benzene as shown by measurements of the National Observatory of Athens. More specifically, on Tuesday evening from 17.00 to 20.00 exceeded the ozone concentrations at Eleusis: Prices touched the 207 micrograms per cubic meter of air exceeding the threshold of public awareness by 27 micrograms. Moreover, breaching the specific pollutant for long-term goal of health identified in the New Smyrna (128), Maroussi (129) and Agia Paraskevi (133). On the same day the concentrations of particulate matter PM10 in Patissia reached 79 micrograms and the average daily price in accordance with European Directive should not exceed 50 micrograms over 35 times a year. Feature is that in 2008 recorded in Aristotle overshoot in the fine 163 days in Likovrisi 147 days, 124 days in Maroussi, Koropi 45, 21 and in Thrakomakedones Agia Paraskevi 20. Particularly Eleusis noted that while the average annual ozone levels appeared stable at 44-48 micrograms from 2004 to 2007, last year amounted to 64 micrograms. Other areas identified increase in average annual ozone concentrations compared to 2007 is Liosia, Agia Paraskevi, Likovrisi, Piraeus, New Smyrna and nbspThrakomakedones where there are higher prices, according to official data of the Ministry. "I live in Athens" Bravo!, Nice environment you choose, come and good soul! "One of the air pollutants considered especially dangerous and which is seriously the EU is benzene, which is one of the carcinogens linked to leukemia. Comes from old technology cars that are damaged in the catalysts due to congestion recorded high concentrations in many districts of Athens, "says" new "Dr.. Michalis Petrakis, director of the Institute for Environment and Sustainable Development National Observatory of Athens. How about you guys, my car is the pride and my future better than my wife is one who kills Judah; My friend and Judas kiss beautiful, yes to kill you and your children there ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 10 is no doubt about it C then change it to get a new one. My poor friend, you who afis4s the Sun Medio volodernei to the village, the new that will get jeopardize your life on other banks for five years, even when the pay back will have to buy new again. Vicious circle. But this is slavery. Am think, welcome lirthes the slave society of Athens today in the annual report of the Division of Control of Atmospheric Pollution and Noise of the Ministry in 2008 stating that "the limit established by the Directive on benzene will take effect from 1/1/2010. Until then placed indicative limit values per year, gradually reduced in order to achieve compliance with new limits on 1/1/2010. It has exceeded the target limit value (7 micrograms) in 2008. Note that the only station in Athens which made measurements of concentrations of benzene found in Patissia and, according to the Ministry, the average annual value for 2008 amounted to 5.4 micrograms. Measurements of concentrations of benzene in the Redi last year between July and September, "said Dr.. Petrakis and supplements that these measurements using the DOAS special body of the Institute of Environmental Research. The results of this record showed that the average price of benzene in the Redi in the period of measurements in up to 10 micrograms, the maximum value reached 21, ie three times higher than the indicative limits for 2008. BENZENE considered especially dangerous pollutant, is one of the carcinogens and comes mainly from vehicles obsolete. http://www.tanea.gr/default.asp?pid=2&artid=4522524&ct=1 Manager architectural design "I create in my mind as the ideal, I want to touch, the picture of a beautiful giraffe. Why has four legs rest on the earth. It flies to manage to absorb. Sometimes it might look like is still some instability. But it stands firmly. He has time to absorb the substance of the earth, the needs and realities, be it mud or anthosparto the prairie, without razed by weight. Furthermore, it has its head high in the sky. This is also its food, has no need to bend. He looks away, has a vision, as we should have we, and our food is more spiritual, more intangible. And finally, somewhere in between has a heart. Why architecture without a heart I do not think it can be. Alexander Tombazis stop global warming gathering against waste incineration plant. What is this; In two words poisonous gases in atmosfaithra you kill and cause cancers. Enjoy it. The company "ILEKTOR" proceeds to build a plant burning waste at Thebes. Mobilization on Tuesday organized by the party organization Thebes of the Communist Party organized the gathering next Tuesday, July 21, the party organization Thebes of the Communist Party's central square, on ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 11 the promoted construction waste incineration plant in the already overcrowded area by a private company. In a region saddled with hexavalent chromium, heavy metals, etc. is an ongoing crime, even attempted to build a plant burning waste. Application for the Energy Regulatory That company "ILEKTOR" subsidiary "Aktor" intends to proceed with the construction of waste incineration plant, according to its application to the Regulatory Authority for Energy (RAE). This confirms the complaints of Thebes Party Organisation of the Communist Party, and the relevant articles of the 'P' (6/6/2009 and 10/6/2009). Evolution, which is in contrast to the claims of the company by letter (10/6/2009) states: "We state categorically that our company does not intend to build a waste incineration plant in the area of Thebes, let alone plans to build" Factory Hazardous Waste Combustion. " Instead, our company intends to create a unit of energy use of biomass residues that agricultural production and raw secondary fuel-rich (more than 80%). "These fuels contain no toxic substances, heavy metals and free from contaminants and not have aggravating health products. However, these materials are now burning with no protective measures in the fields or thrown out of control in streams and other public areas, creating along with other materials, contamination of groundwater and environmental damage in the region. From the time of Christ even the Zionist Jews had devised a plan to throw off and destruction of the Roman Empire and then the subjugation of the entire planet under Jewish kyriarchia.Kai This will be achieved by the number 666 was applicable in each world to mark absolute obedience to the commands of Zion and the expected king of the Jews is the antichrist. Nowadays BAR CODE SYSTEM entered into every single product. Strained these days to plan a little time for the system to invade, and in our personal lives and even our bodies. Initially, the method of linear numbering. Then a bug to track satellites. The incredible reason is this: even if you get lost, we will save Plot Microsoft: HealthVault + VeriMed = Cancer; Plot Microsoft: HealthVault + VeriMed = Cancer; H database of medical records to HealthVault Microsoft, will be upgraded to include VeriMed human-embedded tags RFID, allowing physicians to have direct and quick access to medical records of the unconscious patient with a ΤΗΛ. +30.6937097443

ΠΑΡΑΓΓΕΛΙΕΣ

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 12 quick scan of the arm. The VeriMed consists of an RFID tag embedded in the human arm and responds with a 16-digit identification code to the digital frequency of 134KHz. This code can be identified through the website VeriChip will soon be able to be linked to medical records that are stored in the system HealthVault from Microsoft.

Microchips-battery
The microchips require electricity to operate. They are powered by battery life diminished by them and made them virtually useless. The team at MIT but has managed to create microchip that works with the body heat. The new construction is very low voltage and battery can be recharged by the heat of the body. Thus an implantable microchip will have virtually unlimited operating time

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

13

Microchip

and

diseases
Companies that promote the use of microchip accused of concealing a 'dark' elements for micro-construction.

It is said that the microchip can cause cancer and other diseases. Already in the 90s series X-Files dealt with this issue. It would not have made such a reference if there was no evidence on the issue. Such lines as they are fiction, they support the hypotheses in science. It is natural that companies fail because this could be harmed financially by the uproar that broke out. Objected saying that this is all Bogus, and that is a figment of imagination of those involved with "conspiracy theories". Microchip and benefits Proponents of the use of Microchip from people saying that there are advantages: 1) Search lost children via satellite. 2) Monitoring of chronic patients. The chip transfers data such as temperature, heartbeat, etc. in the patient's doctor. 3) The chip can play the role of identity cards for bill payments and shopping. So it's not likely anyone to steal since they will carry with him cards or money. Microchip and disadvantages Those who argue that the implantation of microchips in humans only positive results may be there is a reply. Based on the rapid development of a microtechnology chip could do the following imaginary (?) Things: 1) may indicate the position of a continuously monitored in order to ease his movements. Thus violating privacy. 2) Make, through the stimulation of nerves, electronic manipulation of the individual. There is already technology that causes dizziness, headaches, hallucinations, panic attacks, anxiety and many other psychological problems in healthy people. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 14 3) To cause physical health problems of deliberate interference with the nervous system. 4) To cause health problems with the continuous emission of even lowintensity electromagnetic radiation

The Fourth Reich

Secret report shows how the Nazis planned fourth Reich (7 November 1944) ... The EU paper is old and fragile typing while they are highly visible and fading. But the U.S. secret service documents EW-128 Pa has kept cold, almost from the time drawn up in November 1944. The document, also known as the Red House and a detailed report on the balance of the secret meeting at the Maison Rouge Hotel in Strasbourg on 10 Avgoustou1944. There, the Nazis talked to an elite group of German industrialists plan for Germany after the war, and the (preparation of the Nazis) to return to power, and work for a strong German Empire. In other words, the Fourth Reich Repression THROUGH LAWS London) Powerful governments and armed groups deliberately incite fear to erode human rights and create an increasingly polarized and ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 15 dangerous world, said Amnesty International is presenting the 2007 Annual Report, the annual assessment of human rights throughout the world. Today, after 2 years nothing has changed

0 H

theory formulated in 1992, several days after the marketing of Windows 3.1. This is because I noticed that if someone wrote the NYC using Wingdings, it would appear on the screen of a skull, the star of David and a raised fist with the thumb. The symbols are then interpreted as approval to the murdered Jews living in New York.

Mind control and technology
Our brain, although extremely complex, it is still a "computer" that works with electricity. If you speak to a computer creating a short circuit then the computer will stop working correctly. With the right technology can produce micro-currents in the "wiring" of brain synapses leading to illusions as to the part affected. This is to be "heard" the voice of a god! Or is uncontrollable panic, etc. The technology developed under a "non-lethal technology" which allows the handling "of the people especially when they complain about things imposed on them by their governments. The victims of the attack did not prove to have been attacked with such technology. Of course demonstrations and protests ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 16 can be dissolved easily "without opening tip. A more straightforward Mind control is the one caused by a government propaganda. With proper manipulation of words and images can create a false idea of reality. So people will not respond to an unpopular and perhaps the very welcome.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

17

Devices to record a lifetime Within a decade we will have the opportunity, through a device would have the matchbox size to store each transaction and our word. It is a discovery of Roy Want, a former researcher of Intel, and the name has been given is "valet". As stated Want: «The storage capacity of computers increases al-matodos. By 2012 you can have a device that you can tape recorder discussions throughout your life. Currently on a trip I made in the region of Attica Pine visiting banks seeking to issue a credit card WITHOUT THE EMV CHIP defpirxe not a one that tells me everywhere as a guide and decision of VISA and axairetos applied everywhere without distinction ILLEGALLY one that KATASTRATIGONTAS already signed contract EKDOSEOS CARD Ratifies THE OLD CARDS IN ALL THE GREEK Territory ADOPT NEW BOARD OF Corey to record Personnel YOUR DATA NOT YOUR OPTIONS FOR inform or grant MANUAL OF USE The preliminary NEW CARD WITH THE TECHNOLOGY IS NOT EMV SYMORFOSI TO STATE LAW The "valet"-SPY will consist of a storage unit of high capacity, which has a powerful processor. It will also have wireless communication devices and can even be plugged into any PC or mobile phone. As for the space it occupies is very small and could, for example, the whole device has the appearance and size clock. Apart from recording capabilities, this amazing device can inform the holder about things that interest him, as commodity prices, equities, various services and news, and even be able to print to wireless printers. However, something of concern is whether its use will ensure the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 18 confidentiality of personal data of the holder. This is because in a lawful manner that would require any authorities to examine the data containing the device, on the pretext of resolving a legal dispute, in solving a crime or anything else. The devices will be delivered to market in the coming years, said Want: «I would have felt surprised if you do not see these devices in stores over the next five years. Most customers use a credit card for payment of the value of products purchased. The card is but one secret to fiendishness brown stripe on the back. Can be written there 5Mv or 100,000 words that the whole volume. This will tell progress but What We write the magnetic MY BOOK 1.3 x 7.6; WHO WILL BE A WRITER; And the hours are still flowing to the cardholder to pay a large part of the value of each product in each transaction, roughly 20% of the issuer of Visa MasterCard American Express, and information on sysorefontai brown tape - disk. you capture the image; WHAT IS THE NEW MONEY SYSTEM; They have money, we have the system, with good; Spoof first grade. Another striving, and other benefits from a sweat about it. I will continue to write books with the machines of the enemy until they blow them and causing increasing damage to their classes. Knowledge is not imprisoned. Instead have the privilege, after an initial number of people who must be taught, creating a "critical mass" as they say in physics and starts the automatic distribution without the slightest attempt to conveying it. The true always adds a little extra lie. If you fight the rise and ignore the damage your systems. If you fight the rise and ignore cancer leading to a slow death you. Irreversible. We are all registered as numbers in computers and automated teller machines, vending machines operate 24 hours anywhere in our service and filing. I almost escaped, the new system will operate without cash and undocumented, come to prove anything. Even today we impose conditions, have the right to withdraw a certain amount at a certain time. But when we do not deposit above the roof. LAMOGIA. My friends suddenly closed for a week of your accounts to show the faces of the bankers to stretch carpet to the press. The Government, on the other side has withdrawn its high-value banknotes and withdraw gradually becoming smaller. Do not kill the mosquitoes, others drink your blood "The diplomas copies ktontai" ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 19 (On the wall near Gizi) "The best school that illuminates what is burning" (4th Lyceum, Kalamata) "Christ taught and died. Teachers what they expect? " (NTUA, Athens) "Lifestyle is the magic of zero makes number" (Gazi, Athens) "Keep Athens clean. Throw your garbage in Piraeus " (Metaxourgio Athens) "Participate, participate, participate, participate, participate, decide" (Sinope Street, Athens) "Those who think they know everything, irritate us who know" (Alexandras Avenue, Athens) "If mistakes teach, then I have great literacy (Street Benaki, Athens) "The walls have ears and ears walls" (Psirri, Athens) "Do not expect everything from the Police. Hit yourself " (Papasotiriou, Stournara Street, Athens)

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

20

“ The country is destroyed by indifference, but what I care about me? " (Hill Strefi Athens) 20.000 conditioners - cancers with 35% subsidy and signing Hatzidakis * They have already sold 25,500 devices (16,650 at Athens) and the adoption of new funds from K. Hatzidakis offered a "breath" in the business and additional opportunities for consumers Column Chris conditioners 20.000 Other new technology will have the opportunity to get consumers Attica 35% subsidy given by the Ministry of Development. The Minister Hatzidakis decision approved the allocation of additional funds 5 million to cover most needs people to replace old air conditioners with new appliances. "I change the C goes very well," noted Mr. Hatzidakis announced the decision to allocate more money. According to available data (through 17 June) the agency administering the program have so far sold 25,500 air conditioners nationwide, including 16,650 in Athens. In the eight poorest regions (Thessaly, Crete, Epirus, Eastern Macedonia and Thrace, North Aegean, Crete, Western Greece and the Peloponnese) 4618 devices sold in Central Macedonia, 2825, in St. Greece 1008, in N. 297 Aegean Macedonia and D. 102. With the approval of additional funds being offered a "breath" on the industry, and additional opportunities for consumers who want to change their old air conditioners advantage of the subsidy of 35%. Note that the initial program's budget totaled 15 million, of which around at 5 to 5.5 million related to Attica. 80.000 In addition, before granting an additional 5 million, estimates wanted to replace a total of 55,000 to 60,000 devices. So now the number climbs to 75,000 to 80,000. option to allocate more money in Athens was because of increased demand. Consumers across the benefit of the subsidy will be (35% of the price and not more than 500 million) hitting the market air inverter technology and energy-saving class from 31 to 140 per year. Note that every citizen has the right to withdraw a grant of up to two air conditioners and the necessary documents for participation in the production of identity card and a copy of a recent electricity bill. The consumer can choose and buy a new air conditioner if it is: * DC Inverter Power Class A / A for devices up to 16000 BTU. * DC Inverter Power Class A / A A / B B / A B / B devices over 16000 BTU ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 21 But you know that freon containing carcinogenic. What happens when you start diarrhea; And let you will not, or will you sleep;; Many substances such as strong detergents, oils, pesticides, etc. are directly toxic to several species and many of them causing serious damage to ecosystems, contaminating air, water or soil. Division of these substances are heavy metals (mercury, lead, cadmium, etc.) and organic compounds (such as pesticides) that do not biodegrade, but transferred through the food chain and accumulate in higher consumer who belongs to the man. This accumulation causes many problems as thin shells on the eggs of birds, poisoning and even death in humans, etc. This phenomenon is called bioaccumulation. But the phenomenon is on the rise in recent years, reducing the amount of stratospheric ozone, is directly related to household substances. Various sprays and liquids in refrigerators and air conditioners contain freon, which predominantly involved in this phenomenon. The reduction of the ozone layer causes the increase of harmful ultraviolet radiation reaching the earth and this is devastating for many single-cell organisms and leads to increased incidents of skin cancers and eye cataracts in humans. Microwave Microwave oven careful when you cook or reheat meat, poultry, eggs and fish! Often the microwave does not heat up evenly, leaving some places completely cold or uncooked, which can create dangerous microbes. MIPOS CAUSES CANCER? ● Do not stand for long periods in front of the bakery at the time of operation. Hold a distance of about 0.5-1 m from him when you put the running. ● children and women during pregnancy, contrary to what is often heard, there appears to be most at risk from exposure in front of the microwave. Applicable here is keeping a safe distance from the oven (0.5-1 meters). ● previously there were fears that the microwaves could cause interference to electric pacemakers used by people with heart disease. In these pacemakers are suffering "electromagnetic compatibility", due to the effects of minor leakage of electromagnetic radiation from the microwave while the children are able to manipulate microwave ovens from the age of 7 years, do not ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 22 let anything without supervision an adult. It is preferable not to earn themselves the pan from the oven, to prevent minor mishaps from egkafmata.NA REMEMBER THAT ... ... The noise continues to make the microwave when the door opens does not mean that microwaves produced. When you put off the stove, oven stops producing the sound due to the fan. .www.fda.gov / cdrh / consumer / microwave.html. www.medlook.net. www.prevention.com Now on to heat, be careful that you destroy heavily vitamins and nutrients in foods. Finally, it is clear that foods that are heated in a regular oven has been slightly better sense of what has been heated in a microwave so what to do; Eating a well-warmed garbage in best; Morea U.S. WHAT you say, what about for the following Microwave How do you say; It is safe; And the microwave ovens. 1. Take any one microwave. 2. Be careful not to plug it in and has power 3. Open the door and put through a mobile service shall 4. Close and lock the oven door 5. Call your cell phone you have in IF I have heard it ringing, radio waves coming into the OVEN Think how much radiation comes out when CARCINOGENS OPEN! Are mobile increases the risk of brain cancer? Yes, recent studies have raised concerns that long-term exposure to electromagnetic fields (ELF) from mobile phones may increase the risk for cancer in the brain and other nervous system tumors, according to Ron Pawl, a neurosurgeon at Lake Hospital Forest. He calls for collaborative initiatives in research, which will determine whether the relationship between mobile phones and brain cancer is real. Hazardous and other devices Unfortunately, within our homes are both electrical devices - such as microwave ovens and hair - and new technology wireless devices that cover everything with an electro-smog. And they say some of the magnetic and electric fields developed during the operation of these devices may not be so innocent, why rather incriminating act on the human body, according to recent measurements and surveys. On the other hand there is a large group of scientists believes that there is no reason for concern, ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 23 because the tensions in these areas is low. the most dangerous devices in order of priority: 1. the basis for wireless phone 2. the microwave oven, 3. The WiFi and 4. the hair. Lower the risks from the use of electric kitchen 5. the hood and 6. electronic alarm. The second group says that so far there is insufficient evidence to secure that we can safely say that health problems associated with these devices. Measurements of the Laboratory of Cellular Biology, University of Athens, a wireless base creates a landline phone within a few centimeters magnetic field intensity miligkaous 50. Can the limit adopted by the World Health Organization a decade ago to reach 1,000 miligkaous However, many say that the existing limits are considered "obsolete". A report titled EP Vioinitiative report refers to studies which show that the magnetic field intensity above 4 miligkaous may cause children and adults, serious health problems and associated with malignant tumors, leukemia, nervous disorders, DNA lesions and lesions immune system. The report also calls for reducing the limits for electric fields ranging from 28 to 61 volts per meter, depending on the devices, at 0.6 or less. In the Laboratory of Cellular Biology for six months now conducting experiments on mice with pregnancy, which glitters with bases wireless phone every night for eight hours. The researchers say that they found problems in bone development of embryos. These bases of wireless phone radiation miligkaous to 50, while the radio waves emitted by reaching up to 8-10 volts per meter, ie within the established limits, but up to 13 times greater than suggested by the report "Vioinitiative report» which puzzled MEPs . However, the traditional home appliances radiate as measured: for example, an old-style cathode ray tube television creates a magnetic field intensity up to 100 miligkaous just a few centimeters to 2 meters, while the intensity falls to 10. Furthermore, when operating the dryer, depending on the strength of the magnetic field can reach up to 500 miligkaous. When his eye lit cooker radiation reaches 100 miligkaous also within walking distance - the same applies to razors (no battery), toasters, hoods, electric alarm clocks and vacuum cleaners. So it is good that children can not very close these devices when in operation, has not adequately explored the way in which the influence of low-intensity areas in the human body. Particular attention should be paid to the microwave, which when ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 24 placed in kitchens are at the head height of children who look in them the disk spins, experts say. Source: ScienceDaily, 21 October 2008. The head of a prominent research institute for cancer at the University of Pittsburgh, Ronald Herberman warned both the faculty and staff, to restrict the use of mobile phones because of the likelihood of developing cancer - particularly when it comes to children whose brain is still under development. The warning by Herberman, based on unpublished data of a first investigation and concluded that despite numerous studies which have found a link between the growth of tumors and the use of mobile phones. He believes that the world must now take appropriate measures, especially children. "We should not expect a definitive study on the subject, but prefer the safety of our indifference now," said Herberman. Statistics from the Research Institute for Cancer show how deeply rooted in our daily lives cell phones. 78% of all adults own a cell phone, and has 86% of young people from 18-29 years and 55% of Americans over 65 years. There are statistics about young people under 18 years. No other scientific institution has not made similar warnings about the use of mobile phones. In pleading sent 3,000 workers of the institute, says that children should not use mobile phones because the brain is still in its developmental stages and adults should have the device as far as he is head and using headphones. However, many studies have found a link between cancer and mobile phone use, and note that there are still no sufficient evidence to prove such a hypothesis in the case of long-term security holders. "If there is a risk from these products and at present we have no such evidence - it is too small," said Commission spokesman Drug Administration. Parents should eventually build their own rules for their children but this is difficult when the social pressure is so strong, says Lisa Bain, editor of Parenting magazine. "The age is creeping," he says. "Girls tend to have a cell phone from a young age. It has become a symbol - the use of mobile makes them feel they have grown up." After the recent medical warning, Bain says: "They go so many terrible trials. They will make many parents to think twice. But, unfortunately for the vast majority will not mean much. After all, says Bain, "It's like to object to a tidal wave." Associated cancer of the salivary glands with heavy use of mobile Source: BBC, 25 Φεβρουαρίου 2008 Heavy mobile phone use may be associated with an increased risk of cancer of the salivary glands Dangerous to weak signal Dr. Siegal Sadetzki, who led the investigation, said that because ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 25 mobile phone use in Israel is much more severe than what many other parts of the world, this gave him the opportunity to study long-term use and the cumulative effect have. "Compared with other studies, the amount of radiation exposure to the securities in Israel are much higher," he says. One of the main conclusions of this study was that users with heavy use in rural areas had an even higher risk than those who were in the cities, which is, as suggested by the team, the fact that mobile phones in areas without strong signals need to emit more radiation to work properly. Certainly Dr Sadetzki said that a study is not enough to prove such a link for this and need some more research. However, until there is more data, it is better to have a "preventive" approach, he said, especially when used by children. The cell and cause insomnia Using a mobile phone before bedtime might prevent the proper sleep, according to new research. And I thought my otio insomnia due to my little passion, everyday I frapedakia. Now ysichasa, another is the culprit, so it would look in my eyes frappe prosecutor anymore. There 's a good thing I saw from the mobile phone for so long anathematize, at least, was crucified for my insomnia. The research, funded by mobile phone companies, suggests that radiation from the handset can cause insomnia, headaches and confusion. Also, it may reduce the amount of deep sleep, which is associated with the body's ability to be renewed. The survey was conducted by the Swedish Karolinska Institute and Wayne University, USA. The researchers studied 35 men and 36 women aged between 18 and 45 years. The research suggests that exposure to the laboratory at 884 MHz signals have been adversely affected "ingredients" of sleep is important for recovery from daily tiredness. Source: Reuters survey showed that mobile phones increase the risk of cancer of the salivary glands Source: Yahoo News, 7 Δεκεμβρίου 2007 The microwave radiation emitted by mobile phones clearly increase the risk of cancer of the parotid - the largest of the salivary glands, according to a survey conducted by Israeli researchers. DNA damage The NRPB report repeats concerns that the first caused by a study on the effects on health of mobile, published in 2000 by an independent expert group on mobile phones. This committee was established, also by the British government and led by William Stewart. However, the new report adds that scientific research published since 2000, provides new evidence that radiation from mobile may be dangerous to users. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

26

DESTRUCTION OF DNA & PROLKISI STEIROSEOS The picture shows the brain was exposed to a two-hour irradiation of a cell at various intensities. In this seems a significant break of blood vessels and large areas of significant damage to neurons. Indeed, the greater was the exposure to radiation, the greater the zimia.Ta findings have caused a new twist in the lengthy discussions between scientists and manufacturers of mobile phones over the safety of securities. NTUA through Bioiatrikon Laboratory Simulations and Imaging Technology in a multi-part research project COST 281 - in cooperation with institutions from six other countries. First, the calculation of Pythmou Rollover Aporrofisis radiation from the tissue (SAR) (this is the size in measuring the radiation received by the head) gave results that are above the limits adopted by the United States, U.S. limit is 1,6 w / kg SAR instrument in that process came to 2,2 w / kg for juveniles and 2.4 for adults. Notes the Konstantina Niki, coordinator of Greek participation in the program, "the power deposited in the sensitive tissues of the head in the mobile phone can exceed safe limits for absorbed by biological tissue effect. He continues "it is not possible to be absolutely sure that exposure to radiation of mobile telephones, even at levels lower than those proposed in the standards" But he Lioliousis Costas, Assistant Professor of Electronic Physics, University of Athens highlights "The brain User illuminated and heated, and absorb up to 70% of the power emitted by mobile phone. The negative effects now emerging as a statistical certainty. "The cell phone increases the probability of volume in the ears from the BBC, 14 Οκτωβρίου 2004 Using a mobile phone for at least 10 years quadruples the risk of volume in the ears, scientists believe, according to a survey by the Karolinska Institute in Sweden. Mobile radiates and kills ... Source: Nation, September 23, 2006 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 27 Deadly health effects can have use of mobile phones as shown by much research in the Department of Biology, University of Athens. H inquiry was launched 8 years ago and is still ongoing, but scientists have already concluded that the excessive use of mobile can cause cancer auditory nerve to a decrease in fertility, alteration of genetic material and accelerating the "death cells. How to protect most usually put the phone in your pocket and even in such a direction that the rear of the cell is opposite to the body usually the side on which most mobile phones (including nonfolding) emitting a maximum radiation intensity . In such cases we must be away from the cell body, at least forty inches, which is not always feasible. To this end the team in Tomea Kyttarou Biology and the Department Biofysikis Biology at the University of Athens, Biology designed "special protective case" that reduces the electromagnetic waves and protects the user from the radiation of mobile Mobile and child go instead STOP the electromagnetic pollution! HEALTH U.S. is more valuable than the profits of corporations Risks posed by electromagnetic fields according to a parliamentary report Source: European Parliament A cocktail of electronic field ... More and more people expressing concern about the impact it can have on their health this constant exposure to microwaves, which Ms. Ries calls the "cocktail ... electronic fields. The health risks are still unknown, especially as mobile phones, chargers, credit cards tripakia the current of which passes, computers and other wireless communication devices causes cancer

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

28

Low frequency electric and magnetic fields
The term low frequency electric and magnetic fields mean fields generated by the electricity transmission system, such as lines and high voltage substations, the network medium and low voltage used for distribution of electricity and electrical wiring and devices found in homes and in our workplaces. What are the electric and magnetic fields? The electric and magnetic fields characteristic of the electromagnetic forces that interact with the electrically charged, particles of matter, electrons and protons. The most immediate experiences, related to the occurrence of these forces is the appearance of lightning during the storms and the deviation ratio of the magnetic compass.

Static and fluctuating fields.
The electric and magnetic fields that grow in nature is static, ie no change or change very slowly over time. The voltages and currents used in implementing provisions of the electricity is alternating with frequency 50HZ, ie change polarity 50 times per second. The electric and magnetic fields generated by these provisions are therefore also variable with frequency 50Hz. In other countries like the U.S., 60HZ used to transport electricity. Very rarely used direct current for transmission of electricity. Electrical appliances using batteries creates the environment static fields. The devices connected to sockets create varying fields in the frequency of 50Hz.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

29

Extremely low frequency fields.
The varying electric and magnetic fields generated by electric power, and fields are called extremely low frequency fields or ELF (Extremely Low Frequency). ELF fields are different from radio waves emitted by radio and television broadcasts, and mobile phone masts. ELF fields and radio waves, with infrared, visible and ultraviolet radiation making up the range of non-ionizing radiation. In contrast to ionizing radiation (radiation), including X-rays, c, etc., non-ionizing radiation can break chemical bonds, to extract electrons from atoms or molecules, that cause ionization of matter

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

30

BIOLOGICAL EFFECTS OF ELECTRIC AND MAGNETIC FIELDS The known effects of electric and magnetic fields in humans caused by induced fields and currents inside the body during exposure to these fields (direct effects). There are also indirect effects, such as annoying spark that can be created by contact with objects in the presence of strong fields.

Direct effects ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

31

What fields and currents induce magnetic fields in humans?
Each alternating magnetic field B, applied to a conductive medium induces electric fields in turn generate electrical currents in the medium. From electrical point of view inside the human body is quite conductive permits, ie, the flow of electricity. Thus, within human induced electric fields and electric currents are created. Fields and currents have the form shown Because the conductivity, the body, when a man inside an electric field, E, disturb, so the surface is an equipotential surface. This is done in the presence of surface electrical charges to offset the electric field inside the body. As the field is altered, changing the distribution of surface loads, creating currents inside the body

What are the effects of induced currents in humans? If the currents induced inside the body of the fields are very strong, produce the same effects in humans are created when the currents enter the body by contact conductors under tension (shock). These effects depend only on the size of the induced current inside the body Indirect effects When a person electrically insulated on the land lies within a strong electric field and comes into contact with a grounded object is displayed in the spark point of contact. If the electric field (before the presence of humans) more than 5kV / m, is very likely that this phenomenon is disturbing. Similarly, when a person touches a large object ageioto presence of electric field is likely to result in a spark. The size of the disturbance in these cases depends on the size of the object. Effects on pacemakers Particularly important may be the interaction of electric and magnetic fields with the operation implanted cardiac pacemakers
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

32

or other implants in the human body. Although previously reported interference in some types of pacemakers in electric fields higher than 2kV / m and magnetic fields larger of 20mT at 50Hz, no problems usually expected at such low prices. The values of the fields that interfere vary depending on the construction of the device, but is usually much higher than those normally appear. Modern pacemakers are thus designed to ensure the operation even if they were strong electric or magnetic fields. Effects on monitors The magnetic fields, often affecting the picture quality on computer screens of cathode ray tubes. This can occur in magnetic fields of the order of IMT. The liquid crystal display, plasma and other modern technologies do not exhibit such problems. There are long-term effects of electric and magnetic fields of extremely low frequency in humans? To investigate the effects of electric and magnetic fields in the human species out of many investigations (epidemiological, laboratory, clinical). The results of these surveys are evaluated by special committees of the competent international bodies like the World Health Organization (WHO), the International Commission on Non Ionizing Radiation, (ICNIRP), as well as national bodies such as National Research Council (NRC) of the U.S. National Radiological Protection Board (NRPB) of Great Britain etc. The views of these converge on the following general conclusions Laboratory and clinical investigations Laboratory and clinical studies do not indicate any harmful effects in humans beyond the known effects mentioned above. From experiments in animals or cell and molecular studies has revealed a biological mechanism acceptable carcinogenic effects of electric and magnetic fields ELF. Epidemiological studies In epidemiological studies considered exposure to magnetic fields, people have become ill with a particular disease and compare with the report of those who have become ill from the disease. These investigations, as a whole, showed no link between exposure to electric and magnetic fields, ELF and the induction of long-term
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

33

biological effects other than childhood leukemia for which a patient appeared statistical correlation for the magnetic field. Although in general the exposure of children who became ill was the same as those who are not ill, about 2% of children who became ill were exposed to average magnetic field greater than AMT, while the percentage of children who were not ill about 1%. This is interpreted as a statistical doubling of the incidence of childhood leukemia in children exposed to daily average values of magnetic field higher than AMT. We obtained corresponding figures for adults or for other long-term effects. For the statistical correlation does not currently exist valid scientific explanation. There may be other reasons, such as bias in the selection of children or the existence of an unknown carcinogenic agent which was used in the studies and distort the results. For this reason, questioning the assumption that the relationship is causal If the causal relationship was what you meant for Greece? Childhood leukemia is a rare disease. Annually appear about 4 new cases of childhood leukemia per 100,000 children. Even if we assume that magnetic fields with an average value above 0.4 mTprokalousan certainly a doubling of cases, this in a country like Greece means that we also recorded about a new case every two years. The value of O, AMT is a level of protection? The value of 0.4 MT in epidemiological studies showed a mean exposure of children during a 24 hour basis. The distribution of fields in space and time variation, it is very easy to find points anywhere with magnetic fields larger than 0.4 MT. 0.4 MT are not, say, a threshold or limit for the magnetic field, since even when the mean exposure is much lower than 0.4 MT are several moments during the day the report is greater than 0 , 4mT. Sort by IARC The International Committee for Research on Cancer (IARC), World Health Organization has defined a classification system for chemical and physical agents on the karkinogennitikotita them. In June 2001 examined the static and ELF electric and magnetic fields and concluded that ELF magnetic fields are classified as 2B
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

34

as "possibly carcinogenic" (possibly carcinogenic) to cause childhood leukemia. Static and ELF electric fields and static magnetic fields were placed in Category 3, "Unclassified" on the karkinogennitikotita. The ELF magnetic fields were classified by IARC in category "possibly carcinogenic" based on "limited" evidence from epidemiological studies of childhood leukemia. Epidemiological data on other cancers, and those from laboratory studies in animal tissues and cells were considered "inadequate" and thus the ELF magnetic fields are not classified in the categories of the most dangerous players as "carcinogenic" (carcinogenic), or "possibly carcinogenic" (probably carcinogenic). As an indication that there are many other factors that have been classified by IARC in the same category as the magnetic fields of ELF. The most famous of these is coffee, gasoline exhaust and vegetables preserved in brine Exposure Limits There are limits for safe exposure to electric and magnetic fields? The International Commission on Non Ionizing Radiation, (ICNIRP), issued the 1998 guidelines for human exposure. These guidelines are based on the proven effects of electric and magnetic fields in humans. Compared with the lengthy and uncertain effects of magnetic fields above where no known mechanism of creation, it is impossible to set limits on them. The ICNIRP guidelines consist of basic restrictions and reference levels.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

35

The main constraints related to the induced currents inside the human, resulting from the threshold levels that cause adverse biological effects. Indeed, they have established taking into account large safety factors. For the general population, the main restrictions are set 50 times lower than prices resulting adverse effects. For the protection of the basic restriction on induced current density in the human body is set at 2 mA/m2 the frequency of 50HZ. Reference levels are measured sizes of electric and magnetic field, derived from the basic restrictions by considering the worst case coupling of fields with the body. The use of reference levels introduced, ie, in practice an additional safety factor. Prices for the general population is significantly below those for the professional workers, whereas in the general population included people with sensitivities, like the elderly, young children suffering from diseases, etc. What happens in the European Union? In 1999 the EU Council adopted the recommendation "on limiting public exposure to electromagnetic fields 0 Hz - 300 GHz" (L199, 1999/519/EC). The recommendation proposes the same limits as those in the ICNIRP guidelines for the protection of the general
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

36

population. 2004 E. E. adopted Directive (2004/40 / EC) "on the minimum health and safety requirements regarding the exposure of workers to risks arising from physical agents (electromagnetic fields). The Directive was adopted the ICNIRP limits for occupational employment.

What limits apply to our country? In our country, has issued the Joint Ministerial Decision Nos 3060 (FOR) 238 (GG 512/BV25-04-2002) on "Measures to protect the public from the operation of emission of electromagnetic fields at low frequencies. In this specified reference levels and basic restrictions for protection of the public and static electric and magnetic fields of extremely low frequency as they were defined in the Recommendation of the European Union. Greek Atomic Energy Commission Polaplasiaste that apply to 100 First we must say that literally the planet, hence the locals, swimming in any kind of radiation or natural or human origin. Starting from cosmic rays and background radiation (a remnant of the creation of the universe according to the prevailing theory of Big Bang) and solar radiation, reaching the radiation emitted by all kinds of electrical and electronic devices. We should also emphasize that the discovery of electricity and its use by Edison in 1879 for lighting the city, especially during the 20th century, exposure to artificial radiation sources has increased rapidly because of demands for electricity, coupled with the exponential growth of wireless technology and applications. In this case we employ the radiation from natural and artificial
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

37

sources, known as electromagnetic radiation from power lines and morodiakous radios from radio and television transmitters, from stoves and refrigerators from phones and computers, anything else running stream but the radiation emitted by radioactive materials as the phenomenon of radioactivity. Electromagnetic Spectrum When we say electromagnetic radiation, especially mean energy spread (radiated) electromagnetic waves, which in turn consist of an electric field and a magnetic field (electromagnetic field), which run both vertically between them, the source which produced in all directions in space and not need a distribution medium, as eg with sound waves

A common characteristic of all electromagnetic waves is the speed, 300,000 miles per second, while that which differentiate the frequency (or wavelength). The frequency is practically the number of waves passing a given point per second, and coincides with the frequency of pulsing a dipole, which is the cause - a source of electromagnetic waves. Generally any vibration caused by electric charges produce electromagnetic waves of the same frequency. The frequency, measured in Hertz (1Hz = 1kyklos per second) and multiple KHz (= 1000 Hz, kilocycle per second), MHz (= 1.000.000 Hz, megacycle per second) and GHz (= 1.000.000.000 Hz) , is the extent by which electromagnetic waves are classified into different categories, ranging from industrial and small waves telephone frequencies produced by moving electric charges (electric current) to hard X-rays and c very high frequencies, produced by
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

38

redistribution of building blocks of matter, as shown in the figure below. All of these frequencies is called the electromagnetic spectrum.

Instead of frequency can be used to distinguish the electromagnetic wave wavelength, ie the distance traveled by a wave at a time so as long as oscillation, measured in meters, or aliquots thereof. The frequency or wavelength is saying that the identity of the radiation. Each color has its own wavelength. More specifically a narrow range of about 10 nanometers (billionths of a meter) say that it corresponds to monochromatic radiation. Perfectly monochromatic light, ie a single frequency is idealization, which is close but the laser radiation. The human body does not readily understand all frequencies of electromagnetic radiation because they possess the appropriate sensory organs. The visible light, a narrow range, as perceived by the retina of the eye are special cells (called rods and cones) which are excited by visible radiation and give the appropriate information in the brain to create a sense of vision. Something similar happens with specific cells in the inner ear to create the sense of hearing is with an appropriate stimulus frequency, again restricted area, but acoustic waves. The other electromagnetic radiation thus neither shown nor smell, nor hear, nor else how you feel, and that makes it possibly the most insidious and most dangerous. However, there are proper equipment with which to trace the judge.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

39

A fundamental distinction of all these frequencies, is whether or not cause ionization of matter, so-called corresponding to ionizing radiation and non-ionizing, respectively. As shown in Figure stagger is non-ionizing radiation at low frequencies including radio, television, communications (mobile fixed), microwaves (microwave), until the ultra-busy. Because of these and the huge spread is a probationary term electromagnetic smog, which is in tight embrace with the Earth. At the other end of spectrum are ionizing radiation, namely ultraviolet high-frequency X-rays, and gamma rays, which are widely used in medical and other fields of technology. What does that ionizing and non ionizing radiation? The first cause ionization of matter and the latter are not, a phenomenon which is to be understood, should look more to the structure of matter It is known that matter consists of eminent persons prosokratikon natural philosophers Democritus and Leukippos course with diversified properties. These people are thumbnails of the solar system since the center is the nucleus, while wandering around it and rotate the negatively charged electrons, in defined orbits that define and energy. The nucleus consists of positively charged particles, protons, and neutral, the oudeteronia or neutrons. The number of protons called the atomic number and is equal to the number of electrons peripatetic, and since the loads of these particles are equal, people are neutral. If for some reason, eg radiation effects, or impact with another particle, an electron leaves its orbit and moving to other track higher energy level, as we say, by employing energy, then the person is excited. In this situation the person does not remain for long, but reverts to the previous stable state (decay), while the electron returns to the path of providing the energy that previously hired. The efficiency of this energy is in the form of a photon. These photons, which somehow escape the people are what they perceive as light. The following illustration shows the stimulation of a person effect (absorption) of photons and decay by the emission
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

40

of

photons

and

electrons

return

to

their

original

stack.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

41

Thus born the building blocks of electromagnetic radiation, namely photons. Where even the energy attributed to resigning photon, this corresponds to a particular frequency or wavelength. Now, if this wavelength is such that it can also stimulate the retina of the eye talking about visible light, otherwise we have the invisible (ultraviolet or infrared) region of the electromagnetic spectrum. In other words, all frequencies may result from the decay of the people is the spectrum of electromagnetic radiation, a portion of which is the light. Specifically, the light is very small region corresponding to the visible and looks like a color film, as shown in the picture below, where the area is isolated and measured even in nanometers, ie millionths of a meter. If the electron does not return to its original trajectory, but with the energy they hired failed to leave the man, then we say that man is ionised converted into a positive ion (now redundant because the positive charges of protons) and the phenomenon is called ionization. When ionization is fundamentally changing the structure of matter and that certainly has its effects as will be seen in the cells of organisms. The radiation then that when acting on the atoms manage to extract electrons are called ionizing. Is ionizing and particulate radiation (item Helium nuclei) and b (positive and negative electrons) emitted in the event of radiation type A or B, as it is called, respectively, but is also dominated by cosmic radiation at high altitudes.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

42

Non Metrology

ionizing

radiations

The main figures of such radiation are measured with units of radiometry, ie the power P of the radiation measured by W, the electric field strength E in V / m, the magnetic field H in A / m, and the greatest density of these power S in W/m2 or more commonly in mW/m2. The valuation but the effects of exposure of living organisms, including humans, in a non-ionizing radiation for time t, is determined by the rate of absorbed dose SAR, why is that SAR = sE2/2r. Where to and r is the specific conductivity and density of tissue, respectively. The International Commission for the Protection of Non - Ionizing Radiation Protection (International Commission on von Ionizing Radiation Protection - ICNIRP) is a non-governmental organization, recognized by the World Health Organization (World Health Organization - WHO), evaluates the scientific results in epidemiology, medicine, biology, physics and engineering around the world and gives instructions and tables for acceptable levels of prices of these items of radiation.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

43

Consequences of non-ionizing radiation in human vaccines In the human body circulating electric current, which is necessary for normal function. All structures of the nervous system eg operate by passing pulsed electrical signals, while nearly all biochemical reactions from digestion to brain function, including electrical processes. It is also known that these tissues contain 70% water, the molecules which are like electric dipoles. Reasonable, therefore, that the penetration of an electromagnetic field in the body and its interaction with the dipoles are, or natural areas of the body can cause complications, even long term. It must be noted that the absorption of a radiation from the human body depends on the frequency of radiation. Thus, the microwave radiation is absorbed near the skin, while the waves penetrate deeper into the body and absorbed by the organs are inside. In general, the electromagnetic radiation is thermal effects in humans. As it penetrates to shallow body of course, is absorbed and causes movement of molecules that the friction and the shocks then cause warming of tissues. The testicles and even the eyes are the most vulnerable points because kidnap a lesser extent the accumulated heat, the less circulation. The thermal effects occur for frequencies above approximately 100 KHz and damage caused if the body's thermoregulatory mechanism fails to restore the normal temperature. To be an observable increase in temperature, power density must be very large (1mW/cm2) or the average energy absorbed by the whole body (SAR) is above 5 W / kg. When the amount of heat generated is relatively small, the thermoregulatory mechanisms can kidnap this heat while maintaining constant temperature at 36-37 0C. Conversely, when the amount of heat exceeds a value, then these mechanisms can not function properly and there is an increase in temperature in tissues or organs where it exceeds 37 degrees. But they also have non-thermal effects, which refer to the biological effect of radiation on the operation of components of cells, although it is unknown mechanism where the radiation acts on cells. Might affect the flow of calcium through the cell wall, which means that either facilitate progress already exist for other reasons, cancer, or reduces the capacity of resistance of a cell in the genesis of cancer.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

44

The non-thermal effects were considered to be more important than biological / medical point of view and not covered by the safe limits established because they are not directly measurable with an instrument. Clearly, the implications, whatever they are, depend both on whether strong or weak radiation, the time over which an agency out there, and how is it the source of radiation. Besides the energy absorption of electromagnetic fields of radiation, there has been a mechanism for coupling electric field at low frequencies with living matter, which leads to current flow and electric dipole polarization of the tissues, and mechanism of coupling of magnetic fields at low frequencies, which induce electric fields and electric currents round the tissues. Sources of non-ionizing radiation and related effects Radiation (ELF) Radiation ELF, extremely low frequency, 50 - 60 Hz, generated by the electric cables for low and high voltage transformers of all types, electrical wiring, electrical household equipment and electrical motors. It has been proven unhealthy effects of electric and magnetic fields of these frequencies in humans. Besides the tensions in these areas remain in positions of people, is much smaller than the permissible limits. Radiation frequency (RF) and microwave (MW)

Radiation sources include RF and MW antennas for radio and television stations, radars, wireless networks, systems, microwave links, satellite communications systems, communication systems police, army, fire, aviation, navigation, mobile phones and mobile stations. At high enough intensities of both radiation damage tissues primarily on account of the heat they generate, although the estimate of health effects from electromagnetic fields, is highly uncertain. Infrared (IR) IR radiation are the ovens, light bulbs heat, lasers and IR. This
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

45

radiation is perceived mainly by the heat created. So the skin and eyes absorb infrared radiation as heat. Visible radiation

Ο Sun is the major source, but the number and variety of light bulbs, fluorescent lamps and is not insignificant. The different frequencies of visible electromagnetic spectrum "as" our eyes as different colors. Even the visible radiation, known as light, can damage eyes and skin when it is strong. Ultraviolet (UV) radiation

The sources of UV radiation include the sun, black lights, welding devices, and UV lasers. The photons of UV radiation are high energy, due to the high frequency and is very dangerous, not limited only to heat the body to absorb, but can cause damage to skin cells that can lead even to cancer. Besides a range of UV radiation is the ionizing. Laser radiation

This radiation is produced by the homonymous devices, which in fact act as amplifiers corresponding monochromatic radiation. Lasers emit UV, visible and IR radiation and can be particularly damaging to eyes and skin, or by heat action, so degenerate protein, either by photochemical activity, so changes made to the characteristics of molecules. Cell phones
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

46

Sun is the major source, but the number and variety of light bulbs, fluorescent lamps and is not insignificant. The different frequencies of visible electromagnetic spectrum "as" our eyes as different colors. Even the visible radiation, known as light, can damage eyes and skin when it is strong. Ultraviolet (UV) radiation

The sources of UV radiation include the sun, black lights, welding devices, and UV lasers. The photons of UV radiation are high energy, due to the high frequency and is very dangerous, not limited only to heat the body to absorb, but can cause damage to skin cells that can lead even to cancer. Besides a range of UV radiation is the ionizing. Laser radiation

This radiation is produced by the homonymous devices, which in fact act as amplifiers corresponding monochromatic radiation. Lasers emit UV, visible and IR radiation and can be particularly damaging to eyes and skin, or by heat action, so degenerate protein, either by photochemical activity, so changes made to the characteristics of molecules. Cell phones

As I said mobile phones and base stations, emit radiation in the range of frequencies. Given the widespread use of millions of people (men, women, children) who are exposed to it, it is appropriate detailed reference to them. Moreover, the effects of mobile phone radiation on human health has occupied many researchers for many years and not without reason, since no other radiation is not the massiveness of this. In Greece there are more active mobile phones from its citizens, while 80% of children under 12 years are users! All other radiation mainly small groups of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

47

people who assumed they will be aware and take protective measures in the field report The mobile phone acts as a radio transmitter formed by transferring the voice of the user's way when he speaks, and radio receiver, when he hears, in a radio broadcast from the transmitter base. The antenna of a base transmitter is usually located on the roof of high buildings, often in residential areas to allow cellular coverage possible wider areas. The base stations forming cell (the geographical area covered is divided into smaller areas, ie cells) Referring to connect to one another, when changing the position of the mobile phone during the conversation. More specifically, when someone calls someone else with a mobile initiates a base station (usually the closest), which in turn recognize and after the call, sends him call sign. When you answer what is called, then enter the interactive communication between two mobile phones with the insertion of the base station, when the three of them can function as both receivers and transmitters. In relation to the hazards of radiation of mobile phones should take into consideration the following: • the wide range and specific features of mobile phones • the flexibility of transmitting power depending on the quality of the signal received from the base station. When the phone receives a strong signal, then emits a small effect on developing communication with the respective base station and vice versa, weak signal reception means great power emitted from cell phone radiation. • the different physiology of each individual, which varies depending on age, with their vulnerable younger ages • the use of different durations The following figure shows the attenuation of radiation as the antenna away from a base station and also shows the preference for certain directions depending on the orientation of the antenna.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

48

In fact, the antennas are manufactured and have been widely used directional radiation lobe, and this is visible in the picture above. It is apparent imbalance of power density in different directions and therefore the obvious difference in the radiation suffered by residents of surrounding areas, even if it is equidistant from the keraia.Sto chart below shows how important is the role away from the mobile head. The weakening of the radiation increases as the distance aftieinai eντυπωσιακή.

For years, therefore, are epidemiological studies in which researchers try to determine if a statistical analysis of certain diseases or any symptoms are more frequent in a sample of people who have cell phones, compared with an equivalent sample not using these devices. In the first sample found memory loss and frequent headaches. In other surveys studied the brain functions as the region closest to the antenna of the mobile, with EEG for detecting disorders of brain electrical waves, but the results are unreliable. Recently, in investigations where irradiated with RF mobile and intensities very close to safety limits, laboratory animals and cell cultures have been identified impacts associated with the passage of ions through cell membranes, and tumor growth, and loss of cache. But in all cases recorded by the riposte and swinging questions about the reliability of statistics. In conclusion, none of the recent studies have not led to certain conclusions as to whether in fact the radiation they cause adverse effects on human health. The only proven adverse impact is causing traffic accidents by careless use of a mobile phone while
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

49

driving! The diagram below shows the absorbed dose (SAR) in relation to the distance of the mobile head. Again we see the collapse of the absorbed radiation with increasing distance from the head. Therefore would say that you called "hands free" is very useful

Limits

and

standards

of

protection

Whether there are limits, above which there may be adverse effects, relevant bodies to provide information and instructions are mostly the ICNIRP, the World Health Organization and the European Commission. In our country the mobile broadcast at 900 MHz, 1800 MHz to 2100 MHz and to prevent interference between different radio, and mobile phone companies operating in Greece is COSMOTE (GSM900, DCS1800, UMTS), the Q -TELECOM (DCS1800), the TIM (GSM900, DCS1800, UMTS) and VODAFONE (GSM900, DCS1800, UMTS). The following figure shows the level of risk the power density of radiation, which has been adopted by international

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

50

telecommunications

operators

and

health

Law 3431/2006 imposes restrictions on terms of mobile phone antenna even as setting limits 70% limits of ICNIRP, and if less than 300 meters are nurseries, schools, nursing homes or hospitals, the exposure levels public is prohibited to exceed the 60% limits of ICNIRP. That applied even more stringent limits than those prescribed by the ICNIRP, as shown in the table below. In parentheses are the values corresponding to 60%.

The following table is the limit adopted by our country about the size of SAR, in various parts of the body, which is again 70% or 60% of the limits proposed by the ICNIRP. Body responsible for monitoring compliance with limits public exposure to electromagnetic radiation is the Greek Atomic Energy Commission (GAEC) and the radiation measurements made by it or his / her players.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

51

Conclusion

and

directions

Although the scientific research so far has not shown very least, that non-ionizing radiation event caused damage to living organisms, though the folk wisdom of the proverb "Better than gaidourodene gaidourogyrefe" finds this case the ultimate application. The minimum and it is shown that the future is the impact of radio, and other non-ionizing radiation, the health of people, safer doses can get one of these are zero, especially since the doses are additive, or each is added to previous ones. So until you "prove absolutely that the radiation is not harmful to our bodies, we should be sparing in their use of devices that generate and lamvanome appropriate protective measures, especially for growing organisms such as embryos, newborns and children. Mention some practical advice on the use of mobile phones. • Do not use any mobile phones by children of primary school or less. • To be used, if necessary, with great caution, however, the children of high school. • Women, especially during the first months of pregnancy to avoid them as much as possible. • Similarly to avoid using mobile users of pacemakers. • The vulnerable situations (children, pregnant women, users of pacemakers) to avoid staying near antennas. • Be the preferred fixed phone, if available, to the mobile. • To minimize the talk on mobile.

• give preference to messages if they are able to communicate. • use hands free, blue tooth and open hearing.

• Avoid placing the phone near the heart, brain and genitals.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

52

• Do not place the phone near the pillow, where we sleep and we have to we have enabled. • Avoid using a mobile phone while driving. Moreover, it is the only case to prove that the phone is bad by causing accidents and not the radiation course.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

53

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

54

Ionizing

radiation

As already mentioned characteristic of radiation that cause them to ionize matter and create ions by electron attachment of the people of. The ionizing radiation can be naturally or are manmade. The first category includes the radiation from the environment (soil, air, water, food) and the cosmic radiation, whereas the latter are primarily medical devices (x-ray machines, scanners, gamma devices, applications of radioisotopes, etc.), nuclear reactors, nuclear waste, nuclear weapons testing, and many building materials. In all these cases the ionizing radiation emitted in the category of which are high-frequency X-rays and c, and particle radiation are helium nuclei (alpha particles), electrons (b), protons and neutrons, and cosmic rays. Almost all of these radiation produced when the phenomenon of radioactivity

To facilitate understanding of the effects of radiation to be listed some necessary concepts and terms. This Activity is called the radiation emitted during radioactive decay (disintegration) of unstable nuclei (nuclides) to stable nuclei. The break is followed by emission of particles and (not always) electromagnetic radiation. The particles and radiation are the radiation. The activity is in the nature (physical activity) since the creation of our planet, but can be caused artificially by 'bombing' of some heavy nuclei (with
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

55

many neutrons and protons that is) with fast-moving particles (projectiles). Physical activity was discovered in 1896 by Bq and then looked to Peter and Marie Curie, Nobel Prize-winning physicists and three. One way to express how fast a radioactive element decays, is called the half-life. Precisely half-life (or halflife), T1 / 2, is the time required to split half of the initial quantity of radioactive material. The half-life is a measure of stability of the radioactive substance is, the higher the value, the more stable is the core component. The intensity somewhat of radiation reflected the size we call active. This is calculated by the absolute value of the rate at which a broken nuclei of radioactive material. Units of radioactivity

A. Plants that express a level of radioactivity of radioactive material The most common unit is the Curie (Ci). A Curie is equivalent to 3,7.1010 radioactive disintegrations per second. Another unit of activity (activity to be precise) is the Becquerel (Bq), corresponding to one radioactive decay per second. That is true that 1 Ci = 3,7.1010 Bq B. Units expressing radiation absorbed by a body To quantify the results of the effect of radiation was originally a unit of radiation, which is called the rad (radiaton absorbed dose). This is the radiation dose (or amount of radiation in general) which affix 0,01 J of energy per kilogram mass of tissue absorbs. Another unit is the Gray (Gy), corresponding to absorption of radiation energy 1 J per kilogram of tissue mass. Ie, 1 Gy = 100 rad. C. Units reflect the radiation absorbed by an organism in relation to the biological effects caused The absorbed radiation dose does not in itself a measure of biological effects, because the biological effects depend on both the type of radiation. For example, a given dose of radiation causes a ten-fold more biological damage than an equal dose Xrays 1 Gy radiation also causes a 20 times greater disaster in human tissues from 1 Gy radiation c. To be thus comparable doses to their biological effects, using the size equivalent dose unit of the 1 rem, and in particular aliquot of 1
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

56

millirem. The rem (radiation equivalent mass) is a unit of activity that does not depend on the type of radiation, and reflects the biological damage caused to humans by the absorption of various radiations. Ie, 1 rem of radiation is a quantity which causes a specific biological effect. The accuracy is 1 rem = q • 1 rad. Where q is the quality factor of the biological effects of different types of ionizing radiation on the biological system. The values of this factor are shown in the table below. q = 1 For gamma rays and electrons q = 10 a for particles, protons and second q = 20 for heavy nuclei 2 <q <10 For neutrons, depending on the kinetic energy Apart from the rem used unit Sievert (Sv) (pronounced Sivert), which is that 1 Sv = 100 rem. Here are some indicative prices attenuation as examples. A chest radiograph deposits of around 20 - 40 millirem per 5 kg of tissue. Equivalent dose of 500 rem in a short period and throughout the body usually leads to death within a few days. Localized dose of 10.000 rem cause complete destruction of tissue. Finally, cosmic rays and natural radioactivity in soil represent an equivalent dose of 0,1 rem per year to sea level. At higher altitudes the cosmic dose increases. Types of ionizing radiation

The divisions of nuclei in the activity, natural or artificial, are three species and correspondingly, three types of radiation: Splitting a: in this type of radiation emitted by the unstable parent nucleus of the element Helium nuclei, which are called alpha particles, and the initial core becomes a core element of another (subsidiary). We say that we have transmutation, as the filial heart represents another element. Thus, as shown in Figure adjoining the nucleus of unstable uranium-238 emits alpha particles and converted to thorium-234 nucleus. Split B: in this case we have electron emission (beta) or positron (b +), antiilektroniou That is, the parent nucleus with the simultaneous conversion of neutron to proton proton or neutron in its interior. And in this case we have transmutation. Thus in the following forms of bromine nucleus is transformed into a center
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

57

Krypton while eksfendonisi electron (left) or selenium core while eksfendonisi tomography (right).

Gamma: in this case emitted electromagnetic radiation from extremely high frequency, and hence the energy from the unstable initial nucleus, which thus comes into steady state without any transmutation

All three types of radiation find extensive application in medicine mainly to a scientific discipline, the Nuclear Medicine, but also because of the great danger the developed and the new Science, Radiation Protection. Radiation are controlled can be used to destroy unwanted tissue (radiotherapy of cancer cells) and is known for operating the radiation to produce electricity in nuclear
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

58

plants. Also used to measure and control the thickness of metal and plastic surfaces for leakage pipe to measure the level of liquids or solids in the tank, still in use and maintenance of certain foods due to the bactericidal action of radiation. The illustration below shows the difference in the penetrating ability of a particle radiation, particulate radiation b and c. The electromagnetic radiation absorbed by a first sheet of paper, the second foil thickness of several centimeters, while the latter is absorbed by thick cement several centimeters. There are other and particles produced in nuclear reactions much more invasive.

Radiation

soil

The radiation from the ground due to the phenomenon of natural radioactivity is the spontaneous decay of unstable nuclei of some radioactive elements, which are components of the earth's crust. These are the radioactive elements radium, uranium, thorium, potassium, radon, etc., which are found in soil, water, air, living organisms in food and building materials. This physical radiation is most intense in underground spaces such as caves, mines, and the underground buildings. The main naturally occurring radioactive isotope potassium-40 which has a half life of 1,28 • 109 years. That is an initial amount of potassium to leave the half must pass 1280 billion years. This item 89% decays by emitting beta
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

59

radiation (electrons) metastoicheioumeno calcium, and 11% initially decays by emitting beta + (antiilektronia) and subsequently converted into gamma rays slow. Potassium-40 is bananas, potatoes and carrots, and therefore also in the human body, but in cement. Radiation is particularly potassium, and the average temperature in the depths of the

oceans Cosmic radiation

This electromagnetic and corpuscular radiation of high energy that reaches the upper atmosphere coming mainly from the sun and other celestial bodies. Therefore, the one in the intense activity of the sun and this accentuated, while increases in height. When it enters the atmosphere, cosmic rays interact with nuclei people in it and cause secondary production of other fast-moving particles (electrons protons, neutrons, mesons, muons, etc.), which together with high energy electromagnetic radiation, reach to the ground. During this interaction, cosmic radiation and atmosphere, also produces radioactive nuclei of helium-3, Beryllium-7, carbon-14, sodium-22, etc., which they contribute to the increase of radiation affecting agencies and natural. However, the cosmic radiation and passes through the layers of the atmosphere is absorbed to some extent, the intensity decreased
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

60

gradually and finally it reaches the level where the surface of the sea is hundreds of times weak. As shown in the figure below the average dose rate from cosmic radiation at sea level is 0.03 mSv / h to 15 km and reaches 10 mSv / hr. It is obvious that residents of cities and villages where they are at high altitude absorb multiple doses of cosmic radiation, although the residents of coastal areas. But the altitude of 10km, where routine flights travel the radiation dose rate is about 5 mSv / h, while the 15km when flying large aircraft, type Jumbo and the Concord dose rate reaches 15 mSv / hr. Thus a traveler during a long haul flight overseas absorb tens of mSv of cosmic radiation, while the crew of the airlines apparently accepts major annual installments, which is appreciable and should be checked. And indeed there is a directive of the European Union (96/29), which requires airlines to systematically measure the doses absorbed by the air crew. It is understood that the cosmic rays are the strongest out of the atmosphere, outer space, and therefore the dose absorbed by astronauts are multiple, so it should be no special

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

61

protection

measures.

X-rays X-rays are invisible electromagnetic radiation of a wavelength much smaller than that of visible light, and comparable with the

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

62

dimensions

individuals. The energy transferred to the radii are much greater than that of ultraviolet rays, particularly the so-called harsh rays, which makes them capable of penetrating the human body and for this reason be exploited mainly for various medical diagnoses. This radiation, which was accidentally discovered by German Nobel laureate natural Rentgen in 1895 and has since received widespread use because of the different absorption of the tissue or bone. Almost all people need ever to undergo a chest radiograph. X-rays are mainly produced artificially by appropriate devices (Xray tube) and their use is so widespread, especially in medicine (X-rays, X-ray computed tomography), as a medical specialty, that of medical physicist. Indeed, the rays, combined with the other used for medical reasons ionizing radiation, necessitating the existence Aktinofysikon various scientific laboratories, responsible for many documents, from simple record keeping to research. Also used in industrial X-rays, to detect voids, cracks or other defects within the metal. Also mention that with the help of cosmic X-ray, ie natural origin investigated qualitatively and quantitatively the existence of the famous dark matter in the universe. From the above it is obvious that indeed the planet, and there upon him or within him at the mercy of the continuing bombardment of all kinds and from all sources of radiation. The figure below shows the contribution of different sources of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

63

ionizing Effects of

radiation. ionizing radiation

In contrast to non-ionizing, the effects of ionizing radiation is known to be harmful. Since the 30s the Curie and other famous physicists mentioned in writings of their comments on the effects of radiation on humans, then the irradiation devices used and their applications in medicine for diagnostic and therapeutic purposes. Besides the actual Marie Curie fell ill and eventually died from radiation such as before, with exactly the same radiation has helped thousands of sick and wounded during the First World War. Took to fall but the atomic bomb on Hiroshima and Nagasaki (1945) to become conscious of the danger of radioactivity and the nuclear accident at Chernobyl (1986) vindicated the concerns about the effects of radioactive radiation on human health and more. When X-rays and other ionizing radiation absorbed by the tissues, breaking molecular bonds and create free radicals (charged groups of individuals), which in turn can disrupt the molecular structure of proteins and specific genetic material (DNA, RNA). Also hamper the action of enzymes and affect the metabolism drastically in influencing biochemical processes. It is possible that the cell is damaged by radiation to survive, but can provide many generations of mutant cells. If changes in the DNA for genes that control the proliferation rate of cells can cause cancer. Perhaps excessive exposure to such a body radiation cause genetic changes in cells, so that he ranks as the body is likely to remain healthy, but symptoms of illnesses such as cancer (eg thyroid, lung, breast, leukemia), or cascade of eyes will certainly
express his descendants. What makes it worse, but more insidiously various radioactive materials, are long the action after half-lives are enormous, so as to cease to be dangerous must spend centuries or even millennia. Also implicated in the radiation caused by the dropping of atomic bombs 63 years ago by Japan, to show still many diseases. The same goes for the escape of radiation during the Chernobyl accident.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

64

Despite efforts to control nuclear tests and even made "underground" (India and Pakistan have in recent tests in 1998), their derivatives, but dissipated in the soil and the atmosphere will accompany us for many years. Besides, the soaring price of fuel oil, artificial or real reasons, favors the development of nuclear reactors for energy production thereby increasing the nuclear waste and proliferation of natural hazards of radiation for several reasons. The following table, which was borrowed from the practical business conference on "radiation man" of Greek Physicists, shows the levels of radiation doses to get various medical tests, the time in which we would take the same doses of the environment and the incidence of fatal cancer.

Type of diagnostic test standard price effective dose (mSv) equivalent ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 65 values years background radiation * Prices likelihood of fatal cancer ** X-ray Chest radiograph (single-OD) 0.02 3 days 1 per million Skull X 0.07 11 days 1 per 300,000 Cervical spine radiograph 0.08 2 weeks 1 per 200,000 Hip X 0.3 7 weeks 1 per 67,000 Lumbar spine X 1.3 7 months 1 per 15,000 Mammography 0.2 1 month 1 per 100,000 CT skull 2 1 year 1 per 10,000 Computed tomography of the chest 1 8 3.6 years per 2500 CT abdomen / pelvic 10 4.5 1 per 2000 years With radioisotopes Lung ventilation (81Kr) 0.1 2.4 1 weeks per 200.000 Perfused lung (99Tc) 1 6 months 1 per 20,000 Bone scintigraphy (99Tc) 4 2.3 1 per 5000 years Dynamic heart scan (99Tc) 6 2.7 1 per 3300 years Myocardial scintigraphy (TL) 18 1 8 years by 1100 Doses received by a passenger airplane in flight Athens - New York 0.09 2 weeks 1 per 200,000 London - Chicago 1 0.06 1.5 weeks per 400.000 * This figure shows the time needed to obtain one the same dose if exposed only to background radiation (an average). The mean radiation environment for the UK, from which they came and values in the above table is 2.2 mSv per year. Local rates ranging from 1.5 to 7.5 per year. ** Approximate values likelihood of fatal cancer for the entire life of man by 16 to 69 years. For younger patients these values must be multiplied by 2, while for older patients to be divided by 5. Following table showing various situations increase the likelihood of death by one in a million. Status Reason Chest X-ray Radiation 2 months stay in Denver Radiance 300 km driving a car accident 2000 km flight in an airplane accident Smoking 1.5 cigarettes per day cancer Living with a smoker 2 years Cancer 100 meals eating grilled meat grilled Cancer Drinking diet soda drinks 30 Cancer Drinking 500 ml wine Cirrhosis The following table shows the symptoms that have certain doses of radiation absorbed by the body. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

66

Dose (rem) clinical results 25 decrease in white blood cells 25 -100 Nausea, fatigue, blood changes 100-200 Nausea, vomiting, fatigue, possible death infection because of reduced white cells 200 to 400 lethal dose for 50% of arguments, especially if left untreated. Lesions in the spleen and bone marrow. > 600 fatal even with treatment. The table below shows the key characteristics of ionizing radiation. As we observe the gamma rays and X are substantially more harmful if they penetrate deep into the body The neutrons also cause harm to a depth through secondary operations, which produce radioactive products. For example a neutron capture reaction, it is possible to change the structure of amino acids and thus proteins. nature of radiation load average penetration in air at body gamma E / tion - unlimited passes X-ray electric / tion - no limit deep a particle 2 4-10cm clothing, leather beta particles m -1 some few mm neutron particles from particles bound 0 Scan that shows blood flow to the heart with the help of isotopes 99Tc.

Υγιής ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

Ασθενής

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

67

Ta bass new weapons are the first to grill the Police in the microwave How do you say; It is safe; And the microwave ovens. 1. Take any one microwave. 2. Be careful not to plug it in and has power 3. Open the door and put through a mobile service shall 4. Close and lock the oven door 5. Call your cell phone you have in IF I have heard it ringing, radio waves coming into the OVEN Think how much radiation comes out when CARCINOGENS OPEN! . France recently banned cell in primary schools and is considering to ban mobile ads targeting children under 12 • UK, Germany, Israel, Russia, India, Finland also officially discouraged from using mobile ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 68 children . The manuals warn of mobile phone users to keep the phone off even when not in use. VlackVerry in 8300 warned that they should be kept at least 25 mm away from the body; But few users read the manuals. The warning from the U.S. Federal Communications Commission (FCC) for wireless phones. The warning attach the FCC's most common technology of wireless telephones, the Digital Enhanced Cordless Technology (DECT), states that equipment must be installed and operated with a minimum distance of 20 cm between the base and the human body. Because the DECT base-emit radiation similar to that of mobile, 24 hours in 24 hours. The radiation from mobile phones harm male fertility. A survey showed that men who use mobile phones for at least 4 hours a day have lower sperm count up to 59%. Other research has shown increased risk of testicular cancer and 80% of men who hold the phone in his pocket. Protection Measures The best is the KADOS Rubbish Use a wired headset or hands-free operation to speak, or send SMS. Hold the phone away from your body - never put it in pockets. Avoid using mobile while traveling by car, train or bus, and when in the countryside, away from antenna: in each of these cases increases the power of radiation. Use your phone as voicemail. Have closed until you want to see who has called. Then, and if necessary call using steps 5 or 1. Using, wherever possible, fixed wired appliance instead of a wireless phone, fixed or mobile. Avoid using the phone inside buildings, especially those with metal frames. Do not let children sleep with the phone under the pillow or nightstand. Do not allow children under 18 from using cell phone, except in an emergency. SPY DEVICE NEW VISA CARD The economy is not money, is cash, which is not controllable and gives effect to the owner. The VISA from 3 / 8 canceled all its cards and sent to recipients with the new built-in EMV CHIP comprising memory EPROM, sufficient to write, the writer lists some tilefonikous3 data and to store images and video, microprosecor antena. Is constructed and planted on the card, a computer without your written permission, of course not give you either a manual on how they can make this computer Spy TO YOUR PERSONAL LIFE ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 69 Your cell phone may even closed to broadcast your conversations and if there enabled camera transmits video images, sound that is Spy TO YOUR PERSONAL LIFE The new plasma TV is preparing to exit the market with a Trojan horse touchscreen mobile phones which doiathetei hard disk katalavenetai microphone and camera that is not to decorate a huge screen in your living room, but to spy on you completely through it especially if you To make shopping combined with your credit card that is just Spy TO YOUR PERSONAL LIFE The new mobile phone that is worn like a watch, I almost lost this rascal, you know what it really is, another device Spy TO YOUR PERSONAL LIFE But what nice is that allocating and bluetooth scanner, when you buy the pass as the scanning of the sales over the product and reads the barcode automatically transferring the charge to your account only all these girls sitting on the funds if bend beneath the bench has installed scanners will see a small label that says "CAUTION RADIOACTIVE release" Think about how quickly and surely getting cancer. You will proudly wear the new mobile clock in the left hand is the hand that all roads LEADING TO HEART and began to fill YOUR BODY RADIOACTIVITY that you Killing me release RADIATION Possible side effect concerns with epilepsy is simply attacking stroke centers are attempting to check and make CHANGES IN DNA, ie each birth and ... more stupid kids. We thank the Society THE SAME FOR IDCHYEI • Wireless computer networks • Asymati Television • Cordless Phones • Microwave oven • Cell Phones • GPRS navigation systems • GIS Mapping • Any device receives and sends data wirelessly via infrared or radio waves CERN The head of CERN wants to build the next accelerator No sooner begun the historic experiment in the Large Hadron Collider (LHC) at CERN, which will be in November, the Executive Director RolfΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 70 Dieter Choier said that it would strive to build at CERN and the future "Linear Accelerator, "the next big experiment in the field of particle physics world. As Choier said in an interview on physicsworld.com, the creation of new large accelerator (more linear and not circular as that which exists today in the underground tunnel length of 27 km beneath the Franco-Swiss border), is included in plans to internationalize further CERN. But for the linear accelerator, known as «CLIC», which will collide electrons and anti-electrons (or positrons) is expected tough competition from alternative applications for the hospitality, especially from the U.S. Fermilab, where is the accelerator Tevatron, The main competitor of the Hadron Collider at CERN. The CERN started to develop a paper model of a future linear accelerator and a competing project, known as the International Linear Collider ", already developed by the California Institute of Technology (Caltech). The Choier (whose mandate expires at the end 2013) confirmed that the existing Hadron Collider will resume in mid-November this year after last year's severe damage that placed him outside the "battle" for over a year has elapsed and after the repair or replacement of 53 magnets. The first particle collisions (proton) will begin a few weeks later, in late 2009 or early 2010. The first proton collisions will be conservative, only the energy 450 GeV per beam, before resorting fiercest clashes with energy 3,5 TeV per beam. According to Choier the accelerator will work with this energy force for several months and then, depending on the findings and, sometime in 2010, the particle collisions will become even stronger, at 5 TeV per beam, giving a total of 10 TeV at the meeting point of two beams from opposite katefthynsi.Mesa in 2011 if everything has gone well, the conflict will reach a maximum energy of 7 TeV per beam. The great hope of the world community of individuals is that these conflicts will reveal the "Higgs boson the" other "exotic" matter particles. Although the planned linear accelerator will operate at a lower energy level than the current Hadron Collider will be able to make accurate measurements, because electron-positron collisions are considered 'cleaner' than the collisions of protons of the LHC.Molonoti CERN was founded in 1954 as a purely European scientific establishment allows other non-European countries to join and many physicists from other countries (notably the U.S.) have helped greatly in creating the Large Hadron Collider. Almost a year when the Large Hadron Collider (LHC) at CERN started its functioning, many had expressed concern that it would create a black hole that would devour the planet. As some point today, the accelerator itself can be a black hole. What does that mean the prophecy "cold breath of the beast inside the circle;" Does talking about the enormous circular accelerator СΕΡΝ and a ton of sun you are using a refrigerant; The largest scientific instrument in the world has so far cost about 10 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 71 billion U.S. dollars, has served a total of nine ime3res not yet made any experiment. The 27 km long underground tunnel of the accelerator on the border of France and Switzerland built with the participation of scientists from many countries and thousands of physicists are waiting for the start of operation. According to the announcement by CERN, the accelerator will resume its operation in November, using half the energy, despite the pressures of scientists to full power, which will allow experiments hoping to unlock some of the biggest secrets of the universe . Even at half power, but the accelerator will be closed again in early 2010 to complete the repairs, so finally some time to operate at full power ilektrovolt 7 trillion, seven times higher than any similar machine in the world. Because of the injury, 53 in total electric magnets to be cleaned and repaired, while a series of lengthy operations should be repeated to ensure the state of subatomic particles into the accelerator at speeds approaching that of light and a temperature near absolute zero . The Mitsio Evil, professor of physics at City University of New York supports the accelerator of CERN, as a critical investment. "Europeans and Americans will invest ten billion U.S. dollars a barrel for anything," he said. "We explore the origins of physics and cosmology with the accelerator because we want to create a window to play a small part of the Birth to unlock some of the deepest secrets of the universe." The experts at CERN calculate the cost for repairs and additional security systems to reach 37 million U.S. dollars, which will be covered by the companies participating in CERN. The LHC is the largest accelerator in the world, after cancellation of the superconducting Large Hadron Texas because of high manufacturing costs and increasing questions about the value of its contribution to science. Upon restart of the accelerator in November, the Rays subatomic particles will run into force ilektrovolt 3.5 trillion (TeV). Is half the power compared to the potential of the accelerator, but still much stronger than any accelerator in the world. Scientists believe that the data generated by the collisions within the accelerator will show the conditions that existed one trillionth of a second after the Big Bang. Some have expressed fears that high energy collisions will cause small black holes, subatomic versions of collapsed stars and are so strong that "swallow" other planets and stars. The essential function of the accelerator becomes a factor for the development of the science of molecular physics. "If there are other surprises, delays and failure to satisfy the design specifications, scope of physics can not be developed for more than a decade," said Neal Lane, former science adviser to Bill Clinton. Because I see here a repetition of the Philadelphia Experiment exafanisytike Eldridge the aircraft which "possess" the Greek Armed ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, Forces, and Full House which was the

72 radiation;;;;

The accelerator at CERN will resume in November preservatives CERN is made clear that after nearly a year, no longer need other repairs, and inspections were completed and 10,000 electrical connections of the accelerator. The largest machine in the world, the experiments are expected to have historic significance for science, was forced to shut down last year in September, nine days just after the inauguration because of a serious electrical fault. The CERN, according to news agencies Reuters and French, announced that it intends to restart the accelerator with energy monster 3.5-electronvolt (TeV), "to allow operators of the accelerator to gain experience in handling the machine. The lowest energy will prevent the overloading of the electrical connections and allow for monitoring the operation. Experiments will continue with that less energy, "until it has collected a large sample data and the group of operators have gained experience on the operation of the machine. Then, the energy level of particle collisions will gradually increase the level of 5 TeV per beam emitted. By comparison, the "competitive" the Fermilab Tevatron accelerator in the USA working in the energy level of one to two TeV. The Director General of CERN Rolf Choier assured that this time everything will go smoothly, because, he said, "we understand the throttle much more than a year ago. Experiments in large circular underground tunnel length of 27 km near Geneva, will be held at a temperature just above absolute zero and will recreate the conditions that are believed existed in the original "Bing Bang" before the universe 13.7 billion years. The first scientific data are expected to gather a few weeks after "firing" of the first beam in the tunnel. At the end of 2010, scheduled in accordance with CERN, the accelerator to work with lead ions for the first time. After this, the accelerator will be shut down and will reopen at even higher energy level of 7 TeV per beam, which would allow the collision of particles in opposite directions by action seven times higher than ever achieved before. Physicists hope that these conflicts, among others, will reveal for the first time, new "exotic" matter particles or even opening up new dimensions of space Measures of radiation protection at CERN

In research laboratories, such as the European Laboratory for Particle Physics, CERN, the presence of radiation in the workplace is something everyday. Therefore strict measures to avoid unnecessary and maintained at a minimum the unavoidable exposure to radiation. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 73 The CERN strictly follows international accepted principle ALARA (As Low As Reasonably Achievable), which means that each report is kept as low as reasonably acceptable. Below explains what radiation is and how it is measured. Describe the procedures used at CERN in order to ensure the protection of workers and visitors from radiation and to avoid any danger to the environment. Besides accelerate electrons and positrons at CERN and operate machines accelerate protons, ions and antiproton lead. The proton beams, antiproton and high energy lead ions interact much more dramatic way than the material the electrons or positrons, leading to the creation of radionuclides, and neutrons. The neutrons have much higher penetrating ability of protons to the same action. At CERN created a much greater variety of particles, but because of the relatively small numbers do not matter as regards the effects of radiation. These muons, however, an exception. Interact with matter in the same way as electrons, but because they are heavier are much more invasive and require careful use of shielding. Neutrinos are produced also in almost all particle interactions. There are only produced at CERN and in great abundance in the sun. The interaction of neutrinos with matter is so weak that they can penetrate the earth as if it was not their way. Therefore, passing through the human body has no biological effect

New problems in the operation of CERN's Large Hadron Collider The new problem presented and its operation is interrupted, said spokesman CERN in Geneva. To repair the defective component is expected to take at least two to mines.To new problem occurred just one day after the reopening of the LHC by replacing a defective transformer evdomada.I this anomaly was recorded at 12.27 GMT on Friday, when the temperature to 100 of the huge superconducting magnets rose by up to 100 degrees Kelsiou.Enas ton liquid helium used as coolant, leaked into the circular tunnel, the LHC and had to ask the pyrosvestiki.Olokliros sector 3-4 of the tunnel 27 km will now be heated to start the repairs. "The investigation is ongoing but the most likely cause seems to be a faulty electrical connection between two magnets which probably melted, leading to equipment failure," said James Saturday Gillies, spokesman for Representative of the European Organization for Nuclear Research. The magnets of the LHC must be maintained at a temperature just 1.6 degrees Celsius above absolute zero to operate in a superconducting state and steer beams of protons to move through the tunnel. The frontal collision of two beams moving in opposite directions at near light speed, will allow physicists to recreate conditions that existed a few microseconds of the Big Bang. The experiments may confirm the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 74 existence of Higgs bosons in, a theoretical particle that explains why matter has mass. You might also shed light on mysterious dark matter and dark energy and respond to questions about extra dimensions that might be hidden in the universe. Hackers managed to breach computer systems at CERN Hackers managed to breach computer systems of the Large Hadron Collider, confirmed Saturday officials at CERN. The esvoleis who claim that they had bad intentions, to themselves as "Greek Security Team» (Greek Security Team). As revealed by the British newspaper Times and Daily Telegraph, the hacker left behind a counterfeit website that scoffed makers of computer security as " schoolboys. Confirmed that it had no intention to disrupt the major LHC experiments, and only wanted to show how ... "Black hole" in network security. "We bring down his trousers because they want to see you run naked trying to hide when he comes panic" they write in their message. "I do not know who they are but we have done harm. Obviously these are people who wanted to emphasize that CERN may be compromised, "said the Times, James Gillies, spokesman for the European Organization for Nuclear Research. Hackers claim to have obtained access through a site hosting the scientists for the inauguration of the facility Wednesday. Computers that have invaded the system is connected to CMS, one of the four huge detectors LHC.Ta experiments on the largest accelerator in the world are expected to begin in about a month, recreating conditions that existed a few microseconds after the Big Bang. Perhaps give answers to "the Higgs particle, dark matter, the antimatter, and the extra dimensions that might be hidden in the universe. The most complex scientific instrument ever built will be completed in the summer of 2008. It sits in a quiet area filled pastures, bordering Switzerland and France. The reason for the LHC (Large Iardon Collider) at CERN in Geneva, an underground ring 27 kilometers in length, buried at a depth of 100 meters. Inside Pass will be accelerated particles to reveal the ultimate laws of nature, what some consider to be 'thought of God. " Chill magnets for building the facility took twelve years of hard work. The project was approved in 1996 with a budget of 6 billion and is almost complete. The 1232 metal cylinders forming the ring have been put in place. Now we need to link up and to cool the -271.25 ° C (ie 1.9 degree above absolute zero). This extreme temperature, which is even lower than the temperature of interstellar space (about -270 ° C) is necessary for the operation of the 1232 superconducting magnets (one for each cylinder). The magnets will produce a field 180 times stronger than Earth's, so as to maintain a circular orbit sets of particles that move within the accelerator. The particles will close at 99.999999% the speed of light (300,000 km / sec). ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 75 The magnets have been partially tested and should be operating by the end of May, when the LHC comes into operation as planned. Then you follow a few weeks of tests and measurements, with the hope to start testing around mid-summer. As a 80 kg TNT When you are ready, the LHC will operate as follows: inside will move in opposite directions, two "parallel" sets of protons, particles located in the nuclei. In the structure there will 300,000,000,000,000 protons per bunch, divided into 2808 packets at 7.5 m from one another. The cartridge will intersect at 4 points where the detectors are installed. There will be made proton-proton collisions, which they want to study scientists. Each conflict has effect «14 TEV», seven times more than is feasible in the current most powerful accelerator, the Tevatron at Fermilab in Chicago. Illustration, we mention that this action corresponds to the energy produced when a mosquito flies. It may sound insignificant, but it is a proton, which is 10,000,000,000,000,000,000,000 times smaller than a mosquito. Let's look at a different way: all the protons of the experiment will have a total mass of just half a millionth of a microgram ... But it is so fast that their energy is equal to 80 kg TNT.I frontal collision of two protons will be so violent that would enable a phenomenon for us is strange, but it is predicted by the theory of relativity, the transformation of energy into matter . The energy of the collision will be concentrated in a tiny space and transformed into hundreds of particles that are born seemingly out of nothing and escape in any direction. What physicists call the "fact". The cluster of galaxies Ofiouchos is one of the brightest clusters in the sky at wavelengths of X-ray X-rays detected are too energetic to originate from the calm hot gas inside the swarm, indeed shows that giant shock waves should be disseminated through the gas. This has turned the population of galaxies in a giant particle accelerator. The picture shows the shock waves (red) to travel through the hot gas as two galaxy clusters collide and merge. Most of the X-rays from hot gas in the cluster, which in the case of Ofiouchou is extremely hot, 100 million degrees Kelvin. We do not know yet is exactly how most of the produced X-rays are directed at researchers two choices. The first option is that the electrons are captured in the magnetic field that permeates the cluster. In this case, the electrons would move spiraling around magnetic field lines, releasing synchrotron radiation beams form X. The second option is that the electrons may collide with microwave were the beginning of the universe and now bathe all the time. In such collisions, the electrons lose some energy, emitted as rays X. Which results will help scientists understand the history of the flock, to determine whether the main cause is the clash of two flocks, but how recently the flock of Ofiouchou ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 76 swallowed the flock that came. The truth is that nature has transformed the population of galaxies in a powerful particle accelerator, perhaps 20 times more powerful than the clash of the Big Collider CERN (LHC). To Large Hadron could detect "anti-particles" Understanding the mysterious Black Matter in our universe, cosmologists is paramount to us. The black matter and dark energy, a vast majority of mass in the aesthetic universe. Affect the rotation of galaxies, to clusters of galaxies and even holds the answer to the fate of our universe. So no surprise to us have heard about some unrealistic physics behind the possible structure of this hidden mass. A Harvard scientist has stepped up this whole situation by publishing his understanding on the dark matter, believing that the answer may be found in one type of material mass, but it behaves like a molecule. "Anti-particles" can also be detected by high energy particle accelerator, as the large detector Hadron (LHD) located at the Center for Nuclear Studies and Research (CERN) which will be no world wide web a few weeks. The high energy physics is about to become stranger than it is already ... The dark matter theory has many forms, including: neutron stars, weakly interacting massive particles (WIMPs), neutrinos, black holes and halos ogkodisympagi (MACHOs). It is difficult, however, be understood by deriving the majority of the mass if you can not comment, many of those who "know" about this dark matter and energy source, it will remain just theory until we actually find a way to follow. Now, we are likely not only to observe a form SkoteinisYlis but also to produce. Professor Howard Georgi, Harvard University physicist, wants to share his idea that the "missing mass" of the Universe can be kept in a content type that can not be explained by current understanding of physics. The revelation came to him when investigating what to expect from the future results of experiments LHC. Beginning with quantum mechanics (as one would expect), focused on the interactions between sub-atomic particles. Using the "standard model" that describes everything we know and understand about the matter in our Universe (interactions, symmetry, leptons, bosons, etc.), Georgi soon found itself in deadlock. Then came a key requirement of the standard model: the forces that govern the interactions of molecules act differently on different length scale. The Georgi made a bold move, assuming it can be produced by the LHC without the help of standard sub-atomic length scale constraints and thought if the "anti-matter" or not, exploring the possibility that the pilot thought you might need to slightly epanakinithei the extreme world of high energy particles conflict will certainly lead to some healthy scientific debate. * Quantum physics has revealed that among the molecules is a fundamental symmetry of each elementary ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 77 particle is symmetrical with an antiparticle same mass but opposite electric charge. Particles of antimatter have the same stability with the corresponding particles of matter. Consequently, the electron has an antiparticle with positive charge, the positron. The proton is the antiproton, etc. However, the matter and antimatter can not coexist in very close-spaced, except for minute fractions of seconds, and their interaction ultimately leads to mutual annihilation, with simultaneous release huge amounts of energy. Generally, the distinction between particles and antiparticles are conventional. Particles greater than those quoted in our physical environment, such as electrons and protons. In such an environment the antiparticles vanish, it is ephemeral. To produce the antiparticles must be high energy collision between two particles. In this case a part of the energy is converted into matter and antimatter in one. It is assumed that some distant galaxies may consist solely of antimatter. One of the consequences of this theory is the probability at any point in the universe there are antimatter worlds inhabited by ... antianthropous Starts great experiment in CERN, o Large Hadron Collider Starts at 10:00 (GMT) the greatest experiment in the world, under the Franco-Swiss border, the huge basement, length of 27 km, Large Hadron Collider (LHC) of the European Organization for Particle Physics Research (CERN), which promise to shed light on the circumstances of birth of the universe and allow the discovery of new particles of matter. And - incidentally - is expected to dispel fears of many that will bring the end of the world through the black hole can be created. It is worth noting that the start of the experiment will be broadcast live from the site http://webcast.cern.ch/index.html It is now a fact. After at least a decade of preparation and invest 6 billion on September 10, will begin the first phase of operation, the largest machine in the world, the Large Hadron Collider (Large Hadron Collider LHC) of the European Organization for Particle Physics ( CERN) near Geneva, an underground circular tunnel construction in depth from 50 to 175 meters long, 27 km in diameter and 3.8 meters below on both sides of the Franco-Swiss border. Twenty member countries (including Greece and since 1954 as a founding member) involved in the drive, which can be described as historic and televised by CERN (webcast.cern.ch), while the picture will be distributed through network of Eurovision. The first test synchronization of various components of the accelerator was on August 9, 2008, and several other subsequent weeks. The first beam particle accelerator will be released on September 10 will have an initial energy 450 GeV, or 0.45 trillion electronvolt (TeV). Inside the accelerator, where the temperature has now dropped to just 1.9 degrees ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 78 Celsius above absolute zero (-271 degrees) that is lower and the temperature in outer space will become the first rays emitted particles to move and be the first protons collide, the energy seven times higher than any other time in the past. In 2008, the beams will circulate in the LHC, have stabilized, so now the power of the particle is expected to be increased to 5 TeV. When we started the comprehensive phase of operation, probably in 2010, the energy of the particle collisions will exceed by about 30 other times in the past. According to an analysis of the Economist, is the largest-and longawaited by the scientific community, step in particle physics for a quarter century. The last major discovery in physics of subatomic particles was to find the so-called W and Z boson 1983.Kalos the supposition, unless the dominant theories ultimately prove incorrect, the next big moment will be the discovery of the Higgs boson of, a - currently-theoretical construction needed to give mass to other particles that make up the material. Logically, because the LHC, the discovery will be done quickly - if not, then the physical will be in a very embarrassing ... In fact, physicists are not invested so much money on "monster" of Geneva, only to find a particle in any otherwise provide the equations. What hope is to enter an unknown territory of matter. So far, the dominant theoretical model (called "Basic Model") contains 16 discovered subatomic particles known names (electrons, photons) or more exotic (mouonia, gklouonia etc.) and an 17th item that is pending confirmation (the Higgs boson). Another mystery, which the LHC can resolve, is the true nature of 'theory of everything ", the physics ever expect to develop. Until recently there was a consensus of individuals that it would be a form of "string theory", which among other things, contends that the universe has no fewer than 11 dimensions. In theory the particles are perceived as multidimensional vibrating "strings". The vibrational modes to determine the nature of each somatidiou.Eschatos But string theory has found a rival in the face of the theory of quantum gravity loops »(loop quantum gravity), which states that the particles are separated from the space and time, but rather the space and time consist of "lanes" shaped loop (loop), which, when intertwined with a number of ways, being perceived as particles. Finally, the LHC in Geneva is not excluded to make the miracle and to create small "black holes, which are however not going to swallow the Earth - as the scientists reassured Concerned! Just take not so much to manage this. What should happen is quick to dispel the so-called "Hawking radiation", a theory of the famous physicist, that if indeed confirmed by the experiments of the LHC, will probably give the next Nobel Prize in Physics

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 79 Emena but my friends because something tells me that going to repeat the famous experiment of Philadelphia; Why do I suspect that epieiroun to control time and space to intervene in the past and correct the future where they need; The whole project is not a scientific experiment, but this superiority as the Vulcan! Stand in the middle of the 2nd stage, as if we are below the turbine missile already begun antlistrofi measurement. KOINA ITEMS AND EXPERIMENT FILADELFEIAS СERN • Construction of a huge electromagnet • Create a powerful electromagnetic field - green misty cloud • Effect of Molecular Matter • Vibrating particle forces • Release from timelines • reassembly in another timeline Windsurf and Beach Volley Teleportation Question. Making the reassembly of materials at the desired time; If you do not succeed we will have a black hole that swallows up the material; THIS IS THE SETTING FOR MY accelerator СERN, was created ASTRIKIS PILI.

The

Philadelphia

Experiment

The Philadelphia Experiment, or otherwise «project Rainbow» was an experiment conducted by the U.S. Navy in October 1943 (the 28th of the month at 7:15 a.m. according to some sources) in Philadelphia (ex'ou the name «Philadelphia Experiment »). The objective of this experiment remains in the spotlight, even today, there is considerable confusion as to what they wanted to achieve and what finally succeeded with the experiment if we were. But before studying in detail the data from this experiment should be noted that some confusion. day following the trend of the human being deals with mysterious and fantastic tales, should be taken into account and the huge influx of information that has occurred during recent years. This input includes a number of inaccurate and often misleading views and some from the U.S. Information Agency, in order to confuse the public (is also klassikotati regularly, not only in terms of Americans, but overall). So it should be noted at the outset that some sources of information, tithontai 'conditional' and quite possibly a product ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 80 of misinformation. What happened? What is supported by the side of the proponents of this experiment is that a destroyer escort ship heading Cannon, named DE173 Eldridge, disappeared from the port of Philadelphia in a thick green fog appeared after 15 minutes the port of Norfolk in Virginia (distance would require about 24 hours journey) and then reappeared in Philadelphia. The implications of this experiment, but the ship's crew was terrible (which is why the test was considered failed). Many died, some disappeared, others went mad, and some even incorporated into the hull of the ship! The 3 dominant scenarios explaining this experiment are: 1) The theory of artificial invisibility when the ship was equipped with high frequency generators, which would make the ship invisible, warming the surrounding air and water. As argued, this can actually be done by appropriate means, essentially causing a reflection. According to this theory, the field generated around the ship but it was electromagnetic heating. The scientific approach (which contributed a Canadian named Alexander S. Fraser) allegedly used high-intensity ultrasonic waves, which were able to heat the material. Moreover, it is known that such thermal inversions are caused by optical illusions in the desert and make entire islands 'invisible'. This scenario explains the observed green fog surrounding the ship, and the complications presented to sailors aboard the ship. The weakness of this version is that the supporters of the ship traveled regularly to the Norfolk - which, as mentioned above, is inconsistent with the limited time the trial and therefore does not explain how it was seen at the port of Norfolk through 15 minutes. It also does not explain how the sailors were on a ship, and argues that simply fainted and lost track of time because of the strong ultrasonic field was created. 2) The official announcement of the Navy, during which the ship did take part in an experiment, but was designed to be invisible to underwater magnetic mines. This involved wrapping the vessel with a wire to inactivate the magnetic field and make it invisible in some mines (but not on radar) based on proximity sensors to trigger them. This process is known as demagnetization. It is a relatively reassuring announcement, but that leaves some gaps. These gaps have to do with why organized an entire experiment, and even a codename for the demagnetization of a ship, since the technique was known and was repeated in the past. It's a fair question that the Navy has not answered, giving the right to many extreme views to be expressed. 3) The theory of transport in space and time, which is the most extreme as well as supporters of the ship actually tilemetaferthike. In this version, is said to have participated in a number of eminent scientists such as Einstein on unified field theory (although he was not present in the experiment, most of the research which said that the navy was based, ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 81 was this theory) and Tesla (in electromagnetism) reported by some as the head of the experiment, although some had died prior months. Some even claim that the Tesla was murdered because they disagreed on the existence of the crew in that boat. Proceedings of the Eldridge wrapped with a wire which went through alternating current, causing the formation of a magnetic field around the ship (due to the creation of Oscillating a large magnet), bending space-time. Here of course we should say a few words about how it could happen ... A few words on the Consolidated Field Theory Einstein in the General Theory of Relativity argued that gravity was not a traditional power, but a distortion of spacetime. The John Archibald Wheeler in fact, trying to make a summary of this theory, states that "the space affects the material, and tells how to move. And the material reacts in space and tells how to curved. The above mentioned two main reasons: 1) Why gravity is that for many years been afflicted scientists. To complete the unified field theory, should find a single theoretical frame in which coexist the 4 fundamental forces of nature: the electromagnetic, strong and weak nuclear and gravitational force. 2) Why, in the words of those who support the validity of the Philadelphia Experiment, the unified field theory was something that applied then using a result of (orally expressed by Einstein) that if you can bend light, you can bend and space. However revealed how such a conclusion regarding the use of this theory for this experiment? Early as 1930, the sciences and mathematics had shown great progress, which was meant to speed on the "needs" of the Second World War. It is also known thatunfortunately-sciences are evolving rapidly in times of war, to military use different conclusions arise for the natural superiority of the country facing the enemy. That being so, in 1933 founded the Princeton Institute for Advanced Studies (Institute of Advanced Studies) and during operation of the pass there are several eminent scientists such as Nikola Tesla. During the Second World War, the discovery of some of the researchers of the Institute attracted the interest of government (and non-secret) services, providing many possibilities for efficient electronic camouflage for vehicles with a continuously changing coordinates (moving). Of course, the U.S. Navy had an absolute need such techniques "invisibility" because he had suffered great losses but also because it could cause even greater to the enemy. Imagine even a ship invisible to enemy radar of what would cause panic! Thus, in 1936, rumors like the U.S. Navy to finance a secret project code-named "Rainbow" in which, through the development of very strong electromagnetic fields could make a ship invisible. At the same rumors, head mounted Tesla, who later renounces (or dismissed or killed according to the conspiracy theories) because of ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 82 disagreement to be fully utilized to play the role of the test animal in question board. As a replacement for Dr. Tesla out. Von Noumea (and he said the institute). Conflicting information, and are probably part of the various conspiracy theories state that Einstein did not participate in the experiment, while an engineer Eldridge, o Silverman, says he saw the preparations of the experiment. As it anyway, insisting that the experiment was based on the theory of the unified fields. It all started in 1955 when it was released in America a book entitled «The expanding case for the UFO» (the case of UFO). Author of this famous, as it evolved, the book was the Morris K. Jessup, holds undergraduate degree in mathematics and astronomy professor and too little at the University of Michigan. Despite this, the Tzesap was not recognized in the scientific community and the main study was far from its purpose. Grappled with the idea of UFOs before they become fashion some years argotera.Ton January 1956 Tzesap received a letter (postmarked in Gainesville, Texas) from someone who had attended his lectures and read his book, the Name Carlos Miguel Allende (Carl Allen and apparently it was his real name). In the letter, Allende, among others, do the first report of an experiment in the U.S. Navy took place at the port of Philadelphia in 1943 which led to a whole become invisible destroyer. Allende himself claims that while serving in the commercial USS Andrew Furuseth in Norfolk in October 1943 (data to be confirmed), saw a ship suddenly appears through a veil of mist and green after a few minutes to disappear. On claims that he read a newspaper in Philadelphia to the contrary, ie, a ship that disappeared from the port of Philadelphia and reappeared a few minutes later. Descriptions Allendes the experiment continued with references to odd incidents resulting from the effects of the experiment to members of Eldridge. Characteristics indicate a man who disappeared in front of his family, passing through a wall, and some others disappeared (became invisible) during a quarrel in a bar. Others of the crew were burned alive or exaflothikan, while those who lived suffered from serious psychological disorders. Concludes that the results of the experiment was far from desirable and so the surveys Navy stopped 3 years later. The Tzesap not initially convinced by the descriptions and Allen wrote in asking for more details and information to confirm the story. The information came on 25 May 1956 a second letter, in my opinion is pretty interesting ... The most interesting in this is that Allen insists that the hypnotized to remember details like the name of the newspaper, date, article title and page number as well as names and grades of seafarers, addresses and telephone numbers. It is indeed surprising that Allen not only has knowledge of parapsychology and of what can bring hypnosis to the surface in terms of information but also offers to mesmerized by a reliable hypnotist who will offer the Tzesap to ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 83 emerge all the details know about this experiment. It says so in the letter "As you know, someone who has mesmerized can not tell lies and someone who has mesmerized and has given time and the" truth serum "as it is known, it could hardly be lied. Also, knowledge on parapsychology derive from another passage that says "it is known that some people might under hypnosis to tell you the name and address of a person even if you do not have seen or ever. These guys have a great player or just a big force Y which may be increased in times of stress or tension or intense fear. It can also epanentathei under hypnosis and then it's like reading the Encyclopedia Britannica ». Whatever way, the Tzesap still not convinced. Perhaps the specific spelling of Allen characterized by asyntaxies, the extensive use of capital and weaknesses in different content to be pushed to the doubts concerning the validity of the story. The rest are expected to become even more interesting since the spring of 1957, Jessup received a request from the Office of Naval Research in Washington. There, they showed him a copy of his book, whose margins were handwritten notes in three different colors of ink in three different handwritings. These notes included what had been told by Allende in his letters, and detailed reviews of significant scientific and technological requirements for space travel, flying saucers and theories of Einstein and Tesla. This is perhaps the only confirmed the fact on the experiment, as the book with notes and letters of introduction to the Tzesap Allende, a few printed copies and was named Varo Edition, the name of the company that made the reproduction. It would be naive to effortlessly accept the validity of those described by Jessup in his book or Allendes in his letters to the first. However, the views put forward and the explanations given by the experiment of Philadelphia and the general subject of the book Tzesap have enough interest. What remains truly remarkable, however, is interest in the Office of Naval Research (Office of Naval Research) for this book, although the notice of the Navy described the move as "a private initiative of some officials of the Office of Naval Research" . The death of the Jessup Jessup «suicide» two years after the reprinting of Varo Edition of his book on April 20, 1959. The official version says that he is in a bad psychological state because of marginalization by the scientific community because of the "heretical" views. Friends and colleagues advocated this view, while it is known that in the intervening years Tzesap began to open, making his story known. But the details of his death is relatively strange to lightly accept the above scenario. The last two years of his life believed Tzesap discussed thoroughly with the experiment of Philadelphia making tremendous progress. So one night before committing suicide, call the partner Manson Valentine saying he probably found something on which the experiment was to show him. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 84 Closed meeting for the next day, just as it never met the next morning Tzesap found in the car to a park, almost dead. The way we 'chose' to die was through the steam engine and connected to the exhaust inside the car. In the passenger seat was found a note allegedly written by him before committing suicide. Other rumors speak of a large quantity of alcohol found in his blood, which in combination with psychotropic drugs he was taking at that time was sure death. This means that I needed to do the patent made by evaporating to die, and even if needed, could not even think about the following as alcohol. Others say the bad psychology because it was getting a divorce because of the bad critics who had gotten his books. The conspiracy, but also and more believable in my opinion here is that she was murdered for what they knew. Indeed, although there is no evidence and no body was ever passed by autopsy, it is very surprising that on that day, instead met with Dr. Valentine chose to go to a park to kill himself. After the death of Tzesap, movements of unknown Allen as he was traveling constantly, either in Mexico or the U.S. or elsewhere. The Philadelphia Experiment, but started to become known to a wider circle of people, which seems the issue only three books in 1967: ~ The first titled as «The Allende Letters» by Brad Steiger, who had actually received letters from Allen. ~ The second is the «Anatomy of a Phenomenon» by Jacques Vallee, who had also received letters from Allendes with comments and information. ~ The third is called «Uninvited Visitors» and the author of the Ivan Sanderson, was friends with Tzesap believed to have exchanged a number of useful information about the experiment. Two years later, did something unexpected. Allen visited the offices of Varo and requested a copy of his book Jessup. Then he went to the offices of the Aerial Phenomena Research Organization (ARPO) Tuscon in Arizona and informed them that the whole history of the Philadelphia Experiment was just a farce. From then lost again to found in 1979 in the pages of the book «The Philadelphia Experiment» by Moore and Berlitz, which book is a very good research that actually did the experiment known to the world. The last mention of Allen made in 1983 where he gave an interview to the author, Linda Strand. Since then becomes once again disappeared until he died in 1994 in Colorado, including information from the files of the Department of Social Insurance A dubious witness in the mid-80s, appeared another witness who caused a lot of noise with the statement "I was there and saw with my own eyes." The Al Bielek, claimed that he was one of two Navy sailors who operated a machinery control room at the Eldridge. According to his version of history, puts the experiment in Philadelphia in two stages: on July 23 the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 85 first and the second August 12, not October as hitherto believed happened. He continues by saying that the crew traveled 40 years in the future to 1983 and found underground facilities program Montok "in Long Island. There he came into contact with are old Dr. Noumea, who explained that the experiment had escaped their control, created a rift in time and space and had to go back to Eldridge to shut the generators otherwise the time warp would grow and engulf the earth. In essence though, this is the script of the film "The Philadelphia Experiment" which had great success at that time (1984). Bielek himself said that he remembered everything when she saw the movie, and until then had been brainwashed by the Navy to forget the whole story. It states that "In families (the crew) are not ever told the truth. They said they were lost during naval warfare, which is of course a very credible response. "And his view on the results of the crew that" The body could not withstand exposure to such a high electromagnetic fields' . Over the next few years, Bielek was caught by some "known" aspects of history and ontas his PhD in physics, was very good at giving many technical details of the experiment in his books, interviews and lectures. Since then they have done other "witnesses' appearance, who they said were members of the crew, but all more or less repeated the script. Now, of course, comparing the words of Bielek with those of Allen, we see that there is a huge difference in the time of the trial, as the stories are different in two months. If we accept the date given by Allen, then the experiment was conducted after the official entry of the ship in active service, something that should be our concern regarding the absence of any testimony by the crew. Moreover, after 60 years, more and something could get from everyone, whether accidental or intentional. On the other hand, if we accept the date given by Bielek, then this indicates that the experiment took place before the opening of the vessel. Himself Bielek claims that used an 'anonymous' crew of which, those who survived after the experiment, were admitted to the psychiatric emergency hand, and to ensure their silence. The investigation of Moore & Berlitz on the ship's identity In one of the most enlightening books that were released on the Philadelphia experiment, the proposed «The Philadelphia Experiment» by Moore and Berlitz, given information about the ship was in the spotlight after reports of Allen for the experiment. Here we should mention again that although confirmed that Allen had served on Andrew Furuseth in Norfolk at the time, is reliable testimony that he saw the Eldridge and not another boat that day, as understood by Here is doubtful the validity of the story about the Philadelphia experiment. Consider, however, the identity of the ship, a destroyer escort named DE-173 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 86 Eldridge Cannon class with 1240 tons displacement. The official records of the history of the book informs us that: ~ entered the service of New York on August 27, 1943 ~ Used as an accompaniment to missions in the Mediterranean and the Atlantic until 1945 when transferred to the Pacific ~ Eldridge (Reserve Fleet) in July 1946 ~ Resold in the Greek Navy on January 15, 1951 ~ After years of service, transferred to the Naval Arsenal in Sudan in 1991, where paroplisthike to "make screws" somewhere in the late '90s In particular, for the relevant period of the experiment, the records of the U.S. Navy wants the ship to remain attached to the port from 18 October 1943, when accompanying a convoy returned to New York until 1 November when he left for Norfolk (which remained until November 3) and then in Casablanca, alongside the convoy GUS-23. Another controversial point concerning the ship calendar, as there are rumors saying that the pages relating to the period of the experiment are missing. This means that the Navy, although it held a great significance of such an experiment, just not bothered to put a fake diary, but tore the pages of an existing one. In an epoch-making significance test could not violate the "sanctity" of the calendar ... As it may, the calendars of any ship kept the same for the maximum period of one year and then transferred to the archives of Business Administration where he kept. So the log Eldridge, a national U.S. authorities and are publicly available. Something else we could ask ourselves is why it was chosen a new (and valuable to the needs of war at the time) the ship for the experiment and not another older. Also another reasonable question is why the experiment took place in such a "busy" place where everyone could witness the experiment, indeed how undercover agents recorded his opponent moves all of the Navy in Philadelphia. Perhaps the experiment aimed to impress the enemy, but here there is the question of why it did not change the name of the ship for misleading any indiscriminate viewer. It should be noted that there were then about 70 vessels of around Cannon which was identical to Eldridge.Milontas the vessel used, however, the most logical thing would be to do everything that no one can understand what it was, to conceal his identity from intrusive investigations and, if not destroy, to hide it somewhere so do not know anything about this ship. This is because the Eldridge like a ship is a tangible item and is also the reason why we hear so much noise around it. Despite this, the ship was not the fate of other similar (which either went into liquidation, or used as targets with live ammunition during the '70s), but moved to a place away from the geographic area which would be subject to indiscriminate investigations. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 87 The Eldridge in the Greek Navy The first mention of the mysterious ship in Greece was the playboy magazine in October 1996 (apparently it is the period "were screws) which presented photographs and became known to history. It is strange that his identity was known to Greek audiences from a magazine of this kind. However, the vessel had resold the Greek Navy in the aid program on January 15, 1951. The Leon D-54 »renamed as Eldridge, was one of the 4" beasts "who were transferred to the Navy, while the remaining 3 was" Ierax ", the" Panther "and the notorious" Eagle "which for the record, was to become famous as "starred" in movies like "Alice in the Navy," "The Guns of Navarone" and others. Naturally, of course, there were a number of sailors who served in the 'Lion' on the inside. First of all the American records refer to 1240 tons displacement, as above, and 1520 tons full load. The Greek records mention but a displacement of 1240 tons and 1,900 tons full load. This means that their resale to Greece removed 380 tons of equipment. What equipment might be he; Other reports speak of strange wires within the vessel does not seem to lead nowhere, which in fact are common to ships of this type. Others also speak of hallucinations members, strange noises (as usual) but also sealed hatches. However, we know that every five ships sent to the shipyard for repairs, painting and possibly some electronic or mechanical upgrades, suggesting that probably would be difficult to have left some information that will give us valuable information on the relation ship with experiment. A conspiracy theory that has afflicted some researchers is that "in reality" the "Eagle" was the ship used in the experiment and not the Leon, as the Navy deliberately changed their identities upon delivery to the confused traces. And draws this conclusion because of some odd references to the "Eagle" which says that the ship had a "strange" behavior (failures in communication, a temporary disappearance from the radar, etc.). The merits, however, is that Leo used in the experiment, equally valid is that used by the Eagle. For the record, the Eagle was decommissioned the same year with Leon, in 1991, but had a different fate and was donated by the Government of the Union Navy escort destroyer (DESA), which collected the sum of $ 275,000 of its members . Towed to the U.S. on 23 August 1993, re / rebuilt by volunteers and a common sight on April 30, 1994, taking the original name «USS Slater DE-766». Perhaps the Eagle to have something special compared with other 3 "beasts" ... However, the prevailing conspiracy thoughts regarding the resale of the Eldridge in Greece is that the U.S. Navy did not want to ruin and may have some value in that, so I opted to send in a distant country to lose the traces. But could also be given another identity to that ship for defensive reasons, to transfer the interest elsewhere and so the Navy ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 88 can do the surveys they want properly (eg to use it as an exhibit in a Maritime Museum as a cover for keeping the "life"). Why not repeated the experiment? This was repeated in the American base on Crete; Since the Philadelphia experiment was highly publicized, have made their appearance several scientists such as Al Bielek, for example, which provide detailed reports and technical analysis of how it was done the experiment. Also, the aim of the experiment itself would be a great technological leap if indeed happened. It would be reasonable to wonder why not repeated the experiment, while "we know how it happened" ... The answer is that "we do not know." Those scientists illustrate their objections to the validity of the experiment, as many people say happened. And most important here is that both sides are right and true otherwise. But it is worth to think that physical evidence given by various researchers and scientists, treading on the thin line fraud because it is relatively easy for some "guru" of physics to place terms like torque, frequencies, power levels, pulse widths, vertical magnetic axis field, etc., in order to confuse the audience, making them unable to understand, to express their queries and indeed how to judge how valid are these elements or not. Conclusion Assuming that it really was an experiment in Philadelphia, then we are faced with a major technological breakthrough and most who had the test been confirmed. Despite this, it should be given several answers about what really happened to the ship and its crew. If you assume otherwise, then "stumble" upon a sufficient notice of any seaman as to what happened in the mysterious "suicide" of Tzesap and caring for shipping the book. Moreover, it would be so difficult for the Navy to pull another better communication to illuminate further the case, even the rejects. But even if it is difficult to admit that such a story was actually one day, should be borne in mind that from 1943 until today, huge advances in technology and shocking crimes committed through this progress could be " justify "the existence of yet another experiment, the" Rainbow ". Yet, the American navy never went to the trouble to explain, which prompted this wave of conspiracy theories and parafilologias we see today around the Philadelphia experiment ... The 'Philadelphia Experiment' - The story of the mysterious ship Eldridge (DE 127) and disappearing - perhaps a successful experiment "invisibility" Whether may be missing an entire destroyer, in a few minutes to appear on another distant point and then to reimburse the initial position without passing by any obvious intermediate point? since the Second World War in October 1943, the U.S. Navy carried out a secret experiment "invisibility". Using electromagnetic fields failed to extinguish an entire destroyer with the crew of the naval base in Philadelphia, to develop ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 89 naval base in Norfolk and then back to Philadelphia. And all within a few minutes. But the side effects that the experiment in the crew of the ship is nightmarish. Many of the crew became invisible and could not feel their environment. Several of them disappeared and were lost forever, without anyone to find them. The Navy after that concealed the fact and considered void. Instead, the remaining evidence. Many are those who claim to have seen through the destroyer based in Norfolk, but none of them can be seen entering or leaving the naval base. Proceedings of the experiment was successful, although after the results of the crew and overshadowed covered. The case was investigated first by Dr Jessup. The Jessup did research on the existence and functioning of the UFO when he received a letter from someone unknown who signed as Carlos Miguel Allente. Among other things Allente mentioned in an experiment that took place at the naval base in Philadelphia, which he argues that followed located in another boat base. Initially did not particularly important, until he received two more letters from Allente and the editor of a book on the UFO filled with corrections, notes and comments which were written by Allente. This intrigued the author to initiate an investigation on the issue. Several years later, Dr.. Tzisap found dead in his car. The death was ruled a suicide. It was said that suicide in the fumes of the engine of the car, linking the interior of the car exhaust. Inside the car was found a note that said Tzisap wrote before committing suicide. Autopsies on the body for determining the true cause of death was never my blood and found a sufficient quantity of alcohol which is removed enough to cause itself to death. It is worth noting that psychologically took medication for a long time something which, in combination with alcohol can also lead to death. Considering therefore that at that point Tzisap was intoxicated is a bit difficult to say that suicide in the manner described. So there is the possibility of forgery of the note and the murder. So can Dr. Tzisap be killed because of investigations made on the subject, which were at an advanced stage? Very unlikely in my view. Carlos Allente was a strange man for whom there is not enough personal information concerning him, as place of origin and residence. His real name may be indeed the simplest Carl Allen. The letters are illegible, the result of the specificity with which they were written. These letters were written using inks of different colors and is capitalized rather than specific points, but incoherently and often interfered in the middle of words. Use at least 3 different colors of ink have been made and corrections of his book Dr. Tzisap. Many believe that reasonable adjustments are made by 3 different people, but studying and letters of Allente we can conclude that the author of all the corrections that might be Allente. Carlos Allente it claims was the time of the experiment on another ship, the Andrew Faraseth which was based on the time of the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 90 experiment. The description of the states that saw Allente creates a green cloud around the ship Eldridge (DE 173). Then the ship began to disappear and the only thing left visible was only the outline of the ship through the cloud, and that if it was near the area, it was possible to discern details that were behind the boat. The Allente describes that those who were on the ship felt as if transported to another world. We saw nothing from the ship around and felt to be suspended. The effects of the experiment on the crew was different and the duration varied in many cases. Everyone on board was gone mad. Many were invisible, even when it was under the influence of the field. The only way to reset was to come into contact with other crew members. Some reappeared briefly, but others remained in this state for a long time to find them and give them back, while some were lost forever, without anyone ever find them. Someone in front of the astonished eyes of acquaintances and relatives went through the wall of his house. In a local newspaper of Philadelphia said there was a reference to an incident in the bar area for some time after the experiment. The waitress says that she saw in front of two sailors disappear when taking a drink. We tried to explore the history attached to two cruise ships, Eldridge and Andrew Faraseth. Correct result for which the two ships were the period before, during and after the experiment. The reason is that there were gaps in the logs of both ships. Specifically missing pages in the diary of Eldridge for the period of interest (August 27 - December 1, 1943) and the diary of Andrew Faraseth damaged. The official figures indicate that the Navy ship DE 127 has length 306 feet and a displacement of 1240 tons and 1520 tons full load. The ship was sold to the Greek Navy, renamed "Leon" and exists today. Studying the Greek figures we find that the displacement of the ship is 1240 tons and 1900 tons full load. A paradox here about how increased the total tonnage of the ship's 380 tonnes of resale. This can happen only if the equipment is removed from within the ship. So you could say that electronic equipment was removed from the ship before it was resold to the Greek Navy; The Greek records also indicate a completion date and chartering the ship just a month before the official date mentioned in the diary and official records. Reference is made by Allente even in the name of Albert Einstein and his work on the Unified Field Theory. Einstein adopted the Unified Field Theory in 1925 and withdrew two years later, in 1927, for "humanitarian" reasons. Einstein was aware of how devastating it was to implement the theory. Example awareness of the risks of theories is the fact that Einstein tried every means to prevent the President of the United States from the application of proven theories, and thus prevent a nuclear war. The Philadelphia Experiment may be an indirect application of the theory of uniform field. The Navy issued a letter he sent to anyone requesting ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 91 information about the Philadelphia Experiment, which was as follows: DEPARTMENT OF THE NAVY OFFICE OF INFORMATION WASHINGTON DC 20350 2 3 July 1975 Over the years we have received innumerable queries about the so-called "Philadelphia experiment" or "Project" and the alleged role of the office of naval research (ONR) in it. The frequency of these queries predictably intensifies each time the experiment is mentioned by the popular press, often in a science fiction book. The genesis of the Philadelphia experiment myth dates back to 1955 with the publication of "The case for UFO's" by the late Dr. Morris k. Jessup, a scientist with a Ph.D. in astrophysics and a varied career background. Some time after the publication of the book, Dr Jessup received a letter by a Carlos Miguel Allende, who gave his address as RD # 1 Box 223, New Kensington, PA. In the letter, Allende commented on Dr Jessup's book and gave details of an alleged secret naval experiment in Philadelphia in 1943. During the experiment, according to Allende, a ship was rendered invisible and teleported to and from Norfolk in a few minutes, with some terrible aftereffects for the crew members. Supposedly, this incredible feat was accomplished by applying Einstein's never-completed "unified field" theory. Allende claimed that he had witnessed the experiment from another ship and that the incident was reported in a Philadelphia newspaper. Neither the identify of Allende, nor that of the newspaper has never been established. In 1956 a copy of Jessup's book was mailed anonymously to Admiral Furth, the chief of Naval research. The pages of the book were interspersed with hand-written annotations and marginalia apparently made by three different persons as they passed the book back and forth among them. The notations implied a knowledge of UFO's, their means of mention and generally, the culture and ethos of the being occupying these UFO's The book came to the attention of two officers then assigned to ONR who happened to have a personal interest in the subject. It was they who contacted Dr Jessup and asked him to take a look at his book. By the wording and style of one of the writers of the notations, Dr Jessup concluded that the writer was the same person who had written hi about the Philadelphia experiment. It was also these two officers who personally had the book retyped and who arranged for the publication, in typewritten form of 25 copies. The officers and their personal belongings have left ONR many years ago, and we do not have even a file copy of the annotated book. The Office of Naval Research never conducted an official study of the manuscript. As for the Philadelphia experiment itself, ONR has never conducted any investigations on invisibility either in 1943 or at any other time. (ONR was established in 1946.) In view of present scientific knowledge, our scientists do not believe that such an experiment could be possible ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 92 except in the realm of science fiction. A scientific discovery of such import, if it had in fact occurred, could hardly remain secret for such a long time. I hope this provides a satisfactory answer to your inquiry. The 'Philadelphia Experiment' may sometimes be executed with 'success', but may it never happened and is just a farce. The facts and figures on both sides are many and are often contradictory. There is more information on the experiment are not reported and which should be studied from all angles as to the validity of their own data and their sources. The fact that this experiment was sometimes not yet established, but there are suspicions that this is probably somewhere in October 1943 to be held By enigman The Philadelphia Experiment and the spatiotemporal response to the Persian Wars - Is it possible experiments with space and time have affected our history? - Can the infamous Philadelphia Experiment, launched in 1943 in America, was completed in the 1980s in Greece? - How involved in the Philadelphia experiment and the activity of American bases in Greece, especially in Nea Makri and Kato Souli, at the Battle of Marathon and the Battle of Salamis? A pioneering work only in the modern era of quantum thought could be given. For the first time out of evidence and proof for an extraordinary and bold version to the spatiotemporal response that led the Greeks to stop the expansionist policy of powerful Persian Empire in the 5th century BC. "The Philadelphia Experiment and the spatiotemporal response to the Persian Wars" is an original study of a Greek researcher, that similar to we can see for over 5 years in the domestic publishing sector. This is a groundbreaking research linking archaeological and historical exploration, on-site research and modern theories of time travel. And when all these are related to ancient Greek history, then the reader's interest soaring. Spiros Aslanis managed to write a book that I'm sure you will magnetize the interest of the Greek seekers. The reader is either satisfied or not by the views of the author, necessarily pass into another universe, a fascinating alternative history where the hordes of thirsty for expansion to the west Persia, inhibited by the courageous Greeks. So far, everything is known. But what would you say if someone claimed that the strange tales of ancient history for the intervention of mysterious Echetlaiou had to do to help "sent" from the very near our past in order to exterminate the Persians? In July 1943, the American destroyer Eldridge stranded on the docks of the Delaware for a test of the U.S. Navy had to make the ship invisible. The official name of the project was "Project Rainbow" (Rainbow Project), ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 93 but became widely known under the name "Philadelphia Experiment" (Philadelphia Experiment). Much has been written and assumed about the legendary experiment artificially invisibility (invisibility), well separating facts from fiction is nearly impossible, especially after the recent massive influx of false information and deliberate misinformation that was spread by persons associated with the U.S. Agency Information (US Intelligence Community) and professional skeptics. There is huge controversy about what exactly happened in Delaware. It is argued by some that took a huge leap of science and that the ship traveled in space and time passed since disappeared from Philadelphia, Pennsylvania, and appeared in Norfolk, in Virginia, 15 minutes later. What happened is still unknown, but various theories are detailed below: The "official" notice issued by the Navy The Navy acknowledges that the U.S. ship Eldridge took part in an experiment which included whipping the destroyer of the frame with wire in an effort to inactivation of the magnetic fields caused by the metal of. This is known as demagnetization. This would render the ship invisible to underwater magnetic mines that rely on proximity sensors to be triggered. These sensors operate detecting magnetic fields around the ship. Therefore, the ship was able to traverse areas trapped in such mines, invisible to them, but not on the radar vision. The announcement of the Navy is quite reasonable and does not include results or unusual situations. It could however only be a credible description for reassuring the majority of the public. Besides the demagnetization of ships known technique, no rare enough to warrant the organization of the entire experiment codenamed. Theory of Artificial invisibility Some scientists developed the theory that the Navy was working on a method to render the ship invisible to the human eye. However, it had to do with the folding space-time or any complex of similar nature. This theory suggests that the Eldridge was equipped with high frequency generators, which would heat the surrounding air to create a mirage, making the vessel invisible. This phenomenon occurs naturally, have been reported cases where whole islands disappeared from sight, under suitable weather conditions. The high frequency generator would heat the surrounding air and water (causing even a green mist which occurred around the ship), causing a mirage, and eliminating ferry from sight. The generator would be liable even for illness, physical and mental, of the crew after the experiment. A generator of high frequency can cause severe brain damage, especially in walking distance. This is a more believable theory and justifies the physical and psychological injuries suffered by all members of the crew after the experiment. But it does not explain how the ship was spotted in Virginia, the crew of the passenger ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 94 Andrew Furuseth, 15 minutes after the disappearance of Philadelphia. There is even information on some of the crew who, after the experiment were incorporated in the hull of the ship, or not found at all. Transport theory in space-time The most interesting and most far-fetched theory about the Philadelphia Experiment is that the destroyer, really disappeared and tilemetaferthike through space and time. Assume that the experiment involved many prominent scientists, among whom was Nikola Tesla and Albert Einstein. But Tesla was considered dead months ago. The theory maintains that the light would be bent around the ship to become invisible. To achieve this, wrapped around the circumference of the ship and went wire alternating current from it. This prompted the creation of Oscillating a huge magnet which formed a magnetic field around the ship, not only bending the light, but the same space-time. Proponents of this theory refer to Einstein on unified field, whereby if light bends inevitably bend space and time as well. During the first phase of the experiment, the ship is not entirely disappeared, but the footprint of the structure are deleted in clean water. The second time the ship disappeared entirely and came 15 minutes later in Virginia. When the ship reappeared in Pennsylvania, members of the crew were embedded with the hull of the ship, others were missing and others had lost her senses them. Indisputable is the fact that apart from the official announcement of the seaman, it was possible to communicate with any member of the crew. When the ship was sold to the Greek navy, the nominal capacity had increased by 300 tonnes, which means that it had removed equipment from the inside. It is possible experiments with space and time have affected our history? - Can the infamous Philadelphia Experiment, launched in 1943 in America, was completed in the 1980s in Greece? - How involved in the Philadelphia experiment and the activity of the U.S. Based in Greece, especially in Nea Makri and Kato Souli, at the Battle of Marathon and the Battle of Salamis? A pioneering work only in the modern era of quantum thought could be given. For the first time out through the investigation of the role of U.S. Based in New Makri and Kato Souli of evidence and proof for an incredible and adventurous scenario to the temporal and spatial intervention which led the Greeks to curb the expansionist policies of the powerful Persian Empire in the 5th BC century. In the early '30s, the University of Chicago in cooperation with the U.S. Navy trying to explore the theory Unified Field of Einstein, started an investigation into the possibility of missing items by the use of electricity. The project moved to the Institute for Advanced Study at Princeton, ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 95 where continued until the '40s, where a decision was taken to implement the theory. Object of the experiment was decided to use the destroyer USS Eldridge of the U.S. Navy. The first trials of the experiment took place in July 1943 and final test on 28 October of that year. According to the testimony of one of the many mysterious person taking part in this story is Al Beilek, who claims that there was eyewitness of the experiment. The Eldridge loaded with hardware and accessories to assist in the implementation and monitoring of this unprecedented experiment. Some eyewitnesses speak JIA two huge generators ton75 KVA, was located where the front cannon, which will distribute the load through four coils were mounted on the deck. Three transponders RF (of 2 MW each, also on deck), three thousand pro tubes "6L6", special synchronization mechanisms and modulation and other strange and mysterious parts made to fuel the construction of enormous electromagnetic fields that are synchronized when appropriate, It was not possible (the theory) to curb the power and light waves around the ship, making it invisible to enemy observers. What happened then; That day in July, the generators started operating and the giant electromagnetic field slowly began to form around the Eldridge. Suddenly, a green mist appeared around the ship, hiding in the eyes of those who watched the experiment. As reported by witnesses, when the fog was disbanded shortly thereafter, had taken her and Eldridge, leaving only the calm waters of the harbor to sway serene, where the destroyer was moored a few minutes! The elite officers of the Navy, but the prominent scientists who took part in designing the experiment, they were amazed by observing that the ship had lost only one of the supposed enemy radar and their eyes. After fifteen minutes waiting stopped generators. The green mist began to appear again and bring her and by that time ghostly Eldridge! Everything seems to have gone extremely well, but it soon became obvious that something had happened ... Once the officers and scientists boarded the destroyer to verify the results of the experiment, they discovered that the crew showed symptoms of nausea and loss of orientation. The crew and officers of the ship were replaced, the Navy decided that what mattered was only the extinction only by the radar equipment of the experiment was changed and everything was ready JIA a repetition of the experiment. The naval base in Philadelphia during the World War II's famous experiment allegedly took place at the Philadelphia shipyard and the open sea several times, one of which is attended by members of the ship Andrew Furuseth and other surface ships. The Andrew Furuseth has a special ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 96 role in history, because one of its members (the alias Carlos Allende or Carl Allen) constitutes the main source of information on what we know happened (or not occurring) on that day in October. Through a series of letters to someone Dr. Morris Jessup, the Allende describes what later became known as the "Philadelphia Experiment". Indeed, on October 28, 1943, at 7:15 in the morning was the final test on the Eldridge. Generators were resumed, the field began to take shape and the destroyer began to fade ... Only a faint outline of the distinguished above the water. For a few seconds, everything seems to go according to plan, when suddenly everything changed ... Inside a huge blue flash the ship disappeared completely! According to later information, Eldridge appeared in Norfolk, Virginia, dozens of miles away from the naval port of Philadelphia, where many saw it for several minutes. Then mysteriously the same, the ship suddenly disappeared from the port of Norfolk to make his appearance again in Philadelphia! This time, however, as noted later, the crew showed severe symptoms of various forms of incapacitation. Some "lost" forever, others went mad, and rumors speak of five crew members were incorporated into the metal structure of the ship. Those who survived were never the same again. Apotachthikan the Navy because of "psychological problems" regardless of their actual condition. So, an experiment that began as an attempt to implement electronic camouflage, came up with a (random teleportation of an entire ship with its crew farther away and return in a matter of minutes. But what are the sources from which we (or think we know) everything that happened that morning in October? The classic book by Charles Berlitz, which refers mainly correspondence with Carlos Miguel Allende to Dr. Morris Jessup. There he described the above, according to the testimony of the Allende The Whoever claims that he phenomenon. Correspondence former crew members or other citizens who have participated (in their view) in the experiment. (also mentioned in that book. Please note that the current literature on the Philadelphia Experiment include at least 65 books.) Typical example Alfred Beilek, allegedly worked at the Rainbow Rroject in electrical engineering and monitored throughout the experiment. Official documents of the Navy. In 1966, the U.S. Navy decided to deliver some documents about the Philadelphia Experiment, denying full stated that what happened. argue that there was such an experiment, that there was anything invisible. It was the Project Rainbow, but this was linked to anti-submarine warfare against the Germans and the service is supposed to make the experiment was in 1943. This EIdridge never went to Philadelphia and there are microfilm of the diary which was distortion of spacetime, the fields were created (intentionally or not) and some powerful spatiotemporal "lines" made the transfer troubled EIdridge to oscillate ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 97 between Norfolk and Philadelphia. Beyond inability to control and verification of sources and can prove it. Any electromagnetism experiments were compared with degaussing, a process that protects ships from magnetic mines. BUT SO IS; If someone wants to study what happened (or not done) during the Philadelphia Experiment, should address the following possibilities (at least the main, because the theories about this strange story will not stop moving for several years yet) : Things happened as described by the mysterious Allende, Beilek etc. information leading to this assumption, one of the most curious is how the destroyer left the sea also be transferred to sea and vice versa .... be part of the waterfront Norfolk, it was reported that appeared in Eldridge, the demise of the Philadelphia Naval Base The official version of the U.S. Navy. There was nothing but an ordinary and boring degaussing a ship, perhaps in conjunction with weird weather and the heated imagination of people at war created the rest. Show optical illusion due to temperature changes, the proportion of "asphalt shakes" in a warm summer day ... Add fatigue, morning suffering a military shipyard and get the rest ... Using an ultrasonic horn, thereby heating the air and sway around the ship, which can be linked with the challenge of sick crew members. ELDRIDGE TO THE GREEK WAR NAVY As many know, the Eldridge is in the possession of the Greek Navy for many years. Indeed many have heard stories from crew members, associated with strange phenomena. The Eldridge who is heading Bostwick and given to our country in the late 40s or early 50s with taking the name Leo (It's a mistake that many people feel that they are top Eagle ). Specifically, the Navy took delivery of four ships heading Bostwick, who were named: Lion, Eagle, Panther, Ierax. Crew members felt that they had hallucinations or feel strange vibrations in the ship, when they were in complete paralysis. In interviews Greek officers indicated that they found in the pages of the calendar pages corresponding to the dates on which the trial. Also by officers of the Greek Navy, enumerated ghost sightings on board, and disappearance of objects (excluded the possibility of theft because of the meager value of objects) and the reappearance of some of them in different places than before disappearing! One officer, board engineer, said that he was impressed by the huge amount of wiring that was it. He assumed that it was indeed part of the electrical installation for the celebration of the experiment. Also reported the strange tremors felt on the ship when it was even off, so powerful that once thought that an earthquake! Sources: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 98 - Department of the Navy, Philadelphia Experiment the official statement, (2000) (the official announcement of the U.S. Navy in Philadelphia Experiment) - BBC Documentary - The true story of the Philadelphia Experiment - Secret Technology special publications (Unknown) - E-Telescope - The Philadelphia Experiment - The Case for the UFO, M. K. Jessup (VARO Edition) - Anatomy of a hoax, Jacques Vallee (Journal of Scientific Exploration, Volume 8, Number 1, Spring, 1994) - Al Bielek's Speech at the Mufon Conference, January 13, 1990

ON the EMV To EMV global standard for debit and credit cards based on chip technology. As Q1 2008, there are more than 730 million EMV-cards using the chips that you are using for payments based on a microprocessor, a guy from mikrokompiouter that [provides high security and other features compared with traditional Magnetic Card Golden area in front of the card is known like contact area. A microprocessor is located just behind the golden touch protected by a capsule. (Collects data) When you insert the card to the driver reading the chip in contact with the reader. This contact activates the chip, which takes power and make the transaction. (Electromagnetic NEFOS) This is called a chip card technology. Another type A chip card is said card without contact. Using your hand holding the card a few inches of the reader. The reader activates the chip and receiving data wirelessly via RF without the card removed apoo your hand. The investigation showed that this method of cards from a distance is 53% faster than using a simple magnetic card and 63% from cash you are using. The EMVCo created protokolo contact your card from a distance (RAYS) EMV technology will relieve the European banks the cost of fraud through plastic money, since the chip ensures secure transactions. From the table on the progress of the adjustment process appears to significantly delay the replacement of the main debit and credit cards have countries like Italy, Spain, Portugal and the Netherlands, and the situation appears better in terms of acceptance machines plastic money. Greece is among the countries that have not advanced in the integration of technology EMV, the replacement rate of debit and credit cards be increased to 11% and 19% respectively, while 43% and 32% respectively formed the proportion of compatible the technology EMV, ATM and POS ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 99 WHAT Hide on the chip • that each transaction brings out a MINI X-ray. THE RADIOSYCHNOTITES-radiation induces KARKINOUS • THAT ALL REPORTED IN MEMORY TRANSACTIONS AND YOUR MEMORY chip is huge. • WHO IS THE MANUAL OF OPERATIONS; • The chip sends DATA • GO TO THE DATA SYLEGEI; ATEBank READ HOW THE CF RURAL DECIDE advertisement

"What is: ATEbank Prepaid Card is your electronic wallet for secure transactions anywhere, even on the internet! ... A unique gift for your loved ones ... The holder may charge the card with the amount each time it wishes to use. Use of the card: Used 24 hours 24 hours anywhere in the world with the mark VISA, for: • Shopping / payments / subscription via the Internet (without the physical presence of the card) • Purchase equipment to P.O.S. in shops and outlets in Greece and abroad, especially in modern technology applied for the PIN, and no additional authentication of the owner by dealer • Telephone and mail order (without the physical presence of the card) • Cash withdrawals at any ATM worldwide • Cash withdrawals at any ATM for free ATEbank Secured transactions: The ATEbank Prepaid Card is a chip card technology and meets all international safety standards and EMV. It is safe, since you have available, only the amount you will use immediately. The "charge" with money when you need it. Use it to shop, and then when you need it, the "charge" again. In this way the owner is not exposed to potential risks of card misuse by others for large sums. Continuous updating of the balance amount available and transactions with the card You will be contacted: ) For the balance of your card by the ATM network and our third site. b) for the last ten transactions from your ATM in our network Target ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 100 The card is designed for customers ATEbank and third parties. Can be given as a gift to a friendly and loved ones or new even to minors aged 14 not yet using deposit accounts and have no ability to use credit cards, providing security without having to carry cash. Applicants must be over 18 years. Transaction limits The total amount available with which they are charged a card with one or more successive loads can not exceed the balance of € 2.500 €. The maximum amount of each purchase can be up and available whenever the amount of the card. The maximum cash withdrawal through ATMs ATEbank up to € 1.500 (per transaction and per day) and limit each bank ATM withdrawals from third parties. If a concession card to a third party - bearer limits reduced to € 1.000 per calendar year. Card Issue The Application for ATEbank Prepaid Card is in all stores before. You receive the card immediately and you can "charge" to either store or via Web Banking SA and use it the same time. Invoice FAQ Useful Tips Detailed instructions and more information is available from: To Tele-Service Center ATEbank: 210.38.94.400 or stable at 30 801 11 5800 0, option 1. That sends DATA TO MINISTRY OF FINANCE CF Registrar EIPES AL U.S.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

101

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

102

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

103

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

104

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

105

Banking products come from the future! Soon credit cards shaped pendant or sunglasses and mobile as a credit Even, frequencies of service and safety Bank products and shops reminiscent of science fiction come to Greece. H «new generation bank," as called by the staff of the market, based mainly on modern management techniques, rather than on innovation and new products. However, next to new ways of promotion will be added to certain facilities, such as coverage of the credit card holder from theft or the borrower by a sharp increase in interest rates. (It is the story) Etsi will soon see credit card-shaped pendant or sunglasses in the latest fashion - even mobile phones will work and as credit cards. At the same time, be granted credit cards in which consumers will pay only their show without having to "pass" by a special machine. (Eating the RAYS OF THE GUARANTEED AND CANCER) This, say bank executives will facilitate sufficient funds transactions, for example fast food, so as to avoid queues. Even we will see a mini credit card in size a little lighter. Beyond that, however, the new figures on credit cards, bank staffs designing models of its stores. The new stores should be comfortable to stand up to the customer, to provide venues where we might be able to transact. Overall, the aim is to convert stores by selling points to signs of ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 106 advice along the lines of private banking. In other words, could shape a new branches in private banking for many. New services facilities Payments Mobile launch the MasterCard and GSM Association (GSMA) in a pilot program that will begin later this year (2007). The program includes the simplification of international money transfers between individuals and is aimed at people who do not have bank accounts, immigrants or expatriate employees working in these countries to send money to friends and relatives at home quickly, easily and securely using Technology payments by phone. (AP Electric ALL you guys) The six-month pilot program will initially focus on sending money between individuals in areas of the world where people regularly send money back home. In this program, it stipulated that the recipients of the money will be informed by text message sent via the mobile telephony network and gain access to money through debit and prepaid cards issued by the local trapezes.Se what case of services and substantial piece of banking products designed some changes and additions relate mainly to: Create a credit card all-in-one. That one card will serve as a credit or debit or a car loan. H convert to these products will be automatically provided to said owner of the funds which make the payment. (So PAREIS GUARANTEED AND THE ATTACHMENT) Auto loans provide the borrower a sharp change in interest rates. Gradual removal of subscriptions from all products. (TOSOUS INTEREST TO gets) Flexibility in installments. O borrower can pay what it can each month and will be increased accordingly or reduced the duration of the loan. (Just PLIRONEIS THEIR INTEREST. NOT THE CAPITAL WILL NEVER repaid) Prepaid Credit Cards. These credit cards with chips, which the customer would buy from a desk with about 4 million. They will then submit the card you want money and make purchases. Bank executives have found a particular interest in these cards by consumers who make transactions via Internet or play games and other games on the Internet. Also, have found interest from parents for pocket money for their children studying away from home. Also, interested companies that will use them as gifts at Christmas (especially for employees, instead of vouchers). H more, but emphasis is on quality and range of services that will govern the new Greek banking. The banks believe that the period of low interest rates will not last for a long time and even that the battle in the market will not give the rate, but in quality and services. "Anepafes' payments The introduction of EMV Chip technology in Europe, or credit cards with ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 107 memory chips or "smart cards" means not only greater security in traditional transactions with payment cards, but provides in addition to the payments industry can develop and offer new, faster and more flexible ways pliromon.Mia area has significant potential activities are "contactless" transactions (contac tless payments). Already, Visa and Mastercard in Europe have the first card of "contactless" transactions or otherwise tap and go. The cards allow consumers to make payments in less than half a second, just holding the card in front of a terminal that accepts "contactless" transactions. In this case, the cardholder does not even need to give the card to the officer to complete the transaction. (XCF EFYGES) Payment instructions "exchanged" in a secure manner between the chip card technology for 'contactless' transactions and accepting terminal using wireless communication technology. Padiosychnotites EMV chip technology has the potential to overcome many barriers, which traditionally does not facilitate the use of payment cards for low value transactions. Going one step further and combining EMV technology with wireless technology, credit cards are able to offer a comprehensive and workable solution that would replace cash. "Technology EMV, in conjunction with the existing standard ISO 14443 Radio Frequency Identification (RFID), ensures both the facilitation of the cardholder and transaction security," he informs Visa. That would greatly facilitate the socalled offline «contactless' transactions. More specifically, the issuing bank should establish and monitor the maximum value of the transaction and the aggregate expenditure through offline transactions. For example, an issuing bank can personalize a card to enable the holder to perform offline «contactless" transactions, where the maximum value of each transaction up to 10 million when the aggregate of these transactions does not exceed 50 euros. Each time the holder uses the card, an integrated set of "Cash» (counters) calculate the aggregate value of all the offline transactions. (MIPOS ESTIMATE AND SO ON THE TAX TO BE FULLY; Ust VRE from here!) To facilitate instant payment, the PIN is not requested by the cardholder payments low value (below the limit set). Once consumers reach the limit set by the bank, this machine will require to fund the transaction to be online with technology Chip and PIN, thus preventing the uncontrolled use if the card is lost or stolen. New applications Meanwhile, Mastercard with a Nokia test pilot stage, even if the creation of a mobile phone - credit card and Visa already was demonstrating a solution "contactless" transactions using a mobile phone Nokia 3220 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 108 equipped with a special cap Nokia Near Field Communication (NFC). The implementation of the Visa EMV technology is stored securely on a smart card embedded in the jacket NFC and fully compatible with the card for "contactless" transactions of Visa. To NFC enables interaction with a touch among mobile phones and other commercial electronics. The transaction is in the same way as on card payments. The only difference is that instead of the implementation of EMV technology to be stored in the card payment is stored in a secure chip in the mobile phone. (WHY YOU torn On the pretext of TROMOATIA YOU ARE WHO HAS THE DETAILS WHAT MOBILE. NET says the next line) The NFC technology will facilitate the convergence of mobile phones to credit cards, creating additional value, for both cardholders and merchants. H philosophy of "new stores" According to the philosophy of "new store" will be available the following sites: Area self: The customer service is a clock, via ATM, Internet (e-banking) and telephone (phone banking). Funds: Should be readily accessible. Usually, once lined the entrance. Customer Area: Area to accommodate the massive customer base but also proupantisi those entering the store. The role of officials in this region is important. First, they serve customers who do cash transactions. Secondly, guide the customers exactly where to go. Thirdly, 'teach' customers to use alternative networks (ATM, Internet, telephone). HOW DOES SAY TOKOGLYFOS COURSE; Showcase banking: It's in the shop window, with the advertising and promotional material. Location advice: serve customers with high added value of experienced executives who give advice. Throughout the store there are strong marks and promotional messages. Credit cards with style accessories, key chains and sunglasses Credit Card-shaped sunglasses and key rings come in the Greek market. The banking products from ... future will resemble science fiction and propelled by the latest marketing techniques, sending the "Battle of interest" in the pages of economic history. The banks plan to scale models of new stores will resemble mini «private banking», while telecommunications companies and credit card created mobile phones to be used as a card, and consumers will be able to pay and ... waves. Radiation, cancer at 5%

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

109

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

110

Card - Key Ring Ground from the branch of the future It's time to live the wolf with the lamb in harmony; U.S. SAID NO, THE CHASAPIS How to live; WILL cuts FTEROUGES ANGELS WITH THE BALL; Eidomen ... 1 Smart Card Technology: Applications Academia GI! RGIOS VERANIS Master Thesis Supervisor: Konstantinos Tarabanis Examiner: Konstantinos Margaritis 0.P.M.S Information Systems University of Macedonia Thessalonica January 2008 2 Copyright c George Terrace, 2008-01-13 All rights reserved. All rights reserved The approval of the thesis by 9.P.M.S. in Information Systems, University of Macedonia does not necessarily imply accept the views of the author by the Department. 3 Summary This thesis aims at the planning, analysis and then the planning and implementation of an Information System to enhance the quality of the services of a university institution to the members that compose it. Smart cards are a safe for personal data and are easy the transfer as a tool. Their particularity is that it can represent physical entities in electronic trading systems. The applications implemented worldwide and the benefits result is important for both the user and the provider services. In the first chapter is an introduction to the operation of smart cards to give the reader an intimate knowledge of the technology and ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 111 efarmogespou have smart cards worldwide. The second chapter reference to a case study of the institution for which will become the Information System. Then presents the programming work and the analysis of concepts / entities and processes, which presented with the use of appropriate diagrams. Also in the fourth chapter presents the design of the system developed as suggested by the literature. Below is a description of the application and Code written for the purpose of implementing it. Finally, An annex to the application code was implemented and satisfies the functional part of the Information System. The main aim of this work is the creation of an Information System in illustrating the procedures of running a daily academic institution that services will be associated with a system functions based on smart cards. Also accompanied by a reliable database and provides a flexible way of interacting with the user through the use of modern development tools information systems. 4 Abstract The present diplomatic work aims at the planning, the analysis and then the planning and the implementation of Information System for the qualitative upgrade of offered services of academic institution to the members that compose it. Smart cards are safe for save personal data and are easy in the transport as means. Their particularity is in the make that they can represent natural entities in systems of electronic transactions. Their applications are materialised in world level and the advantages that arise are important so for the user so for the institution of benefit of services. In the first chapter becomes an import in the operation of smart cards so that acquires the reader with familiarity regard to smart cards technology and the applications that they have in world level. In the second chapter becomes report in the study of cases of institution for which will become the Information System. Then are presented the planning of work and the analysis of significances / entities and processes, which is ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 112 presented with the use of suitable diagrams. Also in the fourth chapter is presented the designing of system developed, as it is proposed by the bibliography. Follows the description of the application and code that was written for the aims of the Information System concretisation. Finally, is included an annex with the code of application that was materialised and it satisfies the functionalism of part of the Information System Main aim of work is the creation of Information System which will impress the processes of daily operation of academic institution that its services will be connected with a system of operations based on smart cards. Also it will be accompanied by a reliable base of data and will provide a flexible way of interaction with the user via the use of modern tools of growth of Information Systems. 5 CONTENTS 1st Chapter 9-32 1. What is smart card? 1.1. Introduction 9 1.2. Advantages 10 1.3. Developing applications for smart cards 11 1.4. Contact smart cards 18 2. Applications 21 3. Case studies of smart cards in 24 universities 4. Future use scenarios. 31 4.1. Vote 31 students 4.2. Evaluation of teachers and students 31 4.3. Receive printed or electronic material 31 2nd Chapter 33 to 35 2. Case Study 2.1. The problem 33 2.2. Description of services and problems of the university 34 3rd Chapter 36-49 3. Programming 3.1. Selection Methodology Development CP 36 3.2. Request System 38 3.3. The analysis of feasibility of the project 39 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 113 3.4. 0iacheirisi Project 43 3.4.1. Findings of the project 43 3.4.2. 0iacheirisi potential risks (Risk Assesment) 48 4th Chapter 50 -99 4. Analysis 4.1. Requirements Analysis 51 4.2. 0iagramma activities 57 4.3. 0iagramma use cases 61 4.3.1. Description of use cases 62 4.3.2. Calculation man using use case points 72 4.4. 0omiki Modeling 74 4.4.1. CRC cards 75 4.5. Modeling Behavior 86 5th Chapter 100 -112 5.Schediasmos 5.1. 0iagramma package and strategy development 100 5.2. Designing classes and methods 102 5.3. Window 107 Chart Navigation 5.3.1. Standard design application 109 5.3.2. Evaluation interface 110 5.4. Infrastructure Planning 110 6 6th Chapter 113-134 6. Description of application implementation 6.1. On - card application 113 6.2. Off - card application 121 6.2.1. Description 121 6.2.2. Architecture 128 6.2.3. Description File Code 129 6.2.4. Database Design 133 BIBLIOGRAPHICAL REFERENCES 135-136 ANNEX A 137-181 7 LIST OF ABBREVIATIONS! N SP = Information System etc. = And other

1st Chapter 1.the is the smart card? 1.1 Introduction Today there are millions of users of smart cards that use these in their daily lives. The applications are many and these provide ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 114 advantage of security and confidentiality of the data holder. The first cards have made their appearance in the early 50 ', where first group Diners brought to market the first credit card. These cards were more a kind of magnetic card (ancestor of smart cards). The group succeeded in a short time to make accepted the card from a set of retail chains that offer services travel and accommodation, like this began to use and widely Europe and America. In fact what made this card was to replace the money in its current form, that is why the magnetic cards are also known as plastic money. " The first smart card was introduced in 1968 (Hansmann et al. 2002), (Chen 2004), based on a patent of Juergen Dethloff and Helmut Groetrupp that allow the introduction of a type circuit in a plastic card. 9rontas independently Kunitaka Arimura Arimura Institute of Technology in 1970 has its own patent for the introduction of plastic circuits cards. Yet real success (Chen 2004) for smart cards came 1974 and 1979 by Ronald Moreno, who had 47 patents related to smart cards. The first smart cards have the ability to store data in Card example owner's data (name and password). The first largely successful efforts to use smart cards launched in early 80s'. Between 1982 and 1984, the Carte Bancaire (the first French banking group) ran a pilot program, which has seen great success. The smart card industry grew and now estimated stingermaniki banking market move over 52 million smart cards (GeldKarte). Recently, the technology of chip and 10 Modern cryptography has significant advantages of smart cards, so thus strengthening their position in global technology. There is a Today many uses such as: storing electronic money replace money that is on paper, storage and security of personal medical evidence, to preventing uncontrolled access to cable and satellite, wireless phone safety, etc. Fig 1. Java Smart Card multiple functions of IBM, in actual size (Hansmann et al. 2002) 1.2. Benefits Smart cards offer significant advantages for applications for intended. The three keywords that specify full advantage of all the advantages are security - Portability - ease of use. It is true that processor, memory and support for I / O is a circuit which is embedded in a plastic card. Before the 50s it a science fiction today, more and more ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 115 States want to use people for the benefit of society them. In modern cryptography, smart cards become more powerful against hostile acts (Chen 2004). The ease of use and portability have made them in countries such as United States and Bahrain as "electronic wallets" One can make use of smart cards for secure internet markets as they would be bought with money or with a credit card any information needed at the memory card and elsewhere (Hansmann et al. 2002), (Chen 2004). 11 Also depending on the technology of each card there may be stored on the card (no dependence on the memory card) in addition a small-applications for corresponding applications that can be connected eg cards with technology JavaCard - known as third generation (Vogiatzis 2001). Still, an important advantage of such cards is that information can be copied by other means (Hansmann et al. 2002). 1.3 Developing applications for smart cards An application for smart cards consist of two parts. The first is called on-card and is usually an applet that is loaded and executed on the card. Fig 2. On-card 9iadikasia Development (Dalvins Technologies, 2007) The second part is called off-card and is the part that is in computer connected to a smart card reader or a terminal (Hansmann et al. 2002). 12 Fig 3. Schematic description of an integrated application. (Dalvins Technologies, 2007) The term terminal is meant ekeinitin computing unit has appliances revenues and expenses on such self-reliance ATMs of Banks. The offcard applications can be deployed in high-level languages such as Java, C, C + + and other (Hansmann et al. 2002). The on-card part of the program is stored in the memory of the smart card. This section consists of data and perhaps executable code. The executable code is executed by the operating system of the card and may use the services of the operating system provides. The Smart Cards Java Card technology are able to store many small applet each time depending on program requirements located in off-card part is the ability to select, compile ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 116 and run the appropriate applet when it is no longer useful for application to apoepilegei in literature this process refers as "a lifetime applet» (Hansmann et al. 2002). The Java smart cards are suitable for long applications. Most manufacturers offer a smart card development tools software, which support the development of on-card applications. The smart card operating systems allow the latest generation applications developers to create and upload their own on-card part of the application. The key is apoafta: Java Card, Multos, and Smart Card for Windows. 13 Java Card The Java Card is not operating system for smart cards, but a platform containing an operating system, which is not directly accessible from the applications that the card has. The advantage of this platform is that oncard applications written in Java and provides a good basis for development applications on a single card, in other words means that only one card can to serve many applications. The Java Card is owned by Sun Microsystems Inc. and has the development rights and use. The latest version is Java Card 2.2.2 API and is provided by the OpenJDK 7 development to offcard applications that communicate with the card (Hansmann et al. 2002). The executable code on-card application is binary code interpreted by the Java Card Runtime Environment (JCRE), which controls the performance of different applications. The on - card application is called «card applet »and determined only by the AID (Application Identifier) as stated in ISO 7816-5. The AID consists of two parts, first part determine the global company that developed the application (Chen 2004). The Java Card has limitations such as lack of support loading dynamic classes, collecting garbage (Garbage collection) is mandatory. 9en a class SecurityManager, the security policies are directly to the JVM (Java Virtual Machine). Also, the JVM does not support multiple threads. Objects can be cloned. The main types char, double, float, long is available and the type int backed up for 32 bit integers. However, they can use a common Java compiler to compile code that is written in a Java Card ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 117 binary code. Multos The Multos operating system developed by the industry association Maosco that preserves user rights. It is one of the operating systems can support multiple applications within the smart card. 14 Provides an interface compatible with the ISO file system and runtime environment specific applications. The applications are developed in a new language which called MEL (Multos Executable Language), developers are also can use the languages C or Java to develop applications and can convert them using the compiler MEL. In phase Implementation is also support in Visual Basic. The Multos in conjunction with an API called AAM (Application Abstract Machine), provides a common operating system. When creating a Multos new application then it can be downloaded to any intelligent Multos card without any additional treatment. The AAM is the top Multos operating system and is independent of the hardware card (Hardware). This explains the application was written in the language and MEL translate into specific commands of the operating system, and running (Hansmann et al. 2002). Figure 1. The operating system Multos (Hansmann et al. 2002). The operating system has been used in Multos project Mondex. Smart Card for Windows In 1998 Microsoft entered the market of smart cards on its own production of cards and in November 1999 announced the first version of operating on the cards. The cards are compatible operating system Silicon (Harware) Multos AAM Multos Operating System MEL API Application Application 1 Application 2 3 15 with ISO 7416-4 and are suitable for programming. The core provides file system, access control, I / O, encryption services, APIs, and a ISO set of commands. They can also be developed, especially custom applications because of environmental enforcement has. The company provides all the tools to develop such applications in these ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 118 interested. The development environment of these tools is through program Visual Basic. The instruction set is specially designed and can support all accepted standards such as ISO, EMV, GSM. The file system looks like very similar to that of the DOS FAT. In the first version execution environment is interpreter in Visual Basic. In the future, designed to support C + +. This execution environment provides flexibility and advantages as we know from Java Card and Multos (Hansmann et al. 2002). For communication applications that are within the smart card and applications located in terminals developed some standard and specifications that are commonly accepted and supported by all companies industry. These are the ISO 7816 standard, GSM, EMV, Global Platform, OCF, PC / SC, M.U.S.C.L.E. ISO 7816 standard To ISO 7816 "Identification cards - Integrated circuit cards with contacts" published by 9iethni Organization ISO (International Organization for Standardization), is the most important standardization defining characteristics a microprocessor card, which has electric contacts. It covers the most important issues for smart cards (Chen 2004): Part 1 Physical characteristics Part 2 - 9iastaseis and location of contacts Part 3 - Electronic signals and transmission protocols Part 4 - 9iavimiochanikes orders for exchange Part 5 Determinants of applications 16 Part 6 9iavimiochanika data elements Part 7 9iavimiochanikes commands SCQL GSM The ETSI (European Telecommunications Standards Institute) has published a set of presentations covering smart cards for public use and cellular telephone systems. The GSM (Global System for Mobile Communications) is defined by the ETSI.Stin actually covered only a few countries in Europe, but the increasing deployment Phone applied in other countries, becoming an international standard (Chen 2004). ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 119 EMV The EMV standardization, defined by Europay, MasterCard and Visa. Based on to ISO 7816 with additional features required by industry economy. The latest version of the EMV 96 version 3.1.1, published in May of 1998 (Chen 2004). Global Platform For the development of off-card applications, the most popular Frameworks is Global Platform (formerly known as Open Platform) was established under the oversight group Visa and then joined this and other known companies. The Global Platform restrictions based on specific cards and terminals are suitable for application development between oncard card applications and applications on the terminals (Chen 2004). OCF (Open Card Framework) Another is the Framework OCF (Open Card Framework) was developed primarily by IBM and is perhaps the only free tool (without payment 17 license), where one can develop an off-card application for computers connected to a smart card reader. (Chen 2004) PC / SC The PC / SC and is defined by the working PC / SC, which is an association large companies in the industry and industry of smart cards. Sets a general architecture for the use of smart cards in personal computer computer systems. In architecture, PC / SC, this aspect of the system is smart applications cards is the highest point of one or more service providers and the transmission sources. The service covers the functionality resulting from a particular smart card and make accessible via High-level programming interfaces. An administrator sources managed sources associated with smart cards with devices These dechontaikai charge may separately manage each smart card. The PC / SC and OCF have many common areas of application. When run on Windows platform the OCF can be accessed through devices accepted the installed PC / SC transmission sources. M.U.S.C.L.E. Yet there is also MUSCLE (Movement for the Use of Smart Cards in a ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 120 Linux Environment), which is a worthwhile project to create API suitable for applications, libraries of functions for readers cards with the ultimate aim to develop hardware compatible with the platform Linux. (M.U.S.C.L.E. project, 2007) 18 1.4 Communication with smart cards The protocol stack for communication between the smart card and PC / Terminal which hosts an application has several levels. The level at the top is the communication that exists between offcard implementation and on-card applications in the smart card. Commands and data exchanged meaningful only for the specific application. The next level is the Application Protocol Data Units (APDUs). The commands in this level have a specific structure and is independent applications, but the content and meaning is for each application specific. A level below we find protocols with names like T = 0 and T = 1. APDUs The APDU protocol used to exchange data between the application hosted on a computer or terminal and the smart card. The ISO 7816-4 provides 2 types of APDU: a) Are the commands sent from the application (off - card) to the smart card (on - card) and called Command APDU b) commands return the result of smart card (on - card) to the application (off-card), called Response APDU. Command APDU The structure of these commands is as follows: Figure 2. 9omi mandate CLA INS P1 P2 Lc Optional Data Le Header Body 19 CLA: defines the class structure. For example, states where the structure is compatible with the ISO or private use or use the method secure mail (secure messaging) INS: Specifies a specific command P1, P2: two parameters are used to move on command parameters. Lc: Length of the mandate in byte. Optional Data: Is the data of reference sent to the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 121 card. Le: is the length byte expected to return as an answer. If, for example, Le has the value 0x00, then the off-card application expects the card to return all the data available arising from the Command APDU. The CLA, INS, P1, P2 are the head of the order. The structure of the head is only and does not change. The Lc, optional data, Le define the body's mandate. The structure of the body's mandate may be different variations depending on the command that we want to form. (Hansmann et al. 2002), (Chen 2004) Response APDU The command structure is as follows: Figure 3. 9omi command response Optional data: Is the data returned SW1, SW2: containing status information about whether command sent itansosti or unsuccessful, said each time state mandate. If, for example, have a value of 0x9000 means that the command was successful. (Hansmann et al. 2002), (Chen 2004) Optional Data SW1 SW2 Body Trailer 20 T = 0 and T = 1 The protocols T = 0 and T = 1 are those with the greatest use and defined The ISO 7816-3. At T = 0 each character is transmitted separately, and at T = 1 transmitted block characters. Most modern card readers use one of these protocols to transmit information. From the response of the cards when they restart (ATR - Answer To Reset), the card readers can find what is the protocol that the card supports. The ATR is the first data set to return the card after being activated. Also in ATR can find information on the type of card. The ATR set by ISO 7816-3. T = 0 protocol is used by the first days appeared smart cards. The cards used in GSM applications this protocol in tons. It has advantages such as being simple and ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 122 effective in the management area of the card. To get data from card two commands are enough. The application (off-card) sends the command and card responds to the length of the answer. In the second application requesting the exact number of byte to be answered and the card sends the data. Respective area = 1 protocol can send and receive the same answer exchange. Boasting the level of implementation by the transmission level. Also suitable for secure data transmission between the card and application. 3omes TVL To encode the data into objects in smart cards in ASN.1 ( Abstract Syntax Notation One) BER TVLs are widespread. The description data in this way standardized in ISO 8824 and ISO 8825. Each are described as "TVL", or "Tag-Length-Value", a label recognizes object type, the length of content and data itself. 21 Figure 4. Example TVL structure. 2. Applications Identified as laptops, having the ability to store and process data with autonomy. It is known that Their size is the same as credit cards, this allowed to become widely accepted in the intended user. Smart cards find application in a variety of industries directly related to the technology. Banking and financial sector thus finds application in Secure credit card or deposit. It has many common properties with the magnetic cards, but because they are not losing the information after removal from an input device such ATMs have begun to replace the global market. It is also more resistant than magnetic and have the potential reuse by another client if the necessary steps, so reducing the cost of banks in hundreds of millions a year. With the development of electronic commerce worldwide and the insecurity are consumer markets for payment through Internet is not slow to present the first applications for e-payment by using smart cards. It's a move that finds an ally and banks and thus reduces operating costs in relation to credit to currently used (Chen 2004). But the idea extends beyond and in spite goal is for consumers to obtain a so-called electronic wallet a smart card. This means that all consumer purchasing power will ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 123 is a single card with the elements that would permit to be in possession of such personal data. For banks and business is an ideal solution to secure sales for 0x92 Airport 0x03 3 Bytes "XWY" Airport code for Wyoming Tag Length Value consumers a tool for better services. Fig 4. Example of using smart cards in banking system (Elliot and Loebbecke 1998). Another industry where there is widespread application is the industry's communication. From very early on started to use smart cards in is in the form of prepaid cards for telephone services, known as phonecards. The field of wireless communication is the best customer of Companies that manufacture smart cards and this is due to the fact that smart cards comply with safety technology GSM (global system for mobile communication). Each SIM card is every mobile phone should have the technology GSM. The SIM card identifying the user - owner and provide an encryption key to start digital transmission of voice. Other services offered to users is mobile banking, The mobile commerce, enabled access to the Internet and what This can provide. The security of user authentication and data moving is the most important advantages. 23 In the area of health insurance, smart cards that can help to reduce the complexity of managing information can a patient has, eg personal information, health records, information regarding the insurance, medication that has been followed for many years, etc. Be possible with all the information is incorporated into a single smart card with potential for renewal when krinontaianagkaies. These data could be shared between hospitals, doctors and pharmacies to approval of the cardholder and above all safety. For example, a tourists on holiday away from home, his is a allergy crisis if not treated quickly can lead to death it. A tourist holds a smart card that has all the medical instruments file or provide the opportunity to join the on call doctor in national health care with security and see where that information have even come in contact with his personal physician. The ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 124 opportunities are in this huge area. A typical example a health system using smart cards for hospitals in New York (Jaikumar 2005), where 100,000 smart cards were given to patients two major hospitals in New York to used in conjunction with the health system of Siemens. The aim is to patients have a history of health in portable data format and Doctors have a safer, faster and more reliable access to data them. Even health characteristic example of smart card is an effort that was implemented in the period 2000 - 2002 by public health system in Taiwan (Cohen 2003). The cost of implementation is not exceeded 115 million dollars and is targeted at 22 million people. It is one of the largest projects undertaken in this country and result was to dramatically reduce medical costs for patients and State's contribution to them. The need for consolidation of the system led Government in this solution, which was implemented by Sun Microsystems in cooperation with companies TECO (Electric & Machinery Co.) and top smart card maker Giesecke & Devrient. In this work Card technology used Java Card, Sun Enterprise Systems 10000, 4500, 3500, and 450 systems running the software Solaris. The cycle 24 life of cards in 5 years, while the cost of renewal does not exceed 4 dollars. The example of Taiwan and Germany followed in 2006 (Smart Card Alliance 2006) and Austria 2005 (Giesecke & Devrient 2007). In the transport sector in both private and public, there prospects for large profits for both companies and their passengers. In class public transportation tickets can be replaced by Prepaid cards such as happens in industry telecommunications with the known calling cards. This solution provides many advantages in the management of many small transactions in conjunction with safety movement. However, there are applications in closed environments, such as international and European organizations, groups of companies, universities and institutes. To case of academic institutions is extensive reference to the next section. The fact is that: "The smart card technology is gaining ground ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 125 acceptance, since it is in everyone's wallet »(Chen 2004). 3. Case studies of smart cards in University Institutions Both at European and global level are those few universities that have adopted smart card technology to cope with greater safety and economy in many students at their premises and make use of services have. About Marriott Corporation has set up pilot to Trinity College (Burlington, VT) and Queens College (Charlotte, NC) for the first time U.S. in 1988 a smart card system for the management of meals and physical access to these institutions (Robert Huber Associates, 2007). Since many educational institutions in the U.S. have used similar systems. The company developed products from companies around the world usually does not satisfy all needs and requirements of universities. Between two universities, there are the same people, applications that 25 developed should be proportionate to the overall level apaitiseonkai The new card system to integrate the proper functioning of the institution. The high cost of construction and configuration of such systems and the different standards that exist from country to country (Fridell T et al. 2007), led to the formation of ECCA (European Campus Card Association). The ECCA aims to help higher education institutions to make use of technologies derived from smart cards through knowledge sharing and development of European standards. This association represents more than 5000 institutions across Europe (ECCA European Campus Card Association, 2007) and its members have and Universities America and Canada. The universities that have implemented in their system ready of packages are numerous, but few of them are public nature since the purchase and maintenance are high. Most programs support the traditional functions of universities are as follows (Das P. and Rastogi L 2002): A unique identification of the cardholder. Access to electronic resources, computers and networks. Access to physical spaces (such as offices, laboratories, classrooms). ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 126 9iakinisi documents between students, secretaries and teachers. Access to online courses. Electronic wallet for everyday transactions (eg agorakafe, food, books, photocopies, etc.). ATM Services in internal bank institution. 9aneismos material from the university library. Health care. Feeding Students The environment, however, academic institutions can be classified as potential, so that their cards should be easy to maintain different applications. Most commercial programs use smart cards whose software has been developed by the companies themselves 26 (The most famous CardOs of Siemens). This is a safety valve for companies that only they can be deployed on any changes presented to services but also an obstacle for institutions to anexartopoiithoun. Generally there is guidance for developing such Card software that can support more than one application. Such are the JavaCard smart cards, which have the advantage to download the latest versions of applets which have an authorized server and to run where applicable. The case of the card system of the institution KUFPM (King Fahd University of Petroleum & Minerals) is noteworthy as it uses the same card contact (admission card in card reader or terminal) and contactless (Wireless) applications (Halawani, T.and Mohandes M 2003). The University KUFPM developed in collaboration with private company BELLID an implementation based on smart cards to manage the volume its students. The cards used are two chips on a card readers and one for wireless. The platform is oriented use cases that meet the very-applicability applications running in memory cards. The services covered are: the student card, access to library services, e-wallet transactions, physical access control, perilthapsi health, e-learning, access to computers and networks. All services are managed centrally from a server hosting a database file that gives access to other databases through the network of the university have to do with personal information of the cardholders. For each service offered by centralized system is the appropriate subsystem that supports it. So example, the card personalization system controls the physical access ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 127 card holders at places and laboratories of the University. The subsystem reported working with confirmation between a client and server, so to connect to the server and tools from there depending on the rights down in each owner being able to run other applications in other subsystems, such as personal information of students and finance each holder. The central management system is able to record the traces of procedures performed by 27 cardholders, so you may find the history of actions if necessary. Each subsystem according to the services offered are linked other equipment that gives the possibility to use potential applications arising from wireless technology, but and to have a better user satisfaction. Fig 5. The points system sales (POS) (Halawani, T.and Mohandes M, 2003) So for example the management subsystem is linked to payment point of sale terminals (POS - points of sale) to restaurants, library cafes, medical centers. The POS system accepts payments and processed through the university connect with the similar accounts of the cardholders. The University JKU (Johannes Kepler University) in Linz Austria began to build by 2002 a system of its own intelligent cards for teachers and students. Here it should be noted that the institution is Member of ECCA offers valuable assistance and expertise to other institutions of the union. The system as it has developed enables students to participate in online courses and exams absolute certainty about the quality of educational services. Also, through one card can operate almost all services that University JKU offer those who are not from other services and trade programs, smart cards can provide packet 28 them. The project development team chose to use the following Technologies: J2EE, J2SE, JMS, JNLP, EJB, JSP / Servlet Web Services, JCA Java Connector Architecture, JCO SAP-BAPI connector, JMX Management (Leitenmoller DI H 2007). The main reason for their choice was to be in the form of open software. Can the software be developed in light of the Sun Microsystems, but the available free. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 128 Fig 6.Eikoniki description of the smart card platform JKU (Leitenmoller DI H 2007). The developed system was geared to the needs of students and teachers. The workflow of the two groups is often interrelated. Students choose courses that teachers have the teachers consider the students and the results recorded in each tab of the student. 29 Fig 7. Lifecycle mathimatonsto JKU (Leitenmoller DI H 2007) This move (DAS OFFIZIELLE INFORMATIONSMEDIUM DER JOHANNES KEPLER UNIVERSITAT LINZ, Oktober, A usgabe 19, OKTOBER 2003) but had other purposes as was the need for better service students in their daily needs for micro-transactions, the effective management students and financial situation of the University. For financial transactions of the university students worked with local banks to be able to use them outside the area of the institution. Also there was the expectation that through the reorganization of the system will and the resulting increase in enrolled students of the University. In Greece, the benefits of smart card technology are still early stage. In 2002 the University of Crete in collaboration with other agencies public and private sector of whom were partners in the project sponsored by the Society of Information "on the" Smart cards, the findings of their research does not indicate an application to has achieved a place at university institutions (Task C3 Operational Programme "Information Society" 2002). There are however the same survey valuable references for systems that have developed in healthcare and banking. In 2007, the Aristotle University of Thessaloniki, which is the largest University of Greece in physical size and population, but students 30 announced it would implement on a pilot level platform for smart cards so for all staff and students (Roma 2007). The aim is to become the first Greek university, where all services will be available electronically to students and other staff. The effort is financed by the Operational Program "Society Information ". The digital functions that work ("Precursor e University ") has set to achieve are: Access to student requests for licenses or any kind of ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 129 Secretariats. Access to information necessary for their courses. Access to networks and computers. Access to material and non-electronic courses. Support for teachers regarding courses (quantitative and qualitative data) they teach. Control physical access The project size is large enough as the University has intended to extend the platform in all schools it has. It is estimated that the number of students is approximately 75,000 while the administrative staff of 2,500, is undoubtedly one of the largest projects gineise university level in Greece (9imolaidou 2007). It is worth mentioning that smaller units such as university Libraries meet short-applications smart cards, as in ECB (National Documentation Centre), but they found great acceptance. The next section presents some future scenarios using smart cards, some of these may meet for the first time in literature and this is because of the peculiarity of the case Greek academic community. 31 4. Future scenarios for use of smart cards universities 4.1 Student Vote The students vote to elect their representatives on academic base is always numerous and in some cases there complaints of fraud. It is likely that the European community there and other universities of different nationalities. . But is not provided by the programs are made so far for smart cards to provide support for such activities. About voting for national elections are applications but are quite expensive and aimed at states and have other extensions such as the identity card, passport, security health etc. 4.2 Assessment of teachers and courses In yparchontaemporika programs already known that there is a possibility to obtain access to online courses and services. . But between electronic services not provided by the evaluation users. Could create a service where the data evaluation will be stored on the card over time should give an appropriate feedback on changes made in the service of electronic

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 130 courses. 4.3 Delivery of printed and electronic educational materials At public universities nature books available from the State. Each book represents a student and the process is usually done by bookstores outside the university campus. The procedure for obtaining the book is time consuming for students, bookstores and expensive for the state. The creation of digital library that includes all educational writings of all schools where every student has the right to borrow or have on staff computer training material has previously discussed. The main problem is the security with 32 will they handle the volume of e-learning materials. The smart card technology could contribute substantially to this problem laying the foundations of security. 33 2nd Chapter 2. Case Study 2.1 The problem A University wants to reduce its operating costs to certain services provided to students so as to be upgrading of quality (to be and compete with other Universities in Europe) and the safety of the services requested an adviser to describe the current situation and problems. Also asked the consultant to do the analysis and design of a new CP addressing the problems diagnosed and implementation an application that supports the CP. The University is at the wider public sector and apply following when developing CP: • can be developed either internally or by tender so the development The company is chosen (called the contractor) under a fixed price contract signed by the parties • monitor the work of a (usually 5 member) Committee on Monitoring Project (EIA), which consists of senior civil servants. This makes meetings with the contractor (eg the project manager) to verify the course work • The EIA also review project deliverables and the acceptance or not • it is common for contractor to perform all phases ASPS subsequently the body to prescribe what will be implemented and then to implement - is important to stress that first signed the contract defines the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 131 total (fixed) cost of the project and then starts the ASPS and of course Implementation of • general users of the systems (ie civil servants) are not very associated with new technologies and what they can offer - they know But very good job that sometimes is complex (due legislation etc.) 34 • General public servants working in their offices and are therefore not available for numerous meetings with the contractor • Civil servants are usually not asked for systems that implemented - are designed centrally, and their use is mandatory 2.2 Overview of services and problems of university Services: At the University work for each section and the relevant literature. The graduate programs and specialized programs that have developed their own secretariats. There is also a library university that provides students at the institution but also external users. Even the institution has a club and food for students and staff. The services offered to students and staff are: Student enrollment in courses, departments, transcript , Certificates of all kinds, books, applications, scholarships, health insurance, handling documents Feeding Access to electronic resources and areas with computers, laboratories, offices. Library, lending evidence Postgraduate courses Parking 0iadikasia: To fulfill their requests and to receive services, students Go to the secretariats only in specific hours is the public and waiting in line to serve. Often there is an phenomenon becoming handling the demands of students' associations students affiliated to any political party. Students at the 35 institutions have access to every floor, offices, laboratories and rooms This has not become a control. Problems: The problems found in nearly every service. In coursework, there are often people in laboratories have no relation to the course. The secretariats of the departments observe ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 132 enough delay in serving the students and the workload of Officials there and the number of students who wish to serve. In the library there are problems on the interlibrary loan material external users. Communication problems when students are foreign nationals. Thefts of parts from labs. Feeding unchecked on turnout of people (students - staff). Each service has its own program for which the institution pays large sums to license and maintenance. Past: In the past, had been trying to implement a system magnetic cards that concerned only the staff of the institution (time employment, access to natural spaces, parking), but in a short period time the practice was abandoned. The main reasons were non-Training staff and lack of maintenance. 36 3rd Chapter 3. Programming 3.1 Choice of Methodology Development CP For the selection of appropriate development methodology of the CP should take into account the conditions mentioned in the relevant section above. A key factor is the lack of knowledge about the new smart card technology Is a factor of great importance and significance of the one more definitive criteria for selecting development methodology. Hence development methodology of selecting the SP model of cataract (waterfall). In generally respond better and more reliable to final information system that will arise in connection with other methodologies referred to in the literature. This methodology divides the development of the computer system to milestones, which will serve all signatory sides. The lack of previous experience and infrastructure in technology smart card requires some way to implement the information system based on the model of cataract. System requirements and the intersections of users (managers or otherwise) will be designed analyzed from the outset because it is difficult to obtain new demands a user and the institution (for lack of knowledge on applications the subject). The CP will be implemented under strict specifications has to avoid omissions claims against its development. Still strict framework will help towards maintaining the budget will occur at the planning stage (Planning). A ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 133 the drawbacks of this model is the high time of delivery but This case might be an advantage and experience and technognosiapou be acquired by people participating in life cycle of the CP will be more mature than other methodologies could be selected. 37 Figure: 5: Waterfall Model (Dennis A et al 2005) Planning Analysis Design Implementation System Request System 3.2 Project: Implementation of smart card technology by students and staff. Sponsor Project 9iefthyntis University Library Business Need: The project will begin to be better serve students and staff in their daily work. Also quality education from the perspective of service expected significantly improved. Business Requirements: Using smart cards will be able to make a series of actions both at the institution and outside it. 9inetai the opportunity to identify the user and what rights to use any service that the institution wishes to provide. The functionality of the system can be described below: Coordination of services within the institution Access to electronic resources (e-learning) and networks. Access to physical spaces (such as offices, laboratories, classrooms). Evaluation of courses and teachers. Electronic wallet for everyday transactions (eg purchase of coffee food, books, photocopying, tickets, etc.). ATM Services in internal bank institution. 9aneismos material from the university library. All secretarial services to students. Business Value: The use of smart cards are expected to come working hours of employees who work in serving students (Secretariat). By improving the quality of services is expected to become serve the students in the shortest period of time with less omissions and mistakes, so there will be shorter lines - less Overcrowding in the secretariats as will now be able service over 24 hours. The replacement of student ID from a smart card ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 134 39 expected to deliver economic benefit of 70%, as there reusability for at least 5 years. There will also be reducing licensing programs used to privacy. Special issues or constraints: Unknown on the smart card technology to end users (Students), any fear of its use. Identification of the institution in the University community implementation of the project. The adoption by the Rector is necessary. Any reaction from trade unionists and political parties to tistechnologias application. The Library wants such work and has a range of services significantly improved by the application of smart technology cards. For example, it can provide access to electronic sources to external users (ie not students and members 9EP). 3.3 The analysis of feasibility of the project Highlights of the feasibility analysis are: Technical factors: It is possible to apply the technology of smart cards, although There are some risks. The risk of work on familiarity with smart card applications high. The staff of the institution has over the development experience applications using smart cards and related applications. 40 There are hundreds of European institutions to use technology smart cards for the benefit of staff and students. The applications interact with smart cards do not differ largely to those used for everyday tasks both officials and students. The risk of work on familiarity with technology is moderate. The administrative staff of the foundation had done in the past, a short time, magnetic cards to enter the natural areas. There is such a use proigoumeniempeiria quite similar technology in relation to that will be developed in the project. is available academic staff with knowledge on the subject technologies to be used and may have advisory. There are commercial tools for developing applications for both ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 135 Smart Card and applications that interact with them. These tools usually supported by the manufacturing companies in the cards which makes them more reliable. The size of the project can be regarded as a moderate risk. The period of completion of the project is estimated to be not more than 3 semesters as chronic enough to normalize all possible difficulties that may arise. The project development team will be relatively small in the range of 5 people. But it is technically and professionally trained in smart card technologies. The size of the project is modest in size compared with other existing SP exist within the institution, such as the SP of IT. 41 The compatibility of the project with the existing technology can be considered quite good. The SP is new and there is a need to connect to other SP are at the foundation. There is an increased likelihood of use the same technology, among other applications, the SP application CP could be developed and has not incurred any particular problems compatibility at the application level. The SP's computer is already providing an excellent organization data will be needed for applications in smart cards. The existing technological equipment is in good condition and not needs to be some sort of upgrade to be installed special card readers. The technology applications for smart cards using open standard. Financial: The following conservative economic approach of the project shows how the institution can invest in development without taking high risks. The development cost is estimated at moderate levels, is around 80.000 - 100,000 euros with a higher amount due to a stock market (Hardware). It also requires a small number of specially trained staff to develop the project because of the nature of technology to be used. The staff will use the smart cards will be ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 136 trained as to reduce any technological fears that may occur. End users can be trained by the academic or technical staff, including the use of applications expected to be familiar. 42 Reduce man for secretarial work, and those staff employed to serve their users various services. server market of 20,000 Euros to host the application SP, purchase of special devices (smart card reader) and cards will support the SP. The readers and cards during lives of more than 5 and 7 years respectively. The implementation of technology Applications for cards are relatively modest drop. 9en there big difference in the technological equipment was in use before 3-4 years than today. These facts lead us to conclude that the institution will in the longer term benefits and risks of the original investment decreases. Licenses programs related software. But the goal is to used programs in the category of open code to reduce annual operating costs. Recently established strong community support of free software in application area for smart cards. Intangible costs and benefits: Satisfaction of students and staff to upgrade Quality of service 9ynatotita transfer of knowledge gained in other universities and national institutions anagnorisitou level. Organizational: The project has a low risk of organizational policy. The aim of the system is exist within the institution safe and quality services to all, which is achieved through the use of smart cards. Support from 9iefthynti of the Library. 43 Support from 9iefthynti of Computerization and services 9iktyou. Supporting the group of employees in administrative positions. Reduce our service levels by interested student. The system users wishing to use the benefits ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 137 resulting from implementation of the project. 9inetai possible maximize the quality and safety upgrades to students. Other: The Library seeks to implement the project, the results will provide the essential services to attract students and expertise, which can be exploited in other ways. We need to recruit trained personnel for the new system incurred. 3.4 0iacheirisi Project Being "9iacheirisis project" through the methodology literature (Dennis A et al 2005) suggests assessing the required time, size of project and human effort should be made that the CP to become reality. In this process should take into account and potential risks that an implementation may entail. Within possible solutions will be proposed that the risks are not hamper the implementation. 3.4.1. Assessment project. To estimate the size of the project will use the approach operational points (Function Point Approach (Dennis A et al 2005)). Based 44 This first estimate the size of the project in number of lines of code required to implement the project. The estimated size then based type becomes a figure that reflects that anthropoprospatheia required. Finally, the estimated anthropoprospatheia converted into a time layout where I captured during a month. Rating scale Input: 1 screen to search - information (set of 2 - languages) 1 screen presentation - receiving documents, 1 screen for electronic communication, 1 screen background monitoring of all services operations made by the user based on the search, 1 screen for user registration the department wants depending on what rights have the card, 1 screen explanation of all rights and obligations 1 screen financial services, 1 screen for editing user information officer, 1-screen presentation online user. Total: 9 * 2 = 18 Output: 1-screen results from the prospecting information (total 2), 1 screen for development of applications monitoring, 1 screen projection data of the cardholder, 1 screen statistics ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 138 use 1 screen display errors and instructions for their solution Total: 5 * 2 = 10 Query: Search among student services, search application, document, certificate, proof of payment, search employees and hours worked, search for persons who have physical access to sites, general search information, renewal prices of goods and services supplied, search use errors and degree of risk, replacement account information users from other systems. Total: 11 Files: 1 for students by recording, 1 for search - editing, 1 Statistics 1 for "intercom" between services, 1 for languages 45 1 for information officers, 1 for financial transactions, monitoring 1 actions. Total: 8 Program Interfaces: the library services with other insurance services, with a bank, and system administration. Total: 4 Function Point Estimation Worksheet System Components: Complexity Description Total Number Low Medium High Total Inputs _18_ 9 x 3 5 x 4 4 x 6 _ 71 Outputs _10_ 4 x 4 4 x 5 2 x 7 _ 50 Queries _11_ 2 x 3 6 x 4 3 x 6 _ 48 Files _8_ 2 x 7 4 x 10 2 x 15 _ 84 Program Interfaces _4_ 0 x 5 2 x 7 2 x 10 _ 34 Total Unadjusted Function Points (TUFP): _287 Overall System: Data communications _3 Heavy use configuration _2 Transaction rate _2 End-user efficiency _1 Complex processing _2 Installation ease _2 Multiple sites _1 Performance _1 Distributed functions _2 On-line data entry _1 On-line update _1 Reusability _1 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 139 Operational ease _1 Extensibility _2 Total Processing Complexity (PC): 22 (0 = no effect on processing complexity; 3 = great effect on processing complexity) The project is considered a complex system due to the nature of the technology to used when judging the degree of complexity as is prudent to APC = 1.35 Adjusted Processing Complexity (APC): 1.35 + (0.01 * 22) = 1.57 Total Adjusted Function Points (TAFP): _1, 57 (APC) x 287 (TUFP) = 450,59 (TAFP) The development application is expected to be in Java with 80% HTML 20% 0,80 * TAFP * 55 + 0.20 * TAFP * 15 = 19825,96 + 1351,77 = 21177,73 Anthropoprospatheia: 1.4 * 21.17773 = 29.648822 Person Time = 3.0 * 29.648822 1 / 3 = 9.18 around (9 months and 7 days) Time representation As part of this stage was using modern tools such as Visio, when graphic designers across the entire length of the project with all works to be implemented, thus having a more clear and concrete picture of the CP. ? Iagramma Gant Gant chart obtained is: 47 Fig 8. Gant 9iagramma the CP. 48 3.4.2 0iacheirisi potential risks (Risk Assessment) Risk # 1: There is a danger that as the Greek language is not supported by cards when stored data. Likelihood of risk: The probability of occurrence is medium level, because the cards store the data in the form of byte. Since the ASCII characters supported by ASCII, can be stored in the form of byte, the problem is focused mainly on language to communicate with the card if you can do the conversion properly and show good results eg in a browser. Potential impact on the project: The result will be the project, is a) delay in the flow development and redesign of the communication model ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 140 other systems where this is necessary Ways to address this risk: A workaround is to write data we want to apothikefontaistin card is in roman characters. . But this is because they will be supported by appropriate training and choice of characters will be right in line with the 5-member Committee. Risk # 2: Do not be a proper choice of material hardware. Incompatibility between card readers and smart cards, due to different protocols. Also at risk would include the case of incompatibility material as the framework to be chosen to link the application with the hardware. Likelihood of risk: The probability of occurrence is medium level. Potential impact on the project: The result of such an event would be cause confusion for analysts of CP and to those who will 49 to implement. One of the most likely outcome is a long delay and increase the budget of the work. Ways to address this risk: how to deal with such a risk is to select and identify the outset of the protocol on which to develop the platform (eg GlobalPlatform 2.0.1 or 2.1.1) and not on the road implementation, as the best solution is to choose an open standard. Also at this point would be to select the appropriate framework under which will develop the application (eg, OCF - Open Card Framework, Java API for Cards) but which is compatible with the protocol. Also on this basis that should be determined and the choice of material is strictly based on them. Risk # 3: Non-acceptance of the system of student political factions. Likelihood of risk: The probability of occurrence is medium-level Potential impact on the project: The result of such an event would be no mass effect students who will condemn the system to abandoned or limited use. The reasons could be induce such operations are normally due to the perception that the system Smart cards may be called by many the "electronic keep files ". Ways to address this risk: Before the system would be quite useful to present and promote the general student public, present the advantages of and the radical changes everyday users of the institution This stage is the final phase of planning and thus say that we have "health" foundation for the SP want to design. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 141 50 4th Chapter 4. Analysis In the analysis phase to understand who will use the system, what make the system in its final form and fee, when and who will used. During this phase, analyzed and presented functional models, such as chart of activities and situations use structural models such as graph classes and models behavior. The opening phase of analysis done with the stage of "Requirements Analysis" where are we aware of all the methods used the knowledge elicitation and problems from users with the ultimate aim of their integration into the new SP in the form of requirements, which can divided into functional and non functional (Dennis A et al 2005). At this stage determined the degree of change is the introduction of a such Information System in the workflow of the institution whole. Based on the literature (Dennis A et al 2005) and phase programming is proposed as the best technical requirements analysis The BPI (Business Process Improvement). Based on this main activities is the duration of the analysis, the cost of each operation and Information about other similar applications developed by other institutions. The period of analysis (Duration Analysis) is important as it requires detailed examination of energy and time each activity takes place in the system as it is now, ie AS - IS system. A thorough analysis all the individual steps that a process has no comparison this time with the time needed to oloklirotheii energy. From This comparison shows, for example, the size of the fragmented years between steps and propose ways to reduce the total time implementation process. Most of the processes carried out within the institution usually involved more than 2 people. For example, when a student wants to take a certification course should go to Secretariat to complete the document, to provide the responsible The Secretary to certify that the student is submitting this document 51 and then the document must be presented to the \ head not \ for the Signed to for this work the estimated time is about 10 minutes, without including the waiting time if there are other people to serve. The system, developed by the time the same result is calculated to be less than 2 minutes and clearly pleased ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 142 users greater. There are certainly more complex operations where there will techniques used to integrate operations or any other work take place alongside other to reduce the total time time required. The cost of main power (Activity - Based Costing) is a great source knowledge. The attention focuses mainly on basic steps and procedures have higher costs and are attempts to improve. Yet information for other applications (Informal Benchmarking) can solve issues such as lack of knowledge and action planning problems. If anyone knows what kind of applications made by others can be better organize their work formed a daily basis in institution under the new Information System for smart cards. This knowledge helps to introduce new ideas to the analysis of CP. Because the size of the CP to be developed that judge is a medium-sized but of great importance in upgrading the quality of services institution, both to the student community but also employees, therefore it is necessary to define the business needs the analyzer. To this end become used mainly 5 methodologies These are: analysis of documents, interviews, observation, questionnaires and Meetings type JAD (Joint Application Development) (Dennis A et al 2005). 4.1 Requirements Analysis Methods 1. Analysis of documents - to determine what the requirements of existing system and that even those with paper-have imprinted. To facilitate their study is good to have a 52 schetikikatigoriopoiisi in the course request. Application forms (Supplemented, empty), legislation, legislative framework, business procedures that is registered, official documents and forms certificates and copies of certificates issued. 2. Interviews to establish the personal problems the existing system and requirements for new officers by administration familiar with the procedures. At the beginning of the project sponsor the project and then with senior executives who have Management background in particular institution (ie people who are knowledgeable procedures and relevant legislation), for this reason and because ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 143 people are expected to be busy is to have good electronic equipment to be carried out on-line interviews. Apart from these strains would be wise to have interviews with representatives (whether union or heads of specialist departments) officials because they are being handled primarily flows processes in the system will be implemented. Also good to have interviews with the representatives of the students why they implemented the system and are the main users and beneficiaries of the system. In phase They should be highlighted and the benefits arising from the use of smart cards in order to avoid possible reactions of these user groups. 3. Note - Leave the project sponsor for access to natural space officials - offices, the reason is to look closely all stages of the process and value with our technology platform that could automate the whole process. This observation could be used in conjunction with interview in order to complete registration procedures without gaps or questions from the side panel design. 4. Questionnaires - Properly configured, the questions will be elicit from the ordinary user of the system (public servant 53 student) what he would like to have the system, questions are tailor that would limit not to mention a "fantastic" technologies. Also be questionnaires whose results will give a better picture of the existing system and problems suffering, failures at user level, employees and aliens. The questionnaires are expected to contribute significantly to direction to meet the level of knowledge of users, so Later in the implementation of the system varied environments that will help the user to perform work properly it. 5. JAD - As the description of the problem indicates that there time for several meetings, we could avoid the process it. But if you resort to this option will miss the important advantages this methodology offers. The advantages of this method is the most useful method for gathering information by users over the others, as stated in literature (Dennis A et al 2005). It is also likely to reduce errors requirements gathered by other methods, as executives from different departments and sections to meet special landscaped area and discuss on the same basis as the IT manager ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 144 meetings such JAD. With modern technology is given in cases where there enough time for the meetings can be held 'E' sessions JAD, with specially designed software and staff. Again, according to studies (Dennis A et al 2005) has found that the average meeting time is reduced 50 to 80 percent cent with e-JAD. For the smooth operation of meetings and so to achieve maximum efficiency of these teams will need the executives will be invited not to exceed 6 people. Our team of analysts should therefore be equipped with all necessary technological resources within the area of the institution and for this purpose needs approval from the Dean. The top teams will should be modeled on the work of the new CP will serve, 54 So it is good to involve professionals with excellent knowledge on the subject all steps of a task can have. In this way can be made more details about work and very likely to occur and errors that occur between the different levels should be noted here that every member of group has equal time to answer questions from the person responsible for the session. Also appropriate at the end of each week and after have completed various other sessions and there is a session only senior on the high-level work that there take decisions and measures by most experts. For This is why people team for this session must belong Rector of the Board and be aware of both technical as and legal issues. It is also wise to review team is and Director of the Library, who ypostirizeito project. Then the group analysis of the project proceeds in distinguishing effects of the new CP will serve a functional and non functional. The This separation is necessary in order to determine the characteristics of the system and what must be satisfied. Functional 1. 9iglossi information to students via the website foundation for the services the smart cards can offer and how you can use. They must also there is the possibility of answering questions on-line from staff. 2. 9imiourgia / compliance / student searching a computer file. 3. Checking errors in the application. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 145 4. 9imiourgia reporting statistics. 55 5. In exchange data with existing CP and the CP other agencies and services within and outside the institution involved in this work. 6. 9imiourgia reports about the use and the errors performed both by users and of itself system. 7. Download smart card money through special surroundings, in which the other Information systems. 8. Daily updates of the financial transactions of the card students and staff in conjunction with the CP of the bank. 9. Initializing prosopikondedomenon students from special service University and storing them in the smart card. 10. Sending messages (SMS, email) to users on services. 11. Select a specific environment for visually impaired users 12. Store non-personal data of users on a data. 13. The system will serve users will be able card to download new versions as they will applet issued by the competent department of the institution. Users are not have the same right to take any action upload applet in the card. Non-operating Business: Access to the system via the Internet through Info - Kiosk with touch screen screens (more friendly for those who do not know the PC). Compatible with all popular browsers. Requirements for cooperation with other information systems with which it communicates. 56 Performance: Response of the system when information is requested in 1-2 sec, the same levels of speed and access. When searching for any call time not exceeding 15 seconds to issue a new card must not exceed 3 days. The database will be updated in real time. Security: The system could serve the need for access control students and workers in physical or logical resources. The cardholder will ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 146 only the right, always based on the characteristics which are set to access to bibliographic sources, networks and computers. Yet there is need for controlled access to services and procedures for all levels of CP involved on. The safety but not be limited Only the data card can be saved, but a better and more efficient solution is proposed that the combination of databases in conjunction the data is in memory of the smart card. If identify changes to the data card is then you should accordingly notified the competent authorities and the user. Culture & Policy: The card will be given free for the first time students and employees. If this is lost there will be relatively fine for the reissue. Also fine will be imposed and if found "invasion" on the card by the user. 9ynatotita Association card to bank accounts below limits set by the user. Provide conversion program swap users from outside the European Union. The system will should be written in technologies that only Sun offers. Also should The system supports the ISO 7816 for smart cards. Then expressed relative to figure analysis of work System (AS - IS) as it is in its present form. 57 4.2 _iagramma _rastiriotiton The modeling of the AS-IS system helps us to significantly and optical now distinguish the procedures exist but also to recognize possible changes the system needs. The procedures that have emerged are: Students coming to the institution and there are two cases a) knows 9en to go so close to people from various political parties or seek information from the intelligence department of the institution, b) knows that contacted and directed that way. If there are people willing to help the student, help fill the requests and the accompanying literature. In the Secretariat, the student submits his application for the granting of student identity. To be considered the record of completed application and required medical examinations if the student has given him the time the application is completed and enters a phase of treatment by competent workers to secretaries. A worker checks the registry file of the application and if all Full details are sending the application to the Head of Service for ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 147 signature. If the information is incomplete, the student shall be informed by telephone. If request the student has shown that counterfeit items then informed the department of the Rector. The Director signed the applications and return them to the workers. Also at times want to send statistics and reports on applications to the Rector. If the process the Secretariat completed successfully then given to student studying the book and informed by the responsible official for actions must be done to remove the student of identity. The student is required within 5 days to come to Care Foundation. It is a service charge on a pass and providing health insurance to students. The folding of the student in conjunction to book a course the student identity of each student. The 58 Head of Service wants to send monthly reports to the Rector to undertake the appropriate funds for students. When the student leaves the responsibility may optionally appear in Library to present the book to study and make an application for a card. Identity that the student has access to all logical and physical source institution, only it may be served by the Secretariat and also when they go in the area of food has to be with him if requested. Below is a chart of activities for existing business processes. 59 Figure 9: 9iagramma activities, Part A. It should also be dealt with here and if the student has already student ID. The actions may make the student as reported on and above are: 1. You may request any certificate or certificate of Secretariat. 60 2. May be served by the staff of the library and use its services. So therefore clear and additional activity in graph which deliberately did not mention above that area. We Figure 10: 9iagramma activities, part B. Below the diagram of use cases, which we presents a picture of the future system and uses this ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 148 have. 61 4.3 Use Case _iagramma Below the diagram use cases Fig 11. 9iagramma cases of use of CP 62 4.3.1 Description of use cases Use Case Name: Authentication ID: 1 Importance Level: High Primary Actor: Student, Computer Science CP Use Case Type: Detail, essential Stakeholders and Interests: Students - want to take action provided to the cardholder MS Computer Science - wants to manage cardholder accounts Registry - wants to perform operations on the object tab student Library - wants to provide electronic and bibliographic material to students and staff Brief Description: This use case describes the introduction of students and staff of different service system using a password. Trigger: Request to the system Type: External Relationships: Association: Student, Secretary, Library, MS Computer Science Include: Purchase of goods and services, elected representatives, Monitor tab, 9iacheirisi tab student to provide evidence, 9iacheirisi accounts, access to sources Extend: Generalization: Normal Flow of Events: 1. The user may insert the card into a special reader and typing the code. If the code is running properly subflow1 If the code is wrong running subflow2 2. Logging in 3. Select and display interface according to the code. SubFlows: S-1: The password is incorrect Recorded in the system user who entered the system and how computer. S-2: The code is wrong Sought re-enter password ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 149 Alternate / Exceptional Flows: S-2, 1a. and in case of failure of third suspension of the account of that user and informing the SP of IT. 1b. Application to the department to provide a new password. 63 Use Case Name: Purchase of goods and services ID: 2 Importance Level: High Primary Actor: Student Use Case Type: Detail, essential Stakeholders and Interests: Students - want to use the card to purchase goods and services call money CP Bank - wants to be informed about the transactions of the cardholder Registry - wants to be informed about transactions involving fees SP 9ioikisis - wants to give informed as to the transactions and rights access Library - wants to be informed about transactions involving services Brief Description: This use case describes the process by which the student buys products and services within the institution. Trigger: purchase request Type: External Relationships: Association: Student Include: Introduction to the system 9iacheirisi financial claims Extend: Provide Documents Generalization: Normal Flow of Events: 1. Introduces a special card reader 2. Running the use case «Authentication» 3. Select the tab of financial services. 4. See references notices on its debts. 5. Search products and services. 6. Performs product or service they desire. If the execution of purchase mistake running subflow1 7. The SP informed the bank to open If the transaction is valid running subflow 2 8. Disconnect from the system 9. Get Card
SubFlows:

S-1: If the performance market is wrong You receive a message warning the student ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 150 S-2: If the transaction is correct Stored on the card the student the necessary information. Alternate / Exceptional Flows: 6a. If it is invalid transaction it becomes an automatic logoff and sending error SP Computerization 64 Use Case Name: Election of representatives ID: 3 Importance Level: Medium Primary Actor: Student Use Case Type: Detail, essential Stakeholders and Interests: Students - want to vote for representatives Brief Description: This use case describes the process required to vote in the student Trigger: Vote representatives Type: External Relationships: Association: Student Include: Introduction to System Extend: Generalization: Normal Flow of Events: 1. Introduces a special card reader 2. Running the use case «Authentication» 3. Selects the service record If the approval process is not successful running subflow 1 4. View all candidates 5. Selection of candidates 6. Receipt print on these selected 7. Validation options 8. Storage options in the system If the store is successful running subflow 2 If storage is not successful running subflow 1 9. Select Output SubFlows: S-1: If the adoption is unsuccessful Warn me about. Registration error SP Computerization. S-2: If the store is successful The registration number of students coming from the candidate list of voters. Alternate / Exceptional Flows: S-1: 1a The repeated failure to adopt the service record leads to lockdown ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 151 card and all services that the owner has. 65 Use Case Name: Monitor Tab ID: 4 Importance Level: Medium Primary Actor: Student Use Case Type: Detail, essential Stakeholders and Interests: Students - want to see the scores of courses and to request further information Brief Description: This use case describes the actions the student to see the personal tab to be informed about the scores and make applications. Trigger: The student enters the code to perform actions relating to personal the tab. Type: External Relationships: Association: Student Include: Introduction to System Extend: Generalization: Normal Flow of Events: 1. Students visiting the website of the Foundation 2. Introduces a special card reader 3. Running the use case «Authentication» 4. View related environment 5. Select View tab student 6. Transaction monitoring If a transaction is complete running subflow 1 7. Sending a request to the Secretariat 8. Receive requests from the Secretariat. 9. Logoff SubFlows: S-1: If the transaction is complete Verification check with the credit card Alternate / Exceptional Flows: S-1: 1a. If the test is negative alerted the CP Computerization 66 Use Case Name: 9iacheirisi tab student ID: 5 Importance Level: High Primary Actor: Registry Use Case Type: Detail, essential Stakeholders and Interests: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 152 Registry - wants to handle applications and introduce new rankings, prepares statistics Students - want to provide information about the grades and course applications to the Secretariat CP Bank - wants to keep for transactions involving the student Brief Description: This use case describes the process by which officials of the Secretariat process student data tab Trigger: The Secretariat wishes to draw the student tab Type: External Relationships: Association: Secretary Include: Introduction to System Extend: Generalization: Normal Flow of Events: 1. The Secretariat performs the use case «Authentication» 2. Student Search - Find 3. Select the tab on the student management 4. Change data, information If the changes are correct running subflow 1 If the changes are wrong running subflow 2 5. Signature of documents by the Director If the documents prove false run subflow 3 6. Issue of certificates, licenses 7. Student Information 8. Preparing statistical report 9. Logoff SubFlows: S-1: If the changes are correct Logging of the Secretariat of the system S -2: If the change is wrong Warning staff, provision of relevant directives S-3: If the documents are considered false, Then inform the police department. Alternate / Exceptional Flows: S-2 1a If the changes are wrong due to incorrect configuration of the tab student then forwarded to SP Computerization 67 Use Case Name: Provide Documents ID: 6 Importance Level: Medium Primary Actor: Library Use Case Type: Detail, essential Stakeholders and Interests: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 153 Library - wants to provide library services to students Student - use library services, access to resources depending on the Rights CP Bank - information about student financial transactions with the library Brief Description: This use case describes the process by which the library provides items to students. Trigger: The student wants to find and borrow bibliographic Library. Type: External Relationships: Association: Library Include: Authentication, Access to sources Extend: Purchase of goods & services Generalization: Normal Flow of Events: 1. Introduces a special card reader 2. The student performs the use case «Authentication» 3. Select the tab for literature search 4. Access rights depending on the use of the card 5. Search - Search If the books are finding success running subflow 1 If the book is unsuccessful finding out the subflow 2 6. Puts the books on a special automatic lending machine If the machine does not work run the subflow 3 7. Were tested and displays the list of borrowed books If no prior financial burden running subflow 4 8. The student confirms the decision of the machine 9. View list of books borrowed by a student 10. Demagnetize the books from the machine. 11. The student chooses to leave the system 12. Take the card and leaves. SubFlows: S-1: If your search is successful The student is in the library books they want to borrow. S-2: If a successful search The student goes to stream 11. S-3: If we do not operate the auto loan The student is addressed to an official of the library Run the flow 7. S-4: If no prior financial burden Asked the student to pay the fine and issued Alternate / Exceptional Flows: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 154 S-3: 1a The student pays the amount from the card after confirmation 2B, the student if there is money in the account of the then canceled costs 68 Use Case Name: 9iacheirisi financial requests ID: 7 Importance Level: High Primary Actor: CP Bank Use Case Type: Detail, essential Stakeholders and Interests: Students - want to have an electronic wallet for all departments within the institution Registry - charge account where the student fees CP Bank - updated for any size financial transactions of the student Brief Description: This use case describes the process by which the bank accepts CP information on financial transactions Trigger: Each half-hour SP Bank is informed of the movements of the system Foundation Type: External Relationships: Association: CP Bank, Student Include: Purchase of goods & services Extend: 9iacheirisi accounts Generalization: Normal Flow of Events: 1. The SP receives notice of the bank to inform trading 2. The official bank codes entered into the system of bank If the codes are correct running subflow1 If the codes are wrong running subflow2 3. Logging in the Bank 4. Start automatic updates alert on similar accounts users If an entry error caused running subflow3 5. Shipping movements in the user email account if they exceed an amount defined by the system 6. Output from the system staff SubFlows S-1: The codes are correct Recorded in the system user who entered the system. S-2: The code is wrong ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 155 Sought re-enter the codes S-3: Incorrect update Update service from which the requested change of account The bill goes to state supervision by the banking system Alternate / Exceptional Flows: S-2, 1a. and in case of failure of third suspension of the account of the user. S-3, 1a If the system fails to meet bank, informed the SP Computerization 69 Use Case Name: 9iacheirisi accounts ID: 8 Importance Level: High Primary Actor: Computerization CP Use Case Type: Detail, essential Stakeholders and Interests: Student - make correct documents for entry or modification of elements of Registry - Check documents for the educational purposes of the student Library - information about changes to services has SP Bank - Check best supporting economic SP Computer - manage all accounts and is responsible for monitoring these Brief Description: This use case describes the process by which management is accounts of both new and existing, if documents are correct. Trigger: The MS Computer Science student record data Type: External Relationships: Association: SP Computer Include: Introduction to System Extend: CP Bank, SP 9ioikisi Generalization: Normal Flow of Events: 1. Students arrive at the offices of the Computerization of the necessary supporting If the documents are incomplete running subflow 1 2. Part of the documents are sent to SP 9ioikisi Control If the check is negative running subflow 2 3. An official SP Computer running use case «Introduction to System" 4. 9imiourgeitai tab of the student If during the recording found an existing account is running a subflow 3 5. Insert the necessary data 6. Card issued by the student ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 156 7. Warn the student SubFlows: S-1: If the documents are incomplete The request goes into standby mode S-2: If the check is negative The request is canceled and advised the student S-3: If the student account is already The request is canceled and advised the student Alternate / Exceptional Flows: 1a. Students submit documents through the website of the institution. S-3: 1a. If the student is notified in the same one that had the bill before it canceled the first item (and card) and return the flow 4. 2a. If it is then sent notice to SP 9ioikisis the account goes into idle. 70 Use Case Name: Set user rights ID: 9 Importance Level: Medium Primary Actor: SP 9ioikisis Use Case Type: Detail, essential Stakeholders and Interests: SP 9ioikisis - wants to decide on the rights of use according to the documents there are MS Computer Science - wants to be informed about the changes Brief Description: This use case describes the actions which change the basis of the rights to use the cards. Trigger: Decision-making for information rights Type: External Relationships: Association: SP 9ioikisis Include: Extend: MS Computer Science Generalization: Normal Flow of Events: 1. An official SP 9ioikitikou running use case «Authentication. 2. Student Search - Find 3. Processing request If the request is checking of documents running subflow 1 If the request is cancel the card running subflow 2 4. Configuration using 5. 9inetai information on CP Computerization 6. Logoff ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 157 SubFlows: S-1: If the test is positive SP informed Computerization S-2: If the request is canceled card The official checks for financial outstanding student in the institution Alternate / Exceptional Flows: 71 Use Case Name: Access to sources ID: 10 Importance Level: Medium Primary Actor: Student Use Case Type: Detail, essential Stakeholders and Interests: Students - want to make entry into natural areas or networks. Library - wants to know the status of a student to give similar access to bibliographical sources. SP 9ioikisis - wants to regulate use rights according to student status Brief Description: This use case describes the process by which the student is physically or reasonable access to places and networks within the institution. Trigger: The student wants to enter a physical or logical area Type: External Relationships: Association: Student Include: Authentication, provide evidence Extend: Generalization: Access to countryside, access to networks Normal Flow of Events: 1. Introduces a special card reader 2. The student performs the use case «Authentication» If the result is negative Authentication run subflow1 3. Take the student permission to use a logical or physical access If the license is reasonably accessible to perform the subflow 2 If the license is for physical access to run the subflow 3 4. Use the source 5. Select Output 6. Take the card and leaves SubFlows: S - 1: If the result is negative Authentication The student is notified of the outcome SP informed the computerized energy. S - 2: If the license agreement for reasonable access The Library informed and provide access to sources of SP informed the computerized energy S - 3: If the license terms of physical access ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 158 SP informed the computerized energy Alternate / Exceptional Flows: S - 2: 1a, if the student has financial obligations to the Library, advised accordingly and access to sources is limited to basic. 72 4.3.2. Calculation of person-hours using use case points Use Case Point Estimation Worksheet Unadjusted Actor Weighting Table Actor Type Description Weighting Factor Number Result Simple External System with welldefined API 122 Average External System using a protocol-based interface, e.g., HTTP, TCT / IP, or a database 236 Complex Human 3 1 3 Unadjusted Actor Weight Total (UAW) 11 Unadjusted Use Case Weighting Table Use Case Type Description Weighting Factor Number Result Simple 1 - 3 transactions 5 8 40 Average 4 - 7 transactions 10 2 20 Complex> 7 transactions 15 0 0 Unadjusted Use Case Weight Total (UUCW) 60 Unadjusted Use Case Points (UUCP) = UAW + UUCW UUCP = 11 +60 = 71 Technical Complexity Factors Factor Number Description Weight Assigned Value (0 - 5) Weighted Value Notes ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 159 T1 Distributed system 2 4 8.0 T2 Response time or throughput performance objectives 1 4 4.0 T3 End-user online efficiency 1 5 5.0 T4 Complex internal processing 1 3 3.0 T5 Reusability of code 1 4 4.0 T6 Easy to install 0.5 3 1.5 T7 Ease of use 0.5 4 2.0 T8 Portability 2 3 6.0 T9 Ease of change 1 4 4.0 T10 Concurrency 1 2 2.0 T11 Special security objectives included 1 5 5.0 T12 Direct access for third parties 1 4 4.0 T13 Special User training 1 3 3.0 73 required Technical Factor Value (Tfactor) 51.5 Technical Complexity Factor (TCF) = 0.6 + (0.01 * Tfactor) TCF = 0.6 + (0.01 * 51.5) = 1.115 Environmental Factors Factor Number Description Weight Assigned Value (0 - 5) Weighted Value Notes E1 Familiarity with system development process being used 1.5 2 3.0 E2 Application experience 0.5 3 1.5 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 160 E3 Object-oriented experience 1 3 3.0 E4 Lead analyst capability 0.5 2 1.0 E5 Motivation 1 5 5.0 E6 Requirements stability 2 3 6.0 E7 Part time staff -1 0 0.0 E8 Difficulty of programming language -1 -5.0 5 Environmental Factor Value (Efactor) 14.5 Environmental Factor (EF) = 1.4 + (-0.03 * Efactor) EF = 1.4 + (-0.03 * 14.5) = 0.965 Adjusted Use Case Points (UCP) = UUCP * TCF * ECF UCP = 71 * 1.115 * 0.965 = 76.394225 According to the algorithm is the RIM 28 Person Hours Multiplier (PHM) PHM = 28 Person Hours = UCP * PHM = 76.394225 * 28 = 2139.0383 Therefore concludes that the project is feasible and necessary total of about 2139 man-hours. In this work, but must work People who have experience developing similar environments and have direct contact with new technologies. Then give the class diagram for the entire Information System as well as CRC cards obtained. 74 4.4 0omiki modeling Figure 12: 9iagramma classes in Information System 75 4.4.1 CRC cards The corresponding CRC Card diagram of classes are: Front: Class Name: Person Person ID: 1 Type: Concrete, Domain Description: Describes the general people system Associated Use Cases: Responsibilities - Access to the system Collaborators Back: Attributes: Name (string) Last Name (string) Identity (char) ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Front: Class Name: Officials Foundation ID: 2 Type: Concrete, Domain Description: Describes the general staff of Foundation Associated Use Cases: Responsibilities Collaborators Back: Attributes: Department (string) Division staff (char) Relationships: Generalization (a-kind-of): Face - Room Service Aggregation (has-parts): Other Associations: Search 76 Front: Class Name: Student ID: 3 Type: Concrete, Domain Description: The person giving the Services Foundation Associated Use Cases: 4 Responsibilities - Submit application - Monitor application - Take affidavits, certificates, business card - Takes items (books, articles) - Tucked sources (logical, physical) - Buy products - Vote in elections Foundation Collaborators Documents Quest Documents Resources Products Documents - Proof Voting records; Back: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

161

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 162 Attributes: Registration (char) Examinospoudon (integer) Possession Card (boolean) Relationships: Generalization (a-kind-of): Face - Night Aggregation (has-parts): Other Associations: Search, Documents, Resources, Products Front: Class Name: 9iefthyntis ID: 4 Type: Concrete, Domain Description: The person who supervises officers Foundation Associated Use Cases: 1 Responsibilities - Sign writing - Publishes statistics - Police Information Collaborators - Employee, Documents - Employee - Control Back: Attributes: Relationships: Generalization (a-kind-of): Employee Foundation Aggregation (has-parts): Other Associations: Service and Documentation, Testing 77 Front: Class Name: Employee Service ID: 5 Type: Concrete, Domain Description: The person responsible for number of services provided within the institution Associated Use Cases: 4 Responsibilities - 9imiourgei regulates accounts - 9iacheirizetai rights - 9aneizei presumption - Make payments - Prepares certificates - Registers request - Prepares report ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 163 - Inform students Collaborators - Documents - Documents, Information - Update - Documents - Documents Back: Attributes: Relationships: Generalization (a-kind-of): Officials of the institution Aggregation (has-parts): Other Associations: Documents, Control, Information, 9iefthyntis Front: Class Name: Bank ID: 6 Type: Concrete, Domain Description: The agency informed financial transactions card holders Associated Use Cases: 1 Responsibilities Inform user accounts Collaborators - Information, Documentation Back: Attributes: Department (char) Information officer (string) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Documents, Information 78 Front: Class Name: Verification ID: 7 Type: Concrete, Domain Description: Total process serving same action for other classes Associated Use Cases: 3 Responsibilities - Checks if conditions met - Validity of evidence - Control card Collaborators - Documents - 9iefthyntis ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 164 - Employee service Documents Back: Attributes: Type of Control (integer) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Documentation, Employee Service, 9iefthyntis Front: Class Name: Media ID: 8 Type: Concrete, Domain Description: set of procedures that serve other classes with a focus on updating their Associated Use Cases: 3 Responsibilities Identifies the type of user Send information Collaborators - Employee service Bank - Bank Employee Service, Resources Back: Attributes: Species Information (char) Registration number (integer) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Resources, Employee Service, Bank 79 Front: Class Name: Find ID: 9 Type: Concrete, Domain Description: Total processes that joint actions in other classes Associated Use Cases: 6 Responsibilities Displays the search result Collaborators - Documents, Sources Back: Attributes: Search Type (char) ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 165 Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Documents, Resources, Student, Employee Foundation Front: Class Name: Source ID: 10 Type: Concrete, Domain Description: Provides access to people with physical or logical areas of the institution Associated Use Cases: 2 Responsibilities - It records the movements Collaborators - Information, Student Back: Attributes: Type (char) 9ikaiomata (integer) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: News, Student, search 80 Front: Class Name: Documents ID: 11 Type: Concrete, Domain Description: Total items obtained as derivatives of other actions of other classes Associated Use Cases: 5 Responsibilities - Audit rights Collaborators Control Back: Attributes: Type (char) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Student, Search, 9iefthyntis, Bank, Check, Products Front: Class Name: Reference ID: 12 Type: Concrete, Domain Description: A document required to start ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 166 The account creation process Associated Use Cases: 1 Responsibilities Collaborators Back: Attributes: Registration number (integer) Status request (String) Relationships: Generalization (a-kind-of): Documents Aggregation (has-parts): 9ikaiologitika Other Associations: 81 Front: Class Name: 9ikaiologitika ID: 13 Type: Concrete, Domain Description: Documents required for a integrated application Associated Use Cases: 1 Responsibilities Collaborators Back: Attributes: Type (char) Number (integer) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Front: Class Name: Certificate _______ID: 14 Type: Concrete, Domain Description: A document that shows properties are people within the institution Associated Use Cases: 1 Responsibilities Collaborators Back: Attributes: Registration number (integer) Relationships: Generalization (a-kind-of): Documents Aggregation (has-parts): Other Associations: 82 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, Front: Class Name: Receipt ID: 14 Type: Concrete, Domain Description: Type of financial document showing payments made Associated Use Cases: Responsibilities Collaborators Back: Attributes: Number (integer) Service (String) Sum (float) Relationships: Generalization (a-kind-of): Documents Aggregation (has-parts): Fine Other Associations: Front: Class Name: Fine ID: 15 Type: Concrete, Domain Description: Type of evidence given when it to pay the student specific services Associated Use Cases: 2 Responsibilities Collaborators Back: Attributes: Date (date) Reason (text) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: 83 Front: Class Name: Identity card ID: 16 Type: Concrete, Domain Description: Used by people within foundation for actions. Associated Use Cases: 8 Responsibilities Collaborators Back: Attributes: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

167

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 9ikaiomata use (integer) Sum (float) Code (char) Relationships: Generalization (a-kind-of): Documents Aggregation (has-parts): Other Associations: Front: Class Name: Vote ID: 17 Type: Concrete, Domain Description: Used for the election Representatives Associated Use Cases: 1 Responsibilities Collaborators Back: Attributes: Date (date) Array (String) Relationships: Generalization (a-kind-of): Documents Aggregation (has-parts): Other Associations: 84 Front: Class Name: Product ID: 18 Type: Concrete, Domain Description: Goods may be purchased by student Associated Use Cases: 2 Responsibilities - Sale Collaborators - Documents - Proof Back: Attributes: Type (String) Price (float) Product code (char) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Student, Documents Front: Class Name: Service ID: 19 Type: Concrete, Domain Description: Description of general services ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

168

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, exist within the institution. Associated Use Cases: 3 Responsibilities Collaborators Back: Attributes: Name (String) Number of employees (integer) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Library, Computer, 9ioikisi Other Associations: 85 Front: Class Name: Library ID: 20 Type: Concrete, Domain Description: Description of the Office of the Library Associated Use Cases: 1 Responsibilities Collaborators Back: Attributes: List (String) Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Front: Class Name: 9ioikisi ID: 21 Type: Concrete, Domain Description: Description of the service 9ioikisis Associated Use Cases: 1 Responsibilities - Organisation of procedures Collaborators Back: Attributes: Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: Front: Class Name: Computer ID: 22 Type: Concrete, Domain Description: Description of ypiresiatis Computerization ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

169

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 170 Associated Use Cases: 1 Responsibilities - 9iorthosi errors - Error Logging Collaborators Back: Attributes: Relationships: Generalization (a-kind-of): Aggregation (has-parts): Other Associations: 86 Then move on to diagrams of conduct to study the use cases outlined above. The dynamic representation of Chart helps us to reconstruct the different streams of messages out over time. Thus we have the following behavior diagrams for use cases. 4.5 Behavior Modeling In diagrams visualized the flow behavior of use cases and acquire a better view of what happens during the system implemented. The sequence diagrams that will be followed for all use cases analyzed in previous sections. The diagrams describe the operational procedures of the institution in terms of purpose. Until now, these processes have perigraftei level classes. 87 1st Case of use: Authentication. Fig 13. Authentication 88 2nd Case of use: Purchase of goods and services. Fig 14. Buying goods 89 3rd Case of use: Election of delegates. Fig 15. Voting 90 4th Case of use: Monitoring tab. Fig 16. Monitoring tab. 91 5th Case of use: 9iacheirisi student tab. Fig 17. 9iacheirisi tab. 92 6th Case of use: Provide evidence. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 171 Figure 18: evidence 93 7th Case of use: 9iacheirisi financial demands. Fig 19. Financial claims 94 8th Case of use: 9iacheirisi accounts. Fig 20. 9iacheirisi accounts 95 9th Case of use: Set user rights. Fig 21. Setting Rights 96 10th Case of use: Access to sources. Fig 22. Access to sources 97 We should at this point to mention that these diagrams behavior because the user confirmation scenario repeated in almost all the diagrams do not plan again after the first graph where fully described. Was to simplify the diagrams and more effective understanding of other shapes. Then follow these diagrams and charts statements. Charts situations are dynamic models show different situations that an object can have during interacting with life events, through its own activities (Dennis A et al 2005). The contents of a matrix of situations can only be one class, but may include a set of classes or the whole system. So we have: Fig 23. 9iagramma returns "the student buys products' 98 Fig 24. 9iagramma katastaseongia "the student has access to sources" Eik.25. 9iagramma statements for the "student vote" Eik.26. 9iagramma returns "the official handles requests" 99 Fig 27. 9iagramma returns "state application for a student identity ' 100 5th Chapter 5. Design 5.1. 0iagramma Packages and Strategy Development Turning to the design phase, on an 9iagramma Packages and Strategic Development implemented chart packages. This chart Then, in the 9iefthynti Library. Also then ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 172 mentioned the most appropriate development strategy based on all information we had so far in our disposal. Graph special packages interest was the grouping of different classes of procedures levels (layers) and the separation of the computer system in three main layers, HCI, PDL, DML and relations between them. Simplification of Class diagram based on the logical grouping increased the ratio understanding. Fig 28. 9iagramma package and strategy The development strategy proposed is outsourcing. Why will be assigned to specialized company with similar experience and specifications are fixed, so reducing the risk of errors or omissions. So the timing system can be lower. Also EDP department of the institution makes software development so that 102 contract awarded to a company that has more experience in this area is a major advantage of this strategy. Even the staff will not burdened with extra work and will not be involved in the production of program will be implemented to support the CP. There will be particular attention is the contract that would Signed with the firm, which should include conditions (recommended safeguards) to not leak information to relate to information security within the system. The type of contract that proposed is the fixed-price. Another point should be emphasized the situation after the implementation is on track to technical support and maintenance of the natural system. It will also say that a key point for better functionality, which which should be fixed in this contract to be done is to have staff training in the new system, because officials have not expertise in smart card technologies. 5.2 Planning classes and methods. A review of methods for the design criteria were not revealed new diagram classes. Because the methods are presented in the above Figure headings are too many, have been selected at this stage most important of these. The methods that are most relevant terms of analysis is the access to sources () Purchase of goods () and Signing documents (). In practice, contracts are created for each method can receive messages from other objects. The contract contains information necessary so that a programmer can understand what is in the process, so that they might implement it. The following form (method specification form) contracts (contract format) ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 173 describing the code of the method is implemented by developers. 9inontai ie instructions on what to implement the method a code base (Dennis A et al 2005). 103 Contract Format Method Name: access to source () Class Name: Student ID: 1 Clients (Consumers): Method of Inspection Rights () Associated Use Cases: Student, Resources, Audit, ID - card Description of Responsibilities: Insert the card and having entered the code performs a request access. Returns subject information on whether the card user has necessary rights to make use of natural or logical resources. Arguments Received: Id_student: char Password: char Current_date: date Type of Value Returned: Access (boolean) Information (text) Pre-Conditions: Provide user card. Passwords are correct Post-Conditions: Method Specification Form Method Name: access to source () Class Name: Student ID: Contract ID: 1 Programmer: Date Due: Programming Language: ϒ Smalltalk ϒ Visual Basic ϒ C + + Java X Triggers / Events: Insert a card reader, request use of sources Arguments Received: Data Type: Notes: char Id student char Password Date Date Messages Sent & Arguments Passed: ClassName.MethodName: Data Type: Notes: Control: Control Card () Boolean Documents: String control rights ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 174 Argument 104 Returned: authorization decision access Data Type: Object Notes: receive permission to access Algorithm Specification: Misc.Notes: Contract Format Method Name: Purchase of goods () Class Name: Student ID: 2 Clients (Consumers): Method of sale () Associated Use Cases: Student, Bank Products, Proof Description of Responsibilities: Debit card with the amount of money required to acquire good. Returns the balance of the card. Arguments Received: Id_student: char password: char Current_date: date Price_product: float Type of Value Returned: Proof (object) Summary (float) Pre-Conditions: Provide user card, Passwords are correct Be enough money in the account Post-Conditions: To create the correct object in the correct form. Method Specification Form Method Name: purchasing goods () Class Name: Student ID: Contract ID: 2 Programmer: Date Due: Programming Language: ϒ Smalltalk ϒ Visual Basic ϒ C + + Java X Triggers / Events: Tap Button property market Arguments Received: Data Type: Notes: char Id student char Password date Date Product price float ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 175 105 Messages Sent & Arguments Passed: ClassName.MethodName: Data Type: Notes: Products: sales () float Price Control: Control Card () boolean Market Entry Bank: Account Update () float Account Balance Argument Returned: Proof Data Type: Object Notes: sends proof of receipt Algorithm Specification: Misc.Notes: Contract Format Method Name: signing documents () Class Name: 9iefthyntis ID: 3 Clients (Consumers): Preparation certificate, registration application () Associated Use Cases: Employee, Student, Documents Description of Responsibilities: Sign documents relating to student requests for various actions served by the secretariats Returns whether the certificate or, in general the documents are intended for students can be delivered. Arguments Received: Id_student: char Current_date: date Type of Value Returned: Certificate / Certificate (object) id_certificate (longint), the id of the certificate. Pre-Conditions:: The application documents must not be forged. Provide students with ID card Provide staff Post-Conditions: To create the correct object in the correct form. 106 Method Specification Form Method Name: signing documents () Class Name: 9iefthyntis ID: Contract ID: 3 Programmer: Date Due: Programming Language: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 176 ϒ Smalltalk ϒ Visual Basic ϒ C + + Java X Triggers / Events: The documents are not forged Arguments Received: Data Type: Notes: char Id student Date Date Messages Sent & Arguments Passed: ClassName.MethodName: Data Type: Notes: Official: Prepare certificate () String Control: Control card boolean Employee: Student Information Get information on String the state of application 9iefthyntis: Information Police String If the supporting documents application prove false Argument Returned: Certificate / confirmation Data Type: Object Notes: The license / certificate given / sent to the student Algorithm Specification: Misc.Notes: 107 5.3 Window 0iagramma Navigation For 9iagramma navigation selected the most important processes use. Thus we have the following scenarios: 1o Use Case Scenario: A student purchases goods and services 1. The user visits the system. (1) 2. Introduces smart card (1) 3. Performs product search Search (2) 4. 9idetai purchase a product or service (2, 6, 7) 5. The user is informed of the financial operations of (7) 2o Use Case Scenario: The student has access to sources of the institution 1. The student introduces the card in a special machine and enter the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 177 source (1.10) 2. Students looking for items to logical or natural sources. (10, 6) 3. Receive evidence, using library services (6) 3o Use Case Scenario: The official work, perform a series of operations has. 2. The official linked to the appropriate environmental management by introducing card. (1) 3. 9iacheirizetai the requests from various student cards (5) 4. Inform other departments of the institution and the student tab on (4,8) 4o Use Case Scenario: The director of the service review and sign documents 1. The director certified and enters the management system (1) 2. Document control (5.8) 3. Publication of statistical reports (5) The bar graph window (WND) is obtained: 108 Fig 29. Graph Navigation Window 109 5.3.1. Interface Design Standard Interface Metaphor: Application connection services using smart cards University Interface Objects: Requests: All requests for services 9ikaiologitika: All-reference documents required for applications Manual: Manual of the implementation of particular content explain the use of smart cards. Interface Actions Search: Display results depending on the keyword that was Navigation: Displays the current screen Submission: Submit an application for registration information Purchase: View account and asset value Statistics: Statistics Report-enabled configuration criteria Monitor: View procedures kartelaschristi Interface Icons: Icon home page: will be used on all pages Icon Contact: used on all pages Icon emergency: to be used on all pages Icons Language: used on all pages Icon shopping cart will be used on pages that relate to charge card. Icon quick login to the account: to be used in all ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 178 pages. Icons for file operations such as: storage, deletion, downloading etc. Be used in all environments users have management functions. 110 5.3.2. Interface Evaluation . As a method to assess the interface suggest the Walkthrough evaluation, the reasons are: 1. The officials are not familiar with new technologies, so a more visual assessment with an explanation of the analyst about how the interface would be more profitable than the part of the evaluation 2. It is a good first touch and user interface, meaning that it is controlled by the processor that created the interface and is able to explain the philosophy to which he did. 3. From the discussion that will occur after the presentation as normal reaction of the public (users), outputs (perhaps new requirements or additions to the interfaces) will close einaipio actually achieved in comparison with other assessment techniques. The basic parameter is as above the line of sight for the users and coupled with the fact that users know their job well, the combination these two leads to a result set (corrections) closer the actual implementation. 5.4 Infrastructure Planning In the final stage of the design phase which is the 'Design Infrastructure, developed to extend the diagram (deployment model) and network model (network model), which can see all the external systems in which the university should interact. The first diagram helps us to understand the architectural design systems, both hardware and software for use in new Information System. The source of this information was considered important as We are now in a position as advisors to have a glimpse of the system and that users on the basis of technological knowledge should be prepared. While the second chart may indicate possible improvements to the requirements 111 infrastructure in telecommunications equipment should have the foundation to meet the requirements of the new Information System. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 179 Fig 30. Model Extension (Deployment Model) As shown apotin picture above, the system is independent of the platform operating system with the users' computers. This is due to technology development that will be used. It is also evident that the connection to the application is necessary reader cards, which might push the cost of implementation, but should not forget the important advantages resulting from the use of the cards when the cost of the device outweighed the benefits. Then describe the network model of the Information System. 112 Fig 31. Network model (Network model) For the smooth functioning of the system will be implemented for information system investigated should communicate with all networks described in the above image. The network of consulates necessary it is known that there interstate agreements to exchange students between institutions, when a foreign student should be treated as unit within an institution, like other students. For all other networks there was no reference to previous sections on the reasons connection with the system operated. Network Universities diene Police Network Network Minister Education Network Consulates Network Insurance Funds Network Banks Private Network Private Network Private Network Private Network ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 180 Private Network 113 Chapter 6 Overview of application implementation For the implementation of the application used the following programs and Libraries (Netbeans, 2007), (Java Card, 2007), (GPShell, 2007), (OpenJDK 7,2007), (MySQL, 2007), (PhpMyAdmin, 2007), (PSPad, 2007): 1. Netbeans 5.1.1 2. Java Card Kit 2.1 3. Java Card Kit 2.1.1 4. GPShell 1.4.1 5. Open Platform 1.1.0 6. OpenJDK 7 7. MySQL 5 8. PhpMyAdmin 2.9.2 9. Mysqlconnector java 5.0.8 10. PSPad editor 11. JDK 1.2.2 12. JDK 1.6.0_02 The equipment used is as follows: GemXpresso 64K Smart card GemPC USB-SL Smart card reader On Card application Initially we installed the Kit of Java Card 2.1.1 and later Make the files are missing from the Java Card Kit 2.1.1 and has 2.1. The Kit is available from Sun to develop on - card applications (the latest version of JCKit 2.2.2 provides better tools simulation, but the resulting output files can not be currently supported by all the smart cards in circulation trade.). Because the applet to be "downloaded" the card would actually be a snapshot of the applet to the memory card should EEROM 114 try to implement the simulator JCKit whether responding correctly. 9en can work out the code of the applet when it is loaded the smart card and since installing the applet is usually consuming need to have tried at least once in 1 simulator that runs normally without problems. The simulator represents the behavior of smart cards to the commands of Java Card, however, is not a panacea for all cards. More specifically, could an applet in the simulator naemfanizei some problems, but when ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 181 loaded on the card does not have an obvious problem when accepting orders the application (off card). The process of development of on-card application (applet) is schematically indicated in Fig 2 The code developed at the interface of the program PSPad covers the on - card implementation in the following scenario: The applet is installed when the card is initialized so that values are the number, the name, surname of the student and a code by which it can perform certain actions. Also, the applet may serve economic functions, such as the student to load the card with money and can purchase goods and services with it. The code on - card application (Myapplet.java) is given in Appendix A. Before proceeding to the explanation of the code should refer to the way to operate the applet on - card to make it more understandable. When the packets are defined and loaded in the Java smart card and related other packages on the card if they exist, then we consider the life cycle the applet starts. The snapshot of the applet is created and entered in JCRE (Java Card Runtime Environment). This means that only one applet can run each time. When the applet is installed first, then in a passive state. Becomes active when the epilechtheiapo off card application. When selected the off card application sends the command and the applet sends the response, the process is repeated until a new applet 115 selected by the application or leave the card reader (Hansmann et al. 2002). The procedure described in the figure below. Fig 32. On implementation of the applet (Hansmann et al. 2002). Each instance of the applet loaded on the card has a unique AID (Application identifier), each packet is also using the Java applet also indicated that AID, the accuracy is like a subset of. The AID is an array of bytes, which can be interpreted in two different pieces. Fig 33. Application identifier (AID) (Hansmann et al. 2002). The first piece of RID (resource identifier) is a 5 byte size and state of which company has written the applet. Every company has a unique RID which under the control of the agency ISO. The second part is a variable length value known as PIX (proprietary identifier extension), this element ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 182 typically uniquely identifies the applet company (Hansmann et al. 2002). When off - card application sends the command SELECT to select the applet is on the card, searching for the applet is based on the existing AID the command option. If found then JCRE to select and run the applet. Each applet is applied by creating a subclass of class javacard.framework.Applet. Here are the methods of those who JCRE Calls from creation to execution of the applet. RID (5 bytes) PIX (0 11 bytes) Inactive Active process a comman create d select deselect

1. public static void install (byte [] bArray, short bOffset, byte
bLength): The JCRE calls this method to create the enastigmiotypo subclass of Applet. 2. protected final void register (): This method is used by the applet to store a snapshot of the applet and to JCRE match the AID of the CAP file in the snapshot of the applet. 3. protected final void register (byte [] bArray, short bOffset, byte bLength): The This method has the same application as the above. 4. public boolean select (): The JCRE calls this method to inform applet is selected. 5. public abstract void process (APDU apdu): The JCRE calls this method to prepare the applet to accept for processing incoming APDU command. 6. public void deselect (): The JCRE calls this method to inform the currently selected applet to another applet is selected. Taking all the above can describe the code clearly. In line 1 indicate the path where the file resides. Then Line 3 is the statement of the necessary import libraries that frequently is javacard.framework, but there are others such as javacard.security used for data encryption mostly. On lines 5-292 is heading Myapplet. This class is therefore ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 183 outside the fixed variables (lines 8 to 42) which defines the CLA, the INS orders and some constants, a variable initializers (lines 44 to 49), the constructor Myapplet (lines 55 to 77) and the following methods (lines 85 to 290) public static void install (byte [] bArray, short bOffset, byte bLength): Here called a constructor MyApplet create a new object. public boolean select (): Here is a selection of applet if not exhausted by the effort the user to enter the PIN correctly card. 117 public void deselect (): Here the applet from-selected and invited method reset () of the pin, which controls a boolean variable on whether the pin has entered the cardholder is valid or not. public void process (APDU apdu): This method accepts an APDU command under the INS office that calls other methods. For example, if the INS's mandate is 01 then we invite getstudentId ( apdu). private void verify (APDU apdu): This method checks whether the command sent by the application when the user entered the PIN is the right. 9iladi check the price has the mandate to that the applet has taken to initialize. private void getstudentId (APDU apdu): Returns the response as mandated by number of the user, the applet is given in initialization. private void getname (APDU apdu): Also here returns the name of user. private void getlastname (APDU apdu): Likewise returns the name of user. private void credit (APDU apdu): This method allows the user to load on your money, if it is entered correctly the code. There are also some extra controls on the amount that wants ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 184 user to load the card. So what can be more of 127 monetary units and not less than 0 monetary units. Also, the maximum amount on the card can not be more than 462,847 monetary units. private void debit (APDU apdu): This method allows the user has been entered correctly the code to charge the card with an amount does not exceed what the card is already inside. private void getBalance (APDU apdu): The methodosepistrefei the amount that the Card is the time when the command is sent from the application. 118 Then we will describe how they create the class files and that inside the converter is created CAP file which will be loaded card. Open a command environment MS-DOS and run the file javacard_env.bat which we created when we install the Java Card Kit 2.1.1. The file contains the following: @ Echo off set JAVA_HOME = c: \ Java \ jdk1.6.0_02 set JC21BIN = c: \ jc211 \ bin set PATH =% JC21BIN%;% JAVA_HOME% \ bin;% PATH%; set CLASSPATH = c: \ jc211 \ bin; c: \ jc211 \ samples In essence what this does is set some environment variables are are necessary. Then type the command cd c: \ jc211 \ samples \, command us to the samples folder where you putting the following command: .. \ .. \ Jdk1.2.2 \ bin \ javac.exe-g-classpath .. \ bin \ api21.jar com \ sun \ javacard \ samples \ Myapplet \ *. java So I have compiled the file with Myapplet.java libraries jdk 1.2.2, These requirements are due to the adoption of Java Card as the cards support. Inside the folder is the file Myapplet Myapplet.class Then execute the command: converter-config com \ sun \ javacard \ samples \ Myapplet \ Myapplet.opt This command will create in the folder Myapplet \ javacard \ 3 records ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 185 endings. jca,. exp, cap. Myapplet.opt file gives instructions to converter on the conversion. This file has the following: 119 -Out EXP JCA CAP -Exportpath .. \ api21 -Applet 0xa0: 0x0: 0x0: 0x0: 0x62: 0x7: 0x1: 0xc: 0x2: 0x1 com.sun.javacard.samples.Myapplet.Myapplet com.sun.javacard.samples.Myapplet 0xa0: 0x0: 0x0: 0x0: 0x62: 0x7: 0x1: 0xc: 0x2 1.0 The first line provides information about the files we want to create. In the second line there is the information on where to find the converter libraries needed by the applet. In the next line we define the AID of the applet. In teleftaiagrammi define the AID of the package applet. Myapplet.cap file has been created and therefore can now be install the card. At this point it should be noted that the testing phase in Java simulator has been omitted because, as indicated above tools Simulation Kit 2.1.1 is not sufficient to be tested efficiently. The GPShell is an open source software which helps in making install a CAP file in a smart card, looking at the AID applet initialized and what statements are and then we can delete the applet from the card. These functions are basic but however, is for many the best solution to commercial programs. At the command prompt, and if we are in the file contains GPShell.exe execute the following command: GPShell.exe InstallgemXpressoProR3_2E64.txt This command initialize the applet on the card, the instructions given by the File InstallgemXpressoProR3_2E64.txt (which is on file GPShell, Like the CAP file we created above). File InstallgemXpressoProR3_2E64.txt has the following code: 120 mode_201 gemXpressoPro enable_trace establish_context card_connect select-AID A000000018434D00 open_sc-security 3-keyind 0-keyver 0-key 47454d5850524553534f53414d504c45 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 186 / / Open secure channel install-file Myapplet.cap-instParam 4D49533036323747454F524745564552414E495332373031303 5-sdAID A000000018434D00-nvCodeLimit 4000 / / ID -> MIS0627 -> 4D495330363237 / / NAME -> GEORGE -> 47454F524745 / / LASTNAME -> VERANIS -> 564552414E4953 / / PIN -> 270105 -> 323730313035 card_disconnect release_context In the first 7 lines are the commands needed to open a safe communication channel (mutual authentication) with the card. More specifically, the command select-AID A000000018434D00 select an existing applet on the card which is known as the card manager. The applet is therefore necessary be selected to "open" communication channel card and not can be deleted. Installed by the manufacturer and for each card initialization is unique. In line 7 are given the mandate for opening the secure channel as we can discern is the parameters of security, keyind, keyver, key. The first refers to the level security card, this used has 3 levels. The next 2 have to do with the characteristics of the key, for example if we create our own key then keyver would value a key (keyver => key version, keyind => key index). In this case have the value 0 because we use the key to the manufacturer 121 company has put on the card. If you turn the key in ASCII you will see that 47454d5850524553534f53414d504c45 -> GEMXPRESSOSAMPLE. In the ninth line is given the mandate to install and Myapplet.cap initialize the applet. Parameter-instParam value is given 4D49533036323747454F524745564552414E495332373031303 5 which is the initialization Myapplet.cap. The parameter-nvCodeLimit has the value 4000 which means that when running the applet on the card will ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 187 assume overall 4K to the memory card. The following instructions are for disconnected safety. Lines beginning with / / are comments. If the installation does not command us then return error message believe that the installation was successful. Here echeioloklirothei description of on - card application. 6.2 Off - Card application The off - card application was developed in the interface of the program NetBeans 5.1.1. To connect the application to the base was used plug - in mysqlconnector java 5.8.0. 9imiourgithike with a PhpMyAdmin user only has access to the database by name and mynewdatabase tables is: party, voting, products. Also been used and Java Smart Card API given by Openjdk 7. 6.2.1. Description The scenario is off - card application covered are as follows: The cardholder introduces a special card reader and can then navigate to application. The application gives access to the user after previously connected to it and give correct password. It includes four sections: Link: Here the user clicking Connect, the application makes the connection and chooses the card applet with AID in the command selection sends. 122 Fig 34. Before the connection option. Fig 35. The user chooses to connect without introducing the card. Fig 36. After selecting a connection. Record holder: Selecting the Validate button and the code is right then displays information about the cardholder. 123 Eik.37. Before the selection control code Fig 38. The code is wrong Fig 39. After the successful verification code Finance: Here the user can "load" the card with a cash ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 188 amount or can spend the money that the card by purchasing products. 124 Every time you buy something that decreases the amount through the card, depending on the cost of the product. Prices of goods and services may be renewed by the database. Fig 40. Financial Tab Fig 41. The user can purchase any of the displayed products; selects the Meal B. 125 Fig 42. The user has chosen to buy Meal B and the amount of the card decreased by 15 €, while the value of the product. Fig 43. The user will make the card in the amount of 10 €. Fig 44. The user has submitted to the card 10 €. 126 Fig 45. The user chooses to purchase the product for the value of which is money to the card. Fig 46. The user selects the card to deposit an amount of more than 127 €, which does not allow on - card application. Vote: Here the user can vote in student elections. Becomes the Check if you have already voted. Fig 47. Environment vote. 127 Fig 48. The user chooses to vote for a party Fig 49. The user has voted Fig 50. The user tries to vote again 128 It should be noted here that the voting results are shown in party list and may for instance through a web application to highlight Internet. The application was designed to be viewed more functionality applications can have technology in a exypnonkarton university. 6.2.2. Architecture The application consists of files: 1. Main.java: this is where the object is of type Apcard ApplicationJFrame and also here are some initial settings ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 189 concerning the appearance of the object. 2. ApplicationJFrame.java: This is designed for our application for appearance and the functionality it supports. 3. ProxyCard.java: This file has all of those methods necessary to communicate with the ApplicationJFrame.java on - card implementation card. 4. MyDBConnection.java: Here are the necessary methods for Apcard object interaction with the database. 5. OPSPUtil.java: This file is in the library OpenPlatform 1.1.0 and has been amended accordingly to be compatible with the Java Smart Card API I / O when called its methods. 129 Basically it could be represented as follows: Figure: 6: Architecture off-card application 6.2.3 Code Description File The codes of all files that have been developed for the off - card implementation found in Appendix A. In the Main.java file is not more than that described in section of the application architecture. ApplicationJFrame.java planned to file the application and functionality it. The objects defined here are the most important subject PX ProxyCard type that can use the methods available to ProxyCard.java. All methods have been checked for possible errors that can prokypsounkai to display messages according to the user. Main.java ApplicationJFrame.java ProxyCard.javMyDBConnection.java a OPSPUtil.java Smart Card MySQL

2.
He has the following methods: 1. private void FrameInit (): Here is the initialization of some properties objects of ApplicationJFrame, on the characteristics of Interface 2. private void initComponents (): Also a method of initializing ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 190 objects of the interface. The code at this point produced by Platform NetBeans, well designed environmental design. 3. private void formWindowClosing (java.awt.event.WindowEvent evt): Controls energy when user closes the application by the exit button window. What it does is to close the communication channel card safely. 4. private void jButton1Connect_card (java.awt.event.ActionEvent evt): The This method satisfies the user to connect to the card. The AID of the applet is defined here to select the applet for which The written off - card application. 5. private void jButton2Disconnect_card (java.awt.event.ActionEvent evt): The This method closes the communication channel with the card in a safe manner. Also changing object properties of the interface. 6. private void Validate_pin (java.awt.event.ActionEvent evt): This method check whether the code has been entered by the user agrees with what the applet is initialized in the on - card application card. If is to control real time read from the card name, last name, first user id and the amount of the card. If the check is false then returns a similar error message. 7. private void Debitcardbt (java.awt.event.ActionEvent evt): In this method mdbc been created using the methods found in the file MyDBConnection.java. Purpose aftistis method is to perform the service properly market a product or service selected by the user. The process provides the user selects to purchase, depending on the product name in the table products the database the application uses corresponding to this a product price. The price returned to this method then called the method of the object debitcard PX is 131 Type ProxyCard and remove that amount from the card and displays new card balance. 8. private void CreditCardBt (java.awt.event.ActionEvent evt): In this method of simply calling the method creditcard object type PX ProxyCard, the new balance shown on the screen of the application. 9. private void VoteBt (java.awt.event.ActionEvent evt): This method serves its service record, created the object mdbc ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, and with a supply only the id is stored on the card record vote of the user.

191

10. public static int hex2decimal (String s): This method converts a hexadecimal number to decimal. 11. public static String convertToUnicodeString (String hexString): Method This converts a hex string to a unicode string. File ProxyCard.java can be considered the heart of the application and all actions to communicate with the card are made in this file. This file has some similarities with the way it works is on - card application, defined here as the CLA, INS and fixed to be structured properly APDU to be sent to the card. The command is always structured according to the instructions the Java Smart Card API. Includes the following methods: 1. public void connect_card (): In this method made the connection with the card reader and selected the first in the list of available devices. After the choice of opening a secure communication channel card 2. public void selectAID (byte [] appletAID): In this method becomes the selection of the AID of the applet on - card application. Here the command is structured always in accordance with the instructions provided by the manufacturer card (Jurgensen T, Guthery S 2002). 3. public static byte [] toBinArray (String hexStr): Converts a hex String to an array of byte. 4. public boolean verify_pin (char [] PIN): This method sends the appropriate instruction to the card to "understand" that the card 132 is to perform the method verify, as we saw above in section the on - card application. When orders are actually constructed a byte table in which they enter as an argument to the object CommandAPDU method to transmit. Related How can anyone found in the JavaDoc version of OpenJDK 7. If the password is wrong then Card returns the error message SW_VERIFICATION_FAILED = 0x6300, which in the java API returns as an integer with Appropriate tests may arise where the error messages ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 192 user. 5. public String getBalance (): 9omeitai command question about card balance. 6. public String getName (): Similarly, the mandate for the username. 7. public String getID (): Similarly, the mandate for the number of the user. 8. public String getLastName (): Ditto for the name of the user. 9. public void creditcard (String s): It is the method that meets the service deposit money onto the card. This command builds the order entolietsi answer method of credit on - card application. The amount added first converted to type byte and then incorporated into command. 10. public void debitcard (String s): It is the method that meets the service market products, structured command. The amount will be deducted from Card is the result of the method populateBuyList, which becomes appropriately in order to accept the command sent. 11. public void disconnect_card (): Closes the communication channel with the card and off-card application is disconnected from the on - card application. Also applet on the card run method deselect. The archive MyDBConnection.java there are methods that help Communication with the database used by the subject mdbc defined in ApplicationJFrame.java, are as follows: 1. public void init (): Here is the link to the database. 133 2. public Connection getMyConnection (): This method returns the object myConnection. 3. public void close (ResultSet rs): This method performs the method of close object rs. 4. public void close (java.sql.Statement stmt): This method performs close method object stmt. 5. public void destroy (): This method closes the connection to the base data. 6. public String Studentvote (String id, int p): This method is called by VoteBt and take all necessary steps to implement the service the vote. Here are the necessary checks on the basis data, control and recording of votes is based on the id ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 193 card has. 7. public int populateBuyList (int s): This method returns the Debitcardbt which calls on the value of the product that the user has epilexeina buy so finally removed this amount from the card. The archive OPSPUtil.java added methods public static String toHexString2 ( byte [] b) and public static String displayHexString (String s), other than those already existed. The first accepts an array of bytes and returns String, used by the subject ProxyCard. When the application is in reply card then sends the data always in the form of tables byte. The second method takes a String and displays it as Hexademical Sring, used for verification purposes results during development application. 6.2.4. Design Database The database application has the following tables: 134 party: Represents the parties involved in election process. In this table measure the votes of students. products: This table contains the prices of goods or services the student buys. voting: In this table there is information about whether a Students participated in the election process or not. The structure of the tables shown in the figure below. Figure 7: The structure of the database table. In Appendix A you can find the necessary codes along with application data
id_party title_party countvotes party id_product title value id_student datevoting timevoting products voting flagvoting 135 ΒΙΒΛΙΟΓΡΑΦΙΚΕΣ ΠΑΡΑΠΟΜΠΕΣ 1. Hansmann U, Nicklous S.M , Schack T, Schneider A, Seliger F, 2002, Smart Card Application Development Using Java, 2nd edition, Springer-Verlag Berlin Heidelberg , New York , ISBN 3-540-43202-7. 2. Chen Z, 2004, Java Card Technology for Smart Cards: Architecture and

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

194

Programmer’s Guide, 2nd edition, Addison-Wesley, ISBN 0-201-70329-7. 3. Βογιατζής Α., S 2001, Ανάλυση Ασφάλειας Συστημάτων Έξυπνων Καρτών, Msc thesis, Πανεπιστήμιο Κρήτης Σχολή Θετικών Επιστημών Τμήμα Επιστήμης Υπολογιστών,Ηράκλειο. 4. Elliot S, Loebbecke C, J 1998, ‘Smart Card based Electronic Commerce: Characteristics and Roles’, First Annual Hawaii International Conference on System Sciences, vol. 4, p. 242. 5. Jaikumar V., D 2005, ‘N.Y. Hospitals, Siemens Launch Smart-Card Pilot’, Computer World, viewed 2 September 2007, <http://www.computerworld.com/securitytopics/security/story/0,10801,106950,00.ht ml> 6. Dalvins Technologies, (2007), Dalvins Technologies, Available from :<http://www.dalvins.com> ,[Accessed at 4 July 2007]. 7. M.U.S.C.L.E. project, (2007), M.U.S.C.L.E. project, Available from :<http://www.linuxnet.com/index.html>, [Accessed at 21 March 2007]. 8. Cohen A ,J 2003 ,’ Smart Cards, Smarter Health Care’, PC Magazine ,viewed at 4 September 2007, <www.pcmag.com> 9. Smart Card Alliance, J 2006, ‘German Health Card’, viewed at 7 September 2007, <http://www.smartcardalliance.org/resources/pdf/German_Health_Card.pdf> 10. Giesecke & Devrient, A 2007,’E-card successfully completes first field test in Austria’, viewed at 25 August 2007, <http://www.gide. com/portal/page?_pageid=44,68631&_dad=portal&_schema=PORTAL> 11. Robert Huber Associates, (2007), Robert Huber Associates, Available from :<http://www.allcampuscard.com/cch80.htm>, [Accessed at 2 September 2007] 12. Fridell T, Mc Kenna E, Smith D, 2007,’Campus Cards - Past, Present and Future Everything you need to know’, 5th Annual Conference ECCA, Austria. 13. ECCA – European Campus Card Association,(2007), ECCA – European Campus Card Association, Available from:<www.ecca.ie >, [Accessed at 24 August 2007].

136 14. Das P., Rastogi L, 2002,’Re-engineering educational institutions through smart cards’, SHTR Consulting Group. 15. Halawani, T., Mohandes, M., D 2003, “SMART CARD for SMART CAMPUS – KFUPM Case Study”, Electronics, Circuits and Systems, ICECS, 10th IEEE International Conference, vol. 3, pp. 1252 – 1255. 16. Leitenmόller DI H, 2007,’A Java Based Information System for Students and Teachers’, 5th Annual Conference ECCA, Austria. 17. 2003,’NEWS VOM CAMPUS’,DAS OFFIZIELLE INFORMATIONSMEDIUM DER JOHANNES KEPLER UNIVERSITAT LINZ, Oktober , A u s g a b e 19. 18. Ομάδα Εργασίας Γ3 - επιχειρησιακό πρόγραμμα ≪Κοινωνία της πληροφορίας≫,O 2002, ‘Έξυπνες κάρτες’, Αθήνα. 19. Τσιγγάνας Θ, A 2007, ’Αριστοτέλειο, το πρώτο ≪on line≫ AEI’, Καθημερινή, 19 Απρίλιος. 20. 9ημολαΐδου Φ,2007,’Αριστοτέλειο: Ηλεκτρονικές υπηρεσίες προς τους φοιτητές’, Μακεδονία , 19 Απρίλιος/ 21. Dennis A, Wixom H. B, Tegarden D,2005,’System Analysis And Design With UML Version 2.0, An Object-Oriented Approach ‘,2nd edition , Wiley. 22. Jurgensen T, Guthery S, J 2002, ‘Smart Cards – The Developer’s Toolkit’,

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

195

Prentice Hall PTR, ISBN 0-13-093730-4. 23. Netbeans, (2007), Netbeans, Available from :<http://www.netbeans.org>, [Accessed at 19 October 2007]. 24. Java Card, (2007), Java Card, Available from :<http://java.sun.com/products/javacard>, [Accessed at 5 September 2007]. 25.GPShell,(2007), GPShell, Available from:<http://sourceforge.net/project/showfiles.php?group_id=143343>, [Accessed at 29 October 2007]. 26. OpenJDK 7, (2007), OpenJDK 7, Available from:<http://download.java.net/openjdk/jdk7> , [Accessed at 27 November 2007] 27. MySQL,(2007), MySQL, Available from:<http://www.mysql.com/> [Accessed at 15 November 2006]. 28. PhpMyAdmin,(2007), PhpMyAdmin, Available from:<www.phpmyadmin.net> [Accessed at 20 November 2006]. 29.PSPad,(2007), PSPad, Available from:<www.pspad.com>, [Accessed at 4 December 2006]. 137 138 ΠΑΡΑΡΤΗΜΑ Α Αρχείο Myapplet.java package com.sun.javacard.samples.Myapplet; import javacard.framework.*; public class Myapplet extends Applet { final static byte CLA = ( byte )0xB0; //CLA final static byte GET_STID = ( byte )0x01; // INS final static byte GET_NAME = ( byte )0x02; //INS final static byte GET_LASTNAME = (byte)0x03; //INS final static byte VERIFY = (byte)0x04; //INS for pin verify final static byte CREDIT = (byte) 0x05; //INS final static byte DEBIT = (byte) 0x06; //INS final static byte GET_BALANCE = (byte) 0x07; //INS // maximum balance final static short MAX_BALANCE = 0x7FFF; // maximum transaction amount final static byte MAX_TRANSACTION_AMOUNT = 127; final static byte MAX_ID_SIZE = ( byte )0x07; final static byte MAX_NAME = ( byte )0x06; final static byte MAX_LASTNAME= ( byte )0x07; final static byte PIN_TRY_LIMIT = (byte)0x09; final static byte MAX_PIN_SIZE = (byte)0x06; final static short SW_VERIFICATION_FAILED = 0x6300; // signal the the PIN validation is required // for a credit or a debit transaction final static short SW_PIN_VERIFICATION_REQUIRED =0x6301; // signal invalid transaction amount

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

196

// amount > MAX_TRANSACTION_AMOUNT or amount < 0 final static short SW_INVALID_TRANSACTION_AMOUNT = 0x6A83; // signal that the balance exceed the maximum final static short SW_EXCEED_MAXIMUM_BALANCE =0x6A84; // signal the the balance becomes negative final static short SW_NEGATIVE_BALANCE = 0x6A85; //instance variables declaration OwnerPIN pin; short balance; 139 byte[] studentId = null; byte[] name = null; byte[] lastname=null; /** * Only this class's install method should create the applet object. */ private Myapplet (byte[] bArray, short bOffset, byte bLength) { studentId = new byte[ MAX_ID_SIZE ]; name = new byte[MAX_NAME]; lastname = new byte[MAX_LASTNAME]; pin = new OwnerPIN(PIN_TRY_LIMIT, MAX_PIN_SIZE); bOffset= ( short )( bOffset + bArray[bOffset]+4);//AID +4 bytes Util.arrayCopyNonAtomic(bArray, bOffset, studentId, (short)0, MAX_ID_SIZE); bOffset+=MAX_ID_SIZE; Util.arrayCopyNonAtomic(bArray, bOffset, name, (short)0, MAX_NAME); bOffset+=MAX_NAME; Util.arrayCopyNonAtomic(bArray,bOffset,lastname,(short)0,MAX_LASTNAME); bOffset+=MAX_LASTNAME; bLength = (byte)0x06; //bArray contains the PIN initialzation value pin.update(bArray,bOffset,bLength); register(); } /** * Installs this applet. * @param bArray the array containing installation parameters * @param bOffset the starting offset in bArray * @param bLength the length in bytes of the parameter data in bArray */ public static void install(byte[] bArray, short bOffset, byte bLength) { new Myapplet(bArray, bOffset, bLength); } //end install public boolean select(){ if (pin.getTriesRemaining()==0) return false; return true;

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

197

} //end select public void deselect(){ pin.reset(); 140 } public void process(APDU apdu) throws ISOException { byte[] buffer = apdu.getBuffer(); if ( selectingApplet() ) { return; } else if ( buffer[ ISO7816.OFFSET_CLA ] != CLA ) { ISOException.throwIt( ISO7816.SW_CLA_NOT_SUPPORTED ); } switch ( buffer[ ISO7816.OFFSET_INS ] ) { case GET_STID: getstudentId( apdu ); return; case GET_NAME: getname( apdu ); return; case GET_LASTNAME: getlastname( apdu ); return; case VERIFY: verify( apdu ); return; case GET_BALANCE: getBalance(apdu); return; case DEBIT: debit(apdu); return; case CREDIT: credit(apdu); return; default: ISOException.throwIt( ISO7816.SW_INS_NOT_SUPPORTED ); } }//end process //Verify PIN private void verify( APDU apdu ) { byte[] buffer = apdu.getBuffer(); //receive data for validation

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

198

141 byte byteRead = (byte)(apdu.setIncomingAndReceive()); //check PIN if(pin.check(buffer,ISO7816.OFFSET_CDATA, byteRead)==false) ISOException.throwIt(SW_VERIFICATION_FAILED); }//end verify private void getstudentId( APDU apdu ) { byte[] buffer = apdu.getBuffer(); Util.arrayCopy( studentId, ( short )0, buffer, ( short )0, MAX_ID_SIZE ); apdu.setOutgoingAndSend( ( short )0, MAX_ID_SIZE ); } private void getname(APDU apdu ) { byte[] buffer = apdu.getBuffer(); Util.arrayCopy(name, ( short )0, buffer, (short)0, MAX_NAME ); apdu.setOutgoingAndSend( (short)0, MAX_NAME ); } private void getlastname(APDU apdu ) { byte[] buffer = apdu.getBuffer(); Util.arrayCopy(lastname, ( short )0, buffer, (short)0, MAX_LASTNAME ); apdu.setOutgoingAndSend( (short)0, MAX_LASTNAME ); } private void credit(APDU apdu) { // access authentication if ( ! pin.isValidated() ) ISOException.throwIt( SW_PIN_VERIFICATION_REQUIRED); byte[] buffer = apdu.getBuffer(); // Lc byte denotes the number of bytes in the // data field of the command APDU byte numBytes = buffer[ISO7816.OFFSET_LC]; // indicate that this APDU has incoming data // and receive data starting from the offset // ISO7816.OFFSET_CDATA following the 5 header // bytes. byte byteRead = (byte)(apdu.setIncomingAndReceive()); 142 // it is an error if the number of data bytes // read does not match the number in Lc byte if ( ( numBytes != 1 ) || (byteRead != 1) ) ISOException.throwIt(ISO7816.SW_WRONG_LENGTH); // get the credit amount byte creditAmount = buffer[ISO7816.OFFSET_CDATA]; // check the credit amount

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

199

if ( ( creditAmount > MAX_TRANSACTION_AMOUNT) || ( creditAmount < 0 ) ) ISOException.throwIt (SW_INVALID_TRANSACTION_AMOUNT); // check the new balance if ( (short)( balance + creditAmount) > MAX_BALANCE ) ISOException.throwIt (SW_EXCEED_MAXIMUM_BALANCE); // credit the amount balance = (short)(balance + creditAmount); } // end of deposit method private void debit(APDU apdu) { // access authentication if ( ! pin.isValidated() ) ISOException.throwIt (SW_PIN_VERIFICATION_REQUIRED); byte[] buffer = apdu.getBuffer(); byte numBytes = (byte)(buffer[ISO7816.OFFSET_LC]); byte byteRead = (byte)(apdu.setIncomingAndReceive()); if ( ( numBytes != 1 ) || (byteRead != 1) ) ISOException.throwIt (ISO7816.SW_WRONG_LENGTH); // get debit amount byte debitAmount = buffer[ISO7816.OFFSET_CDATA]; // check debit amount 143 if ( ( debitAmount > MAX_TRANSACTION_AMOUNT) || ( debitAmount < 0 ) ) ISOException.throwIt (SW_INVALID_TRANSACTION_AMOUNT); // check the new balance if ( (short)( balance - debitAmount ) < (short)0 ) ISOException.throwIt(SW_NEGATIVE_BALANCE); balance = (short) (balance - debitAmount); } // end of debit method private void getBalance(APDU apdu) { byte[] buffer = apdu.getBuffer(); // inform system that the applet has finished // processing the command and the system should // now prepare to construct a response APDU // which contains data field short le = apdu.setOutgoing(); if ( le < 2 ) ISOException.throwIt (ISO7816.SW_WRONG_LENGTH);

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

200

//informs the CAD the actual number of bytes //returned apdu.setOutgoingLength((byte)2); // move the balance data into the APDU buffer // starting at the offset 0 buffer[0] = (byte)(balance >> 8); buffer[1] = (byte)(balance & 0xFF); // send the 2-byte balance at the offset // 0 in the apdu buffer apdu.sendBytes((short)0, (short)2); } // end of getBalance method } 144 Αρχείο Main.java /* * Main.java * * Created on 22 Νοέμβριος 2007, 11:30 μμ * * To change this template, choose Tools | Template Manager * and open the template in the editor. */ package new_diploma; import javax.smartcardio.*; import java.util.List; import org.dyndns.widerstand.OpenPlatform.*; import new_diploma.ApplicationJFrame; import java.awt.*; /** * * @author GEORGE VERANIS * A.M. MIS2706 */ public class Main { private static ApplicationJFrame Apcard; /** Creates a new instance of Main */ public Main() { try { jbInit(); } catch (Exception ex) { ex.printStackTrace(); } } private void jbInit() throws Exception { } /** * @param args the command line arguments */

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

201

public static void main(String[] args) { // TODO code application logic here Apcard = new ApplicationJFrame(); Apcard.pack(); Dimension screenSize = Toolkit.getDefaultToolkit().getScreenSize(); Dimension frameSize = Apcard.getSize(); 145 if (frameSize.height > screenSize.height) frameSize.height = screenSize.height; if (frameSize.width > screenSize.width) frameSize.width = screenSize.width; Apcard.setLocation(((screenSize.width - frameSize.width) / 2)-150, ((screenSize.height - frameSize.height) / 2)-150); Apcard.setSize(600,300); Apcard.setTitle("Java Card in University"); Apcard.setDefaultLookAndFeelDecorated(true); Apcard.setVisible(true); } } 146 Αρχείο ApplicationJFrame.java /* * ApplicationJFrame.java * * Created on 24 Νοέμβριος 2007, 7:01 μμ */ package new_diploma; import com.mysql.jdbc.Connection; import java.awt.event.WindowAdapter; import java.awt.event.WindowEvent; import java.io.IOException; import java.sql.ResultSet; import java.sql.SQLException; import javax.smartcardio.*; import javax.swing.*; /** * * @author GEORGE VERANIS * A.M. MIS2706 */ public class ApplicationJFrame extends JFrame { private static ProxyCard PX; private static Card univCard; private static CardChannel channel; private MyDBConnection mdbc; private java.sql.Statement stmt; /** Creates new form ApplicationJFrame */

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

202

public ApplicationJFrame(){ PX = new ProxyCard(); initComponents(); FrameInit(); } private void FrameInit() { jButton2.setEnabled(false); jButton3.setEnabled(false); jPasswordField1.setText(""); jPasswordField1.setEnabled(false); jComboBox1.setEnabled(false); jComboBox2.setEnabled(false); 147 jTextField4.setEnabled(false); } /** This method is called from within the constructor to * initialize the form. * WARNING: Do NOT modify this code. The content of this method is * always regenerated by the Form Editor. */ // <editor-fold defaultstate="collapsed" desc=" Generated Code "> private void initComponents() { jPanel1 = new javax.swing.JPanel(); jTabbedPane1 = new javax.swing.JTabbedPane(); jPanel7 = new javax.swing.JPanel(); jButton1 = new javax.swing.JButton(); jLabel2 = new javax.swing.JLabel(); jButton2 = new javax.swing.JButton(); jPanel2 = new javax.swing.JPanel(); jLabel3 = new javax.swing.JLabel(); jLabel4 = new javax.swing.JLabel(); jTextField1 = new javax.swing.JTextField(); jTextField2 = new javax.swing.JTextField(); jLabel5 = new javax.swing.JLabel(); jTextField3 = new javax.swing.JTextField(); jLabel1 = new javax.swing.JLabel(); jPasswordField1 = new javax.swing.JPasswordField(); jButton3 = new javax.swing.JButton(); jLabel6 = new javax.swing.JLabel(); jPanel3 = new javax.swing.JPanel(); jButton4 = new javax.swing.JButton(); jTextField4 = new javax.swing.JTextField(); jButton5 = new javax.swing.JButton(); jLabel7 = new javax.swing.JLabel(); jLabel8 = new javax.swing.JLabel(); jLabel9 = new javax.swing.JLabel(); jComboBox1 = new javax.swing.JComboBox();

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

203

jPanel5 = new javax.swing.JPanel(); jLabel10 = new javax.swing.JLabel(); jLabel11 = new javax.swing.JLabel(); jScrollPane1 = new javax.swing.JScrollPane(); jTextArea1 = new javax.swing.JTextArea(); jComboBox2 = new javax.swing.JComboBox(); jButton6 = new javax.swing.JButton(); setDefaultCloseOperation(javax.swing.WindowConstants.EXIT_ON_CLOSE); addWindowListener(new java.awt.event.WindowAdapter() { public void windowClosing(java.awt.event.WindowEvent evt) { formWindowClosing(evt); } }); 148 jButton1.setText("Connect"); jButton1.addActionListener(new java.awt.event.ActionListener() { public void actionPerformed(java.awt.event.ActionEvent evt) { jButton1Connect_card(evt); } }); jLabel2.setText("\u039a\u03b1\u03bb\u03ce\u03c2 \u03ae\u03c1\u03b8\u03b1\u03c4\u03b5 \u03c3\u03c4\u03b9\u03c2 \u03ad\u03be\u03c5\u03c0\u03bd\u03b5\u03c2 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03c4\u03bf\u03c5 \ u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03af\u03bf\ u03 c5"); jButton2.setText("Disconnect"); jButton2.addActionListener(new java.awt.event.ActionListener() { public void actionPerformed(java.awt.event.ActionEvent evt) { jButton2Disconnect_card(evt); } }); javax.swing.GroupLayout jPanel7Layout = new javax.swing.GroupLayout(jPanel7); jPanel7.setLayout(jPanel7Layout); jPanel7Layout.setHorizontalGroup( jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel7Layout.createSequentialGroup() . addGroup(jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) .addGroup(jPanel7Layout.createSequentialGroup() .addGap(88, 88, 88) .addComponent(jButton1)

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

204

.addGap(62, 62, 62) .addComponent(jButton2)) .addGroup(jPanel7Layout.createSequentialGroup() .addGap(57, 57, 57) .addComponent(jLabel2, javax.swing.GroupLayout.PREFERRED_SIZE, 329, javax.swing.GroupLayout.PREFERRED_SIZE))) .addContainerGap(121, Short.MAX_VALUE)) ); jPanel7Layout.setVerticalGroup( jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel7Layout.createSequentialGroup() .addContainerGap() .addComponent(jLabel2, javax.swing.GroupLayout.PREFERRED_SIZE, 59, javax.swing.GroupLayout.PREFERRED_SIZE) 149 .addGap(35, 35, 35) . addGroup(jPanel7Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jButton1) .addComponent(jButton2)) .addContainerGap(39, Short.MAX_VALUE)) ); jTabbedPane1.addTab("\u03a3\u03cd\u03bd\u03b4\u03b5\u03c3\u03b7", jPanel7); jPanel2.setEnabled(false); jLabel3.setText("\u038c\u03bd\u03bf\u03bc\u03b1:"); jLabel4.setText("\u0395\u03c0\u03ce\u03bd\u03c5\u03bc\u03bf:"); jTextField1.setEnabled(false); jTextField2.setEnabled(false); jLabel5.setText("\u03a5\u03c0\u03cc\u03bb\u03bf\u03b9\u03c0\u03bf \u03ba\u03ac\u03c1\u03c4\u03b1\u03c2:"); jTextField3.setEnabled(false); jLabel1.setText("\u0395\u03b9\u03c3\u03b1\u03b3\u03c9\u03b3\u03ae \u039a\u03c9\u03b4\u03b9\u03ba\u03bf\u03cd :"); jLabel1.setToolTipText("\u0395\u03b4\u03ce \u03b5\u03b9\u03c3\u03ac\u03b3\u03b5\u03c4\u03b5 \u03c4\u03bf\u03bd \u03ba\u03c9\u03b4\u03b9\u03ba\u03cc \u03c4\u03b7\u03c2 \u03ba\u03ac\u03c1\u03c4\u03b1\u03c2 \u03c3\u03b1\u03c2"); jButton3.setText("Validate"); jButton3.addActionListener(new java.awt.event.ActionListener() { public void actionPerformed(java.awt.event.ActionEvent evt) { Validate_pin(evt); } });

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

205

jLabel6.setText("\u20ac"); javax.swing.GroupLayout jPanel2Layout = new javax.swing.GroupLayout(jPanel2); jPanel2.setLayout(jPanel2Layout); jPanel2Layout.setHorizontalGroup( jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel2Layout.createSequentialGroup() .addGap(46, 46, 46) 150 . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) .addComponent(jLabel4) .addComponent(jLabel5) .addComponent(jLabel3) .addComponent(jLabel1, javax.swing.GroupLayout.PREFERRED_SIZE, 131, javax.swing.GroupLayout.PREFERRED_SIZE)) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. TRAILING, false) .addGroup(jPanel2Layout.createSequentialGroup() .addGap(4, 4, 4) .addComponent(jPasswordField1)) .addComponent(jTextField1, javax.swing.GroupLayout.Alignment.LEADING, javax.swing.GroupLayout.DEFAULT_SIZE, 94, Short.MAX_VALUE)) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. TRAILING, false) .addComponent(jTextField2, javax.swing.GroupLayout.Alignment.LEADING) .addComponent(jTextField3, javax.swing.GroupLayout.Alignment.LEADING, javax.swing.GroupLayout.DEFAULT_SIZE, 93, Short.MAX_VALUE))) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) .addGroup(jPanel2Layout.createSequentialGroup() .addGap(22, 22, 22)

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

206

.addComponent(jButton3)) .addGroup(jPanel2Layout.createSequentialGroup() .addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED) .addComponent(jLabel6))) .addGap(143, 143, 143)) ); jPanel2Layout.setVerticalGroup( jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel2Layout.createSequentialGroup() .addGap(19, 19, 19) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jLabel1, javax.swing.GroupLayout.PREFERRED_SIZE, 25, javax.swing.GroupLayout.PREFERRED_SIZE) 151 .addComponent(jPasswordField1, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE) .addComponent(jButton3)) .addGap(17, 17, 17) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jLabel3) .addComponent(jTextField1, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE)) .addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jLabel4) .addComponent(jTextField2, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE)) .addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED) . addGroup(jPanel2Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE)

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

207

.addComponent(jTextField3, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE) .addComponent(jLabel5) .addComponent(jLabel6)) .addGap(53, 53, 53)) ); jTabbedPane1.addTab("\u039a\u03b1\u03c1\u03c4\u03ad\u03bb\u03b1 \u039a\u03b1\u03c4\u03cc\u03c7\u03bf\u03c5", jPanel2); jPanel3.setEnabled(false); jButton4.setText("BUY"); jButton4.addActionListener(new java.awt.event.ActionListener() { public void actionPerformed(java.awt.event.ActionEvent evt) { Debitcardbt(evt); } }); jButton5.setText("Credit"); jButton5.addActionListener(new java.awt.event.ActionListener() { 152 public void actionPerformed(java.awt.event.ActionEvent evt) { CreditCardBt(evt); } }); jLabel7.setText("\u03a5\u03c0\u03cc\u03bb\u03bf\u03b9\u03c0\u03bf \u03ba\u03ac\u03c1\u03c4\u03b1\u03c2:"); jLabel8.setText(" "); jLabel9.setText("\u20ac"); jComboBox1.setMaximumRowCount(4); jComboBox1.setModel(new javax.swing.DefaultComboBoxModel(new String[] { "Please select", "coffee", "Drink", "Meal A", "Meal B", "Tee", "Tickets 5", "Tickets 10", "Tickets 20", "Fine Library" })); javax.swing.GroupLayout jPanel3Layout = new javax.swing.GroupLayout(jPanel3); jPanel3.setLayout(jPanel3Layout); jPanel3Layout.setHorizontalGroup( jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel3Layout.createSequentialGroup() .addGap(28, 28, 28) . addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING, false) .addComponent(jLabel7, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE) .addComponent(jTextField4) .addComponent(jComboBox1,

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

208

javax.swing.GroupLayout.PREFERRED_SIZE, 108, javax.swing.GroupLayout.PREFERRED_SIZE)) .addGap(18, 18, 18) . addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) .addComponent(jButton4, javax.swing.GroupLayout.DEFAULT_SIZE, 61, Short.MAX_VALUE) .addComponent(jButton5, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE) .addGroup(javax.swing.GroupLayout.Alignment.TRAILING, jPanel3Layout.createSequentialGroup() .addComponent(jLabel8, javax.swing.GroupLayout.DEFAULT_SIZE, 40, Short.MAX_VALUE) .addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED) 153 .addComponent(jLabel9, javax.swing.GroupLayout.PREFERRED_SIZE, 15, javax.swing.GroupLayout.PREFERRED_SIZE))) .addGap(292, 292, 292)) ); jPanel3Layout.setVerticalGroup( jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel3Layout.createSequentialGroup() .addContainerGap() . addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jButton4) .addComponent(jComboBox1, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE)) .addGap(34, 34, 34) . addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jLabel7) .addComponent(jLabel9) .addComponent(jLabel8)) .addGap(41, 41, 41) . addGroup(jPanel3Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

209

BASELINE) .addComponent(jButton5) .addComponent(jTextField4, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE)) .addContainerGap(21, Short.MAX_VALUE)) ); jTabbedPane1.addTab("\u039f\u03b9\u03ba\u03bf\u03bd\u03bf\u03bc\u03b9\u0 3ba\ u03ac", jPanel3); jPanel5.setEnabled(false); jLabel10.setText("ID :"); jTextArea1.setColumns(20); jTextArea1.setRows(5); jScrollPane1.setViewportView(jTextArea1); jComboBox2.setModel(new javax.swing.DefaultComboBoxModel(new String[] { "Please choose", "\u0394\u0391\u03a0", "\u03a0\u0391\u03a3\u03a0", "\u03a0\u039a\u03a3", "\u0395\u0391\u039a\u039a" })); 154 jButton6.setText("Vote"); jButton6.addActionListener(new java.awt.event.ActionListener() { public void actionPerformed(java.awt.event.ActionEvent evt) { VoteBt(evt); } }); javax.swing.GroupLayout jPanel5Layout = new javax.swing.GroupLayout(jPanel5); jPanel5.setLayout(jPanel5Layout); jPanel5Layout.setHorizontalGroup( jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel5Layout.createSequentialGroup() .addContainerGap() . addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) .addGroup(jPanel5Layout.createSequentialGroup() .addComponent(jLabel10) .addGap(15, 15, 15) .addComponent(jLabel11)) .addComponent(jScrollPane1, javax.swing.GroupLayout.PREFERRED_SIZE, 156, javax.swing.GroupLayout.PREFERRED_SIZE)) . addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

210

LEADING) .addGroup(jPanel5Layout.createSequentialGroup() .addGap(36, 36, 36) .addComponent(jComboBox2, javax.swing.GroupLayout.PREFERRED_SIZE, 118, javax.swing.GroupLayout.PREFERRED_SIZE)) .addGroup(jPanel5Layout.createSequentialGroup() .addGap(64, 64, 64) .addComponent(jButton6))) .addContainerGap(187, Short.MAX_VALUE)) ); jPanel5Layout.setVerticalGroup( jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel5Layout.createSequentialGroup() .addContainerGap() . addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. BASELINE) .addComponent(jLabel10) .addComponent(jLabel11) 155 .addComponent(jComboBox2, javax.swing.GroupLayout.PREFERRED_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.PREFERRED_SIZE)) . addGroup(jPanel5Layout.createParallelGroup(javax.swing.GroupLayout.Alignme nt. LEADING) .addGroup(jPanel5Layout.createSequentialGroup() .addPreferredGap(javax.swing.LayoutStyle.ComponentPlacement.RELATED) .addComponent(jScrollPane1, javax.swing.GroupLayout.PREFERRED_SIZE, 98, javax.swing.GroupLayout.PREFERRED_SIZE)) .addGroup(jPanel5Layout.createSequentialGroup() .addGap(30, 30, 30) .addComponent(jButton6))) .addGap(23, 23, 23)) ); jTabbedPane1.addTab("\u03a8\u03b7\u03c6\u03bf\u03c6\u03bf\u03c1\u03af\u0 3b1", jPanel5); javax.swing.GroupLayout jPanel1Layout = new javax.swing.GroupLayout(jPanel1); jPanel1.setLayout(jPanel1Layout); jPanel1Layout.setHorizontalGroup(

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

211

jPanel1Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel1Layout.createSequentialGroup() .addComponent(jTabbedPane1, javax.swing.GroupLayout.DEFAULT_SIZE, 512, Short.MAX_VALUE) .addGap(18, 18, 18)) ); jPanel1Layout.setVerticalGroup( jPanel1Layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADIN G) .addGroup(jPanel1Layout.createSequentialGroup() .addComponent(jTabbedPane1, javax.swing.GroupLayout.PREFERRED_SIZE, 195, javax.swing.GroupLayout.PREFERRED_SIZE) .addContainerGap(javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE)) ); javax.swing.GroupLayout layout = new javax.swing.GroupLayout(getContentPane()); getContentPane().setLayout(layout); layout.setHorizontalGroup( layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADING) .addGroup(layout.createSequentialGroup() 156 .addComponent(jPanel1, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE) .addContainerGap()) ); layout.setVerticalGroup( layout.createParallelGroup(javax.swing.GroupLayout.Alignment.LEADING) .addGroup(layout.createSequentialGroup() .addComponent(jPanel1, javax.swing.GroupLayout.DEFAULT_SIZE, javax.swing.GroupLayout.DEFAULT_SIZE, Short.MAX_VALUE) .addContainerGap()) ); pack(); }// </editor-fold> private void formWindowClosing(java.awt.event.WindowEvent evt) { try { // TODO add your handling code here:When Window closing disconnect the card PX.disconnect_card(); }catch (Exception ex) { JOptionPane.showMessageDialog(this, ex.getMessage(), "Warning", JOptionPane.WARNING_MESSAGE); } finally { System.exit(0);

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

212

} } private void jButton1Connect_card(java.awt.event.ActionEvent evt) { // TODO add your handling code here: try to connect with the card try{ byte[] AID = { (byte)0xa0, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x62, (byte)0x07, (byte)0x01, (byte)0x0C, (byte)0x02, (byte)0x01 }; PX.connect_card(); PX.selectAID(AID); jButton1.setEnabled(false); jButton2.setEnabled(true); jButton3.setEnabled(true); jPasswordField1.setEnabled(true); this.setTitle("Java Card in University -- Connected"); } catch(Exception ex) { JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning", JOptionPane.WARNING_MESSAGE); 157 } } private void jButton2Disconnect_card(java.awt.event.ActionEvent evt) { // TODO add your handling code here: onClick disconnect from the card // disconnect try{ PX.disconnect_card(); jButton1.setEnabled(true); jButton2.setEnabled(false); jButton3.setEnabled(false); jPasswordField1.setText(""); jPasswordField1.setEnabled(false); jTextField1.setText(""); jTextField2.setText(""); jTextField3.setText(""); jTextField4.setText(""); jLabel8.setText(""); jComboBox1.setSelectedIndex(0); jComboBox1.setEnabled(false); jComboBox2.setSelectedIndex(0); jComboBox2.setEnabled(false); jLabel11.setText(""); jTextArea1.setText(""); this.setTitle("Java Card in University -- Disconnected"); } catch(Exception ex) { JOptionPane.showMessageDialog(this,

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

213

ex.getMessage(), "Warning", JOptionPane.WARNING_MESSAGE); } } private void Validate_pin(java.awt.event.ActionEvent evt) { // TODO add your handling code here: Verify if the pin is correct. if the pin is correct then show the Name, the Lastname and give the //balance . If pin is not correct then inform how many tries you have before lock the card and prompt you to validate your card. try{ char[] Password = jPasswordField1.getPassword(); if(PX.verify_pin(Password)) { this.setTitle("Java Card in University -- Authentication Succeed"); String balanced = PX.getBalance(); if(balanced!=null){ jTextField3.setText(String.valueOf(hex2decimal(balanced))); jLabel8.setText(String.valueOf(hex2decimal(balanced))); 158 jComboBox1.setEnabled(true); } String name = convertToUnicodeString(PX.getName()); if(name!=null) jTextField1.setText(name); String lastname = convertToUnicodeString(PX.getLastName()); if(name!=null) jTextField2.setText(lastname); String id_student=convertToUnicodeString(PX.getID()); if(id_student!=null){ jLabel11.setText(id_student); } jComboBox2.setEnabled(true); jTextField4.setEnabled(true); }//end if else { this.setTitle("Java Card in University -- Authentication Failed"); return; } } catch(Exception ex) { JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning", JOptionPane.WARNING_MESSAGE); } } private void Debitcardbt(java.awt.event.ActionEvent evt) { // TODO add your handling code here: debit money from the card mdbc=new MyDBConnection(); try { mdbc.init(); } catch (ClassNotFoundException ex) {

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

214

ex.printStackTrace(); } catch (SQLException ex) { ex.printStackTrace(); } try { int deb = mdbc.populateBuyList(jComboBox1.getSelectedIndex()); String str = new Integer(deb).toString(); try { PX.debitcard(str); String balanced = PX.getBalance(); if(balanced!=null){ jTextField3.setText(String.valueOf(hex2decimal(balanced))); jLabel8.setText(String.valueOf(hex2decimal(balanced))); } } catch(Exception ex ) { 159 JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning", JOptionPane.WARNING_MESSAGE); } } catch (SQLException ex) { ex.printStackTrace(); } mdbc.destroy(); } private void CreditCardBt(java.awt.event.ActionEvent evt) { // TODO add your handling code here: add money to the card. Maximum transaction 127 € try{ PX.creditcard(jTextField4.getText()); String balanced = PX.getBalance(); if(balanced!=null){ jTextField3.setText(String.valueOf(hex2decimal(balanced))); jLabel8.setText(String.valueOf(hex2decimal(balanced))); jTextField4.setText(""); } } catch(Exception ex ) { JOptionPane.showMessageDialog(this, ex.getMessage(),"Warning", JOptionPane.WARNING_MESSAGE); } } private void VoteBt(java.awt.event.ActionEvent evt) { // TODO add your handling code here:The student vote mdbc=new MyDBConnection(); try { mdbc.init(); } catch (ClassNotFoundException ex) { ex.printStackTrace();

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

215

} catch (SQLException ex) { ex.printStackTrace(); } try { String voting = mdbc.Studentvote(jLabel11.getText(), jComboBox2.getSelectedIndex()); try { jTextArea1.setText(voting); } catch (IllegalStateException ex) { ex.printStackTrace(); } catch (IllegalArgumentException ex) { 160 ex.printStackTrace(); } } catch (SQLException ex) { ex.printStackTrace(); } mdbc.destroy(); } public static int hex2decimal(String s) { String digits = "0123456789ABCDEF"; s = s.toUpperCase(); int val = 0; for (int i = 0; i <s.length(); i++) { char c = s.charAt(i); int d = digits.indexOf(c); val = 16*val + d; } return val; } public static String convertToUnicodeString(String hexString) { StringBuffer output = new StringBuffer(); String subStr = null; for (int i =0 ; i < hexString.length() ;i=i+2 ) { subStr = hexString.substring(i,i+2); char c = (char) Integer.parseInt(subStr, 16); output.append(c); } return output.toString(); } /** * @param args the command line arguments */ public static void main(String args[]) { java.awt.EventQueue.invokeLater(new Runnable() {

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

216

public void run() { new ApplicationJFrame().setVisible(true); } }); } private ResultSet getResultFromProducts() { return null; } // Variables declaration - do not modify private javax.swing.JButton jButton1; 161 private javax.swing.JButton jButton2; private javax.swing.JButton jButton3; private javax.swing.JButton jButton4; private javax.swing.JButton jButton5; private javax.swing.JButton jButton6; private javax.swing.JComboBox jComboBox1; private javax.swing.JComboBox jComboBox2; private javax.swing.JLabel jLabel1; private javax.swing.JLabel jLabel10; private javax.swing.JLabel jLabel11; private javax.swing.JLabel jLabel2; private javax.swing.JLabel jLabel3; private javax.swing.JLabel jLabel4; private javax.swing.JLabel jLabel5; private javax.swing.JLabel jLabel6; private javax.swing.JLabel jLabel7; private javax.swing.JLabel jLabel8; private javax.swing.JLabel jLabel9; private javax.swing.JPanel jPanel1; private javax.swing.JPanel jPanel2; private javax.swing.JPanel jPanel3; private javax.swing.JPanel jPanel5; private javax.swing.JPanel jPanel7; private javax.swing.JPasswordField jPasswordField1; private javax.swing.JScrollPane jScrollPane1; private javax.swing.JTabbedPane jTabbedPane1; private javax.swing.JTextArea jTextArea1; private javax.swing.JTextField jTextField1; private javax.swing.JTextField jTextField2; private javax.swing.JTextField jTextField3; private javax.swing.JTextField jTextField4; // End of variables declaration } 162 Αρχείο ProxyCard.java /* * ProxyCard.java

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

217

* * Created on 24 Νοέμβριος 2007, 12:06 μμ * * To change this template, choose Tools | Template Manager * and open the template in the editor. */ package new_diploma; import javax.smartcardio.*; import java.util.List; import javax.swing.*; import java.io.IOException; import org.dyndns.widerstand.OpenPlatform.*; import java.lang.*; import java.io.PrintStream; /** * * @author GEORGE VERANIS * A.M. MIS2706 */ public class ProxyCard { private static Card univCard; private static CardChannel channel; final static int SW_OK = 36864; //9000 final static int SW_FALSE = 6999; final static byte CLA = ( byte )0xB0; //CLA final static byte GET_STID = ( byte )0x01; // INS final static byte GET_NAME = ( byte )0x02; //INS final static byte GET_LASTNAME = (byte)0x03; //INS final static byte VERIFY = (byte)0x04; //INS for pin verify final static byte CREDIT = (byte) 0x05; //INS final static byte DEBIT = (byte) 0x06; //INS final static byte GET_BALANCE = (byte) 0x07; //INS final static byte P1 = (byte) 0x00; final static byte P2 = (byte) 0x00; final static byte Ne = (byte) 0x02; // FOR BALANCE final static byte MAX_ID_SIZE = ( byte )0x07; final static byte MAX_NAME = ( byte )0x06; final static byte MAX_LASTNAME= ( byte )0x07; 163 /** Creates a new instance of ProxyCard */ public ProxyCard() { try { ProxyInit(); } catch (Exception ex) { ex.printStackTrace(); } } public void connect_card() throws IOException

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

218

{ TerminalFactory factory = TerminalFactory.getDefault(); try{ List<CardTerminal> terminals = factory.terminals().list(); // get the first terminal CardTerminal terminal = terminals.get(0); // establish a connection with the card univCard = terminal.connect("T=0"); channel = univCard.getBasicChannel(); } catch(CardException ex) { throw new IOException("Connection failed"); } } public void selectAID(byte[] appletAID) throws IllegalArgumentException, IOException, IllegalStateException { byte appLength = (byte)(appletAID.length & 0xFF); try{ byte[] c1 = {(byte)0x00, (byte)0xA4, (byte)0x04, (byte)0x00, (byte)appLength, (byte)0xa0, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x62, (byte)0x07, (byte)0x01, (byte)0x0C, (byte)0x02, (byte)0x01}; ResponseAPDU r = channel.transmit(new CommandAPDU(c1)); int status = r.getSW(); switch(status) { case 36864: return; default: throw new IllegalArgumentException("Applet not found"); 164 } }catch(CardException ex){ throw new IOException("Connection failed"); } } public static byte[] toBinArray( String hexStr ){ byte bArray[] = new byte[hexStr.length()/2]; for(int i=0; i<(hexStr.length()/2); i++){ byte firstNibble = Byte.parseByte(hexStr.substring(2*i,2*i+1),16); // [x,y) byte secondNibble = Byte.parseByte(hexStr.substring(2*i+1,2*i+2),16); int finalByte = (secondNibble) | (firstNibble << 4 ); // bit-operations only with numbers, not bytes.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

219

bArray[i] = (byte) finalByte; } return bArray; } public boolean verify_pin(char[] PIN) throws IllegalArgumentException, IOException, IllegalStateException { byte[] PINBytes = String.valueOf(PIN).getBytes(); byte pinLength = (byte)(PINBytes.length & 0xFF); try { ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,VERIFY,P1,P2,PINBytes)); int status = r.getSW(); switch(status) { case 36864: return true; case 25344: throw new IllegalArgumentException("PIN is invalid"); default: return false; }//end switch } // end try catch(CardException ex) { 165 throw new IOException("PIN verification has failed"); }//end catch } public String getBalance() throws IllegalArgumentException, IOException,IllegalStateException { try { ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,GET_BALANCE,P1,P2,Ne)); int status = r.getSW(); String balance = OPSPUtil.toHexString2(r.getData()); switch(status) { case 36864: return balance; default: throw new IllegalArgumentException("Error in getBalance"+status); } }

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

220

catch(CardException ex) { throw new IOException("Method GetBalance Failed"); } } public String getName() throws IllegalArgumentException, IOException,IllegalStateException { try { ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,GET_NAME,P1,P2,MAX_NAME)); int status = r.getSW(); String balance = OPSPUtil.toHexString2(r.getData()); switch(status) { case 36864: return balance; default: throw new IllegalArgumentException("Error in getName"+status); } 166 } catch(CardException ex) { throw new IOException("Method getName Failed"); } } public String getID() throws IllegalArgumentException, IOException,IllegalStateException { try { ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,GET_STID,P1,P2,MAX_ID_SIZE)); int status = r.getSW(); String id = OPSPUtil.toHexString2(r.getData()); switch(status) { case 36864: return id; default: throw new IllegalArgumentException("Error in getID"+status); } } catch(CardException ex) { throw new IOException("Method getName Failed");

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

221

} } public String getLastName() throws IllegalArgumentException, IOException,IllegalStateException { try { ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,GET_LASTNAME,P1,P2,MAX_LASTNAME)); int status = r.getSW(); String balance = OPSPUtil.toHexString2(r.getData()); switch(status) { case 36864: return balance; 167 default: throw new IllegalArgumentException("Error in getLastName"+status); } } catch(CardException ex) { throw new IOException("Method getLastName Failed"); } } public void creditcard(String s) throws IllegalArgumentException, IOException,IllegalStateException { try { short amountShort = Short.parseShort(s); byte[] amountBytes = new byte[1]; amountBytes[0] = (byte)(amountShort & 0xFF); int AmountByteLength = (int)amountBytes.length; ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,CREDIT,P1,P2,amountBytes)); int status = r.getSW(); switch(status) { case 36864: return; case 27267: throw new IllegalArgumentException("You cannot credit the card more than 127 € per time"); default: throw new IllegalArgumentException("Error in debit money "+status); } }

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

222

catch(CardException ex) { throw new IOException("Method Debit Card Failed"); } } public void debitcard(String s) throws IllegalArgumentException, IOException,IllegalStateException { try 168 { short amountShort = Short.parseShort(s); byte[] amountBytes = new byte[1]; amountBytes[0] = (byte)(amountShort & 0xFF); int AmountByteLength = (int)amountBytes.length; ResponseAPDU r = channel.transmit(new CommandAPDU(CLA,DEBIT,P1,P2,amountBytes)); int status = r.getSW(); switch(status) { case 36864: return; case 27269: throw new IllegalArgumentException("You don't have enough money in your card to buy this"); case 25345: throw new IllegalStateException("You don't enter your password, you are not a validated person"); default: throw new IllegalArgumentException("Error in debit money "+status); } } catch(CardException ex) { throw new IOException("Method Debit Card Failed"); } } public void disconnect_card() throws IOException { try{ univCard.disconnect(false); } catch(CardException e) { throw new IOException("Cannot Disconnect!"); } } public static void main(String[] args) {

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

223

ProxyCard proxycard = new ProxyCard(); } private void ProxyInit() throws Exception { } } 169 Αρχείο MyDBConnection.java /* * MyDBConnection.java * * Created on 30 Νοέμβριος 2007, 11:01 μμ * * To change this template, choose Tools | Template Manager * and open the template in the editor. */ package new_diploma; import java.sql.*; /** * * @author GEORGE VERANIS * A.M. MIS2706 */ public class MyDBConnection { private Connection myConnection; /** Creates a new instance of MyDBConnection */ public MyDBConnection() { } public static void main(String[] args) { MyDBConnection myConnection = new MyDBConnection(); } public void init() throws SQLException , ClassNotFoundException { try{ Class.forName("com.mysql.jdbc.Driver"); myConnection=DriverManager.getConnection("jdbc:mysql://localhost/MyNewDat ab ase","root", "root"); } catch(SQLException e){ throw new SQLException("Failed to connect " + e.getMessage()); } catch(ClassNotFoundException ce) { throw new ClassNotFoundException("Failed to find class " + ce.getMessage()); } 170 } public Connection getMyConnection(){ return myConnection;

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

224

} public void close(ResultSet rs){ if(rs !=null){ try{ rs.close(); } catch(Exception e){} } } public void close(java.sql.Statement stmt){ if(stmt !=null){ try{ stmt.close(); } catch(Exception e){} } } public void destroy(){ if(myConnection !=null){ try{ myConnection.close(); } catch(Exception e){} } } public String Studentvote(String id,int p) throws SQLException { String response=null; int sqlflag=0; int addvote=0; String datevote = null; String timevote =null; 171 Statement stmt = null; ResultSet rset = null; if(myConnection == null) return response; if(p==0) return response="You don't enter your Password"; try { // Create a Statement object stmt = myConnection.createStatement(); // Retrieve the department id and name rset = stmt.executeQuery("SELECT datevoting,timevoting,flagvoting FROM voting WHERE id_student='"+id+"'"); // Add the department id to a string array and department name to Combo Box while (rset.next()) { sqlflag = rset.getInt("flagvoting"); datevote = rset.getString("datevoting"); timevote = rset.getString("timevoting"); }

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

225

if(sqlflag==0) { //Leave the student to vote rset = stmt.executeQuery("SELECT countvotes FROM party WHERE id_party="+p); while (rset.next()) { addvote = rset.getInt("countvotes"); } addvote = addvote+1; stmt.executeUpdate("UPDATE party SET countvotes="+ addvote +" WHERE id_party="+p); response="Your vote has submitted \n successfully"; String sql = "UPDATE voting SET flagvoting=1, datevoting=CURDATE() , timevoting=CURTIME() WHERE id_student='"+id+"'"; stmt.executeUpdate(sql); response = response.concat(" \n You cannot vote until next year"); } else if(sqlflag==1) { //The student has already voted! response = "You have already voted \n at " + datevote+ " on "+timevote+"."; } // Close ResultSet and Statement objects rset.close(); stmt.close(); return response; } catch (SQLException sqlEx) { // Handle SQL Errors 172 throw new SQLException(" Error in procedure of voting : " + sqlEx.getMessage()); } } public int populateBuyList(int s) throws SQLException { int setret = 0; // Connect to database // myConnection.init(); Statement stmt = null; ResultSet rset = null; if(myConnection == null) return setret; try { // Create a Statement object stmt = myConnection.createStatement(); // Retrieve the department id and name rset = stmt.executeQuery("SELECT `value` FROM products WHERE id_product="+s); // Add the department id to a string array and department name to Combo Box while (rset.next()) { setret = rset.getInt("value"); } // Close ResultSet and Statement objects

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

226

rset.close(); stmt.close(); return setret; } catch (SQLException sqlEx) { // Handle SQL Errors throw new SQLException(" Error populating Product details : " + sqlEx.getMessage()); } } } 173 Αρχείο OPSPUtil.java (βρίσκεται μέσα στο package org.dyndns.widerstand.OpenPlatform ) /* * Util.java * * Created on 7. Februar 2005, 01:09 */ package org.dyndns.widerstand.OpenPlatform; import java.io.*; /** * Some helper functions. * @author Karsten Ohme */ public class OPSPUtil { /** * The symbols for the hex digits. */ private static final char[] HEX_DIGITS = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' }; /** Creates a new instance of Util */ private OPSPUtil() { } /** * Parses a hex string into a byte array. * @param hex The hex string. * @return The byte array presentation of the hex string. */ public static byte[] bytesFromHexString(String hex) throws NumberFormatException { if (hex.length() == 0) return null; // String myhex = hex + " "; String myhex = hex; int len = myhex.length(); if ((len % 2) != 0) throw new NumberFormatException(); byte[] buf = new byte[len / 2]; int i = 0, j = 0;

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

227

while (i < len) { try { buf[j++] = (byte) ((fromDigit(myhex.charAt(i++)) << 4) | fromDigit(myhex.charAt(i++))); } catch (IllegalArgumentException e) { 174 throw new NumberFormatException(); } // if (myhex.charAt(i++) != ' ') throw new NumberFormatException(); } return buf; } /** * Returns the value of the hex character. * @param ch The hex character * @return The value of the hex character. */ private static int fromDigit(char ch) { if (ch >= '0' && ch <= '9') return ch - '0'; if (ch >= 'A' && ch <= 'F') return ch - 'A' + 10; if (ch >= 'a' && ch <= 'f') return ch - 'a' + 10; throw new IllegalArgumentException("invalid hex digit '" + ch + "'"); } /** * Returns a hex string representing the byte array. * @param ba The byte array to hexify. * @return The hex string. */ public static String toHexString( byte[] ba ) { int length = ba.length; char[] buf = new char[length * 3]; for (int i = 0, j = 0, k; i < length; ) { k = ba[i++]; buf[j++] = HEX_DIGITS[(k >> 4) & 0x0F]; buf[j++] = HEX_DIGITS[ k & 0x0F]; // buf[j++] = ' '; } //return new String(buf, 0, buf.length-1); return new String(buf, 0, buf.length-2); } //My method George Veranis public static String toHexString2 ( byte[] b ) { StringBuffer sb = new StringBuffer( b.length * 2 ); for ( int i=0; i<b.length; i++ )

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

228

{ // look up high nibble char sb.append( HEX_DIGITS [( b[i] & 0xf0 ) >>> 4] ); 175 // look up low nibble char sb.append( HEX_DIGITS [b[i] & 0x0f] ); } return sb.toString(); } //My method George Veranis public static String displayHexString ( String s ) { StringBuilder sb = new StringBuilder( s.length() * 5 - 1 ); for ( int i=0; i<s.length(); i++ ) { char c = s.charAt(i); if ( i != 0 ) { sb.append( '_' ); } // encode 16 bits as four nibbles sb.append( HEX_DIGITS [ c >>> 12 & 0xf ] ); sb.append( HEX_DIGITS [ c >>> 8 & 0xf ] ); sb.append( HEX_DIGITS [ c >>> 4 & 0xf ] ); sb.append( HEX_DIGITS[ c & 0xf ] ); } return sb.toString(); } /** * Saves a Load File Data Block DAP. * @param file The file to save. * @param dapBlock The OPSPDAPBlock to be saved. */ public static void saveDAP(File file, OPSPDAPBlock dapBlock) throws IOException { BufferedOutputStream out = null; try { out = new BufferedOutputStream(new FileOutputStream(file)); byte securityDomain[] = dapBlock.getSecurityDomainAID(); byte signature[] = dapBlock.getSignature(); out.write(securityDomain.length); out.write(securityDomain); out.write(signature.length); out.write(signature); } catch (IOException e) { throw e; } finally { if (out != null) {

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

229

out.close(); } } } 176 /** * Saves a Load or Install Token. * @param file The file to save. * @param token The token to be saved. */ public static void saveToken(File file, byte[] token) throws IOException { BufferedOutputStream out = null; try { out = new BufferedOutputStream(new FileOutputStream(file)); out.write(token); } catch (IOException e) { throw e; } finally { if (out != null) { out.close(); } } } /** * Loads a Load or Install Token. * @param fileName The file name of the token to load. * @return The loaded token. */ public static byte[] loadToken(String fileName) throws IOException { File file = new File(fileName); int size = (int)file.length(); if (size != 128) throw new IOException("Invalid token file format."); BufferedInputStream input = null; byte token[] = null; try { input = new BufferedInputStream(new FileInputStream(file)); token = new byte[size]; input.read(token, 0, size); } catch (IOException e) { throw e; } finally { input.close(); } return token; } /** * Loads a 2 key 3DES key. * @param file The file of the token to load.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

230

* @return The loaded 3DES key. */ public static byte[] load3DES(File file) throws IOException { 177 int size = (int)file.length(); if (size != 16) throw new IOException("Invalid 3DES key file format."); byte key[] = null; BufferedInputStream input = null; try { input = new BufferedInputStream(new FileInputStream(file)); key = new byte[size]; input.read(key, 0, size); } catch (IOException e) { throw e; } finally { if (input != null) { input.close(); } } return key; } /** * Tries to parse a file into a OPSPDAPBlock instance. * @param fileName The file to parse. * @return The OPSPDAPBlock instance. */ public static OPSPDAPBlock loadDAP(String fileName) throws IOException { File file = new File(fileName); BufferedInputStream in = null; byte securityDomain[] = null; byte signature[] = null; try { in = new BufferedInputStream(new FileInputStream(file)); int size = in.read(); if ((size == -1) || (size > 16)) throw new IOException("Invalid DAP file format."); securityDomain = new byte[size]; int read = 0; int tmp = 0; while (read < size) { tmp = in.read(securityDomain, read, size-read); if (tmp == -1) throw new IOException("Invalid DAP file format."); read+=tmp; } size = in.read(); if ((size == -1) || ((size != 128) && (size != 16))) throw new IOException("Invalid DAP file format."); signature = new byte[size];

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

231

read = 0; tmp = 0; while (read < size) { tmp = in.read(signature, read, size-read); if (tmp == -1) throw new IOException("Invalid DAP file format."); 178 read+=tmp; } } catch (IOException e) { throw e; } finally { if (in != null) { in.close(); } } return new OPSPDAPBlock(securityDomain, signature); } /** * Saves a OPSPReceiptData. * @param file The file to save. * @param receiptData The OPSPReceiptData to be saved. */ public static void saveOPSPReceiptData(File file, OPSPReceiptData receiptData) throws IOException { BufferedOutputStream out = null; try { out = new BufferedOutputStream(new FileOutputStream(file)); byte receipt[] = receiptData.getReceipt(); byte confirmationCounter[] = receiptData.getConfirmationCounter(); byte cardUniqueData[] = receiptData.getCardUniqueData(); out.write(receipt.length); out.write(receipt); out.write(confirmationCounter.length); out.write(confirmationCounter); out.write(cardUniqueData.length); out.write(cardUniqueData); } catch (IOException e) { throw e; } finally { if (out != null) { out.close(); } } } /** * Tries to parse a file into a OPSPReceiptData instance. * @param fileName The file to parse. * @return The OPSPReceiptData instance.

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

232

*/ public static OPSPReceiptData loadOPSPReceiptData(String fileName) throws IOException { File file = new File(fileName); BufferedInputStream in = null; byte receipt[] = null; 179 byte confirmationCounter[] = null; byte cardUniqueData[] = null; try { in = new BufferedInputStream(new FileInputStream(file)); int size = in.read(); if ((size == -1) || (size != 8)) throw new IOException("Invalid Receipt Data file format."); receipt = new byte[size]; int read = 0; int tmp = 0; while (read < size) { tmp = in.read(receipt, read, size-read); if (tmp == -1) throw new IOException("Invalid Receipt Data file format."); read+=tmp; } size = in.read(); if ((size == -1) || (size != 2)) throw new IOException("Invalid Receipt Data file format."); confirmationCounter = new byte[size]; read = 0; tmp = 0; while (read < size) { tmp = in.read(confirmationCounter, read, size-read); if (tmp == -1) throw new IOException("Invalid Receipt Data file format."); read+=tmp; } size = in.read(); if ((size == -1) || (size != 10)) throw new IOException("Invalid Receipt Data file format."); confirmationCounter = new byte[size]; read = 0; tmp = 0; while (read < size) { tmp = in.read(cardUniqueData, read, size-read); if (tmp == -1) throw new IOException("Invalid Receipt Data file format."); read+=tmp; } } catch (IOException e) { throw e; } finally { if (in != null) {

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

233

in.close(); } } return new OPSPReceiptData(receipt, confirmationCounter, cardUniqueData); } } 180 Αρχεία περιγραφής δομής πινάκων της βάσης δεδομένων. Για τον πίνακα party CREATE TABLE `party` ( `id_party` int(11) NOT NULL, `title_party` varchar(10) NOT NULL, `countvotes` int(11) NOT NULL default '0', PRIMARY KEY (`id_party`), KEY `party_title_party_idx` (`title_party`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; Για τον πίνακα products CREATE TABLE `products` ( `id_product` int(11) NOT NULL, `title` varchar(30) default NULL, `value` int(11) default NULL, PRIMARY KEY (`id_product`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; Για τον πίνακα voting CREATE TABLE `voting` ( `id_student` varchar(7) NOT NULL, `datevoting` date default NULL, `timevoting` time default NULL, `flagvoting` int(11) default NULL, PRIMARY KEY (`id_student`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; 3εδομένα εφαρμογής Για τον πίνακα party INSERT INTO `party` (`id_party`, `title_party`, `countvotes`) VALUES (1, '9ΑΠ', 0), (2, 'ΠΑΣΠ', 0), (3, 'ΠΚΣ', 0), (4, 'ΕΑΚΚ', 0); Για τον πίνακα products INSERT INTO `products` (`id_product`, `title`, `value`) VALUES (1, 'coffee', 1), (2, 'Drink', 5), (3, 'Meal A', 10), (4, 'Meal B', 15), (5, 'Tee', 2), (6, 'Tickets 5', 1), 181 (7, 'Tickets 10', 2),

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

234

(8, 'Tickets 20', 3), (9, 'Fine Library', 2); Για τον πίνακα voting INSERT INTO `voting` (`id_student`, `datevoting`, `timevoting`, `flagvoting`) VALUES ('MIS0627', NULL, NULL, 0), ('MIS0628', NULL, NULL, 0), ('MIS0629', NULL, NULL, 0), ('MIS0630', NULL, NULL, 0);

SMART CARDS
Table of Contents 1 INTRODUCTION ................................................ ....................................... ........... ........................... 4 1.1 General ............................................... 5 2 Clever Cards ............................................... .................................................. ....... ...... 8 2.1 GENERAL, DEFINITIONS .............................................. .................................................. ................ 8 2.2 Background .............................................. Smart Cards .................................................. .8 2.3 TYPES .............................................. Smart Cards .................................................. ..... 9 2.4 APPLICATIONS ................................................ .................................................. .................... 10 Wallet 2.4.1 ............................................. ............................................... 10 2.4.2 Use of smart cards in transport .......................................... ......................... 11 2.4.3 Card durability and customer service (loyalty cards )......................... 11 2.4.4 Control access to buildings ........................................... ........................................ 12 2.4.5 Access to open or closed networks ......................................... ........................... 12 2.4.6 Health and Insurance ............................................ .................................................. .... . 13 2.4.7 Advanced Electronic signatures on electronic ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 235 documents ................................ 13 2.4.8 GSM cards and calling cards ........................................... .......................................... 13 2.4.9 Other applications ............................................. .................................................. ........ 14 2.5 security and benefits .............................................. ...................................... 17 3 EXISTING SITUATION .............................................. Surveying ........... 18 3.1 The situation in Europe ............................................. .............................................. 18 3.2 Clever CARDS IN GREECE ............................................. ........................................ 24 3.3 INSTITUTIONAL FRAMEWORK ............................................... ............................................ ...... ........... 25 3.3.1 Institutional framework 'directly' to 'smart cards »................................... .... 25 3.3.2 Institutional framework related (indirectly) with "smart cards" .......................... 25 3.3.3 Other provisions indirectly related to "smart cards" ............................ 27 4 ACTIVITIES OF WORKING GROUP ............................................. .............. 28 4.1 1st Public consultation 'Clever Cards in Public Administration ».................... 28 4.1.1 Program .............................................. .................................................. .... ........... 28 4.1.2 Participants .............................................. .................................................. ........... 29 4.1.3 Conclusions .............................................. ................................................. . .......... 31 4.1.4 Results Questionnaires Imprint Existing Conditions ............... 32 4.2 PUBLIC CONSULTATION 2H 'Clever Cards - MARKET RESEARCH & "............................ 32 4.2.1 Program .............................................. .................................................. .... ........... 33 4.2.2 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 236 Participants .............................................. .................................................. ........... 34 4.2.3 Conclusions .............................................. ................................................. . .......... 37 4.2.4 Results Questionnaires Imprint Existing Conditions ............... 38 4.3 3rd Public Consultation - "Clever & BANK CARDS Telecommunications' 47 ... 4.3.1 Program .............................................. .................................................. .... ........... 47 4.3.2 Participants .............................................. .................................................. ........... 48 4.3.3 Conclusions .............................................. ................................................. . .......... 50 4.3.4 Analysis of Existing Questionnaires Imprint Conditions ....................... 50 4.4 4th Public Consultation - "All relevant stakeholders in '................................ 50 4.4.1 Program .............................................. .................................................. .... ........... 51 Deliverable Task C3 'Smart Cards' 3 from 110 final 4.4.2 Participants .............................................. .................................................. ........... 51 4.4.3 Conclusions .............................................. ................................................. . .......... 56 5 CONCLUSIONS AND SUGGESTIONS STRATEGY ............................................. .59 5.1 General AXES (PROPOSALS TO THE STATE )......................................... ................ 59 5.1.1 Proposals for the Public Sector .......................................... .................................. 60 5.1.2 Information and Awareness ............................................ ................................ 60 5.2 Technical Issues Standards ............................................. ............................................ 61 6 BIBLIOGRAPHY ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 237 SOURCES .............................................. .................................................. 62 6.1 Smart Cards PROMOTIONAL INITIATIVES ............................................. ............... 62 6.2 STANDARDS GUIDANCE .............................................. ................................................ 62 6.3 INTERNATIONAL MARKET INITIATIVES FOR PROMOTION standards and applications Smart Cards ................................................ .................................................. ...... ............... 63 6.4 European Research Project .............................................. .......................... 63 6.5 INTERNATIONAL - Manufacturers / Suppliers ........................................... ........... 63 6.6 News - Articles NEWS ............................................ .................................................. .... 64 7 ANNEXES ................................................ .................................................. ............... 65 7.1 STANDARDS AND GUIDELINES FOR Clever Cards ........................................... ............. 65 7.1.1 General .............................................. .................................................. ..... .................. 65 7.1.2 International Standards Organisation ISO .......................................... ........................... 65 7.1.3 Standards contactless cards - Contactless card standards ................................ 67 7.1.4 Pilot / Check Card - Card Testing ........................................ .................. 68 7.1.5 Protocols Messaging - Message Exchange Protocols .................. 69 7.1.6 Standards for Security Issues - Security Related Standards .................... 69 7.1.7 European Organisation for Standardisation CEN .......................................... .................. 69 7.2 TERMINOLOGY INDEX Smart Cards ............................................. ........................ 71 7.3 QUESTIONNAIRES FOR CONSULTATION Clever Cards ......................................... 82 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 238 7.3.1 Questionnaire for consultation on smart cards with the "Public Administration" 82 7.3.2 Questionnaire Consultation on Smart Cards to "Market & Research" 88 7.3.3 Questionnaire Consultation on Smart Cards with "Banks Telecommunications' ................................................ ................................. ................. ................... 94 7.4 ORGANIZATIONS respondents have ............................................ ................ 99 7.4.1 Questionnaire for consultation on smart cards with the "Market & Research 99 7.4.2 Questionnaire Consultation on Smart Cards with "Banks Telecommunications' ................................................ ................................. ................. ................. 102 7.5 WORKING GROUP meeting notes ............................................. ................. 103 7.5.1 Proceedings of the 1st Meeting, 05 June 2002 ........................................ ................. 103 7.5.2 Proceedings of the 2nd Meeting, June 19, 2002 ........................................ ................... 103 7.5.3 Proceedings of the 3rd Meeting, July 9, 2002 ........................................ ..................... 104 7.5.4 Proceedings of the 4th Synantisis____________, August 27, 2002 ........................................ .............. 105 7.5.5 Proceedings of the 5th Meeting, September 10, 2002 ........................................ ........... 107 7.5.6 Proceedings of the 6th Meeting, October 2, 2002 ........................................ ............... 108 7.5.7 Proceedings of the 7th Meeting, October 9, 2002 ........................................ ............... 109 Deliverable Task C3 'Smart Cards' 4 by 110 final 1 Introduction 1.1 General Internationally, over the last decade, smart card technology used to approach and solve problems of access, management and information handling in almost all sectors of the economy and society. This is done extensively in research and pilot projects on a smaller scale sectoral projects in local or national scale, eg health card, identification, electronic purse or card access to transport etc. It is now generally accepted that smart card technology offers many operational advantages in implementing modern electronic services. Their role is primarily focused ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 239 on developing and safeguarding the environment of trust in transactions between citizens and service providers across all sectors of modern economy. The main issues which impede the promotion and widespread use of smart cards are the following: 1. lack of coordinated approach to the utility and functionality of Smart Cards by all parties involved in both decision making and the implementation of applications. 2. lack of widely accepted standards at all levels of smart card technology (cards, card readers, software, packaging information, etc.) to ensure interoperability (interoperability) between systems at sectoral, intersectoral and transnational levels. For the European Union, Smart Cards are one of the roteraiotites the eEurope Action Plan in the development of secure and fast network and support of e-business. The European Commission is promoting the issue by organizing the summit on smart cards and identification of necessary actions (trail-blazers) to achieve the objectives of eEurope. The trailblazers who initially created are: Public Identity, Identification & Authedication, Certification & Protection Profile, Generalized Card Reader, e-Payments, Contactless Smart Cards, Multi-application Smart Cards. Then created additional four other trail-blazers, relating to: User Interface-Consumer Issues, Public Transport, Healthcare and e-Government. For the study themes of the trail-blazer set up relevant working groups consisting of representatives of social groups and service providers, industry and academia and research space The working groups dealing with issues of Public Identity, Identification & Authedication, Certification & Protection Profile and Multi-application Smart Cards are significantly active and produced the first results for public consultation. The Greek participation in these working groups is very limited. Additionally, under the CSF III discussed or announced plans for various smart card applications, such as health cards, welfare, education, employment - insurance cards, stock cards, tax authorities, toll cards, etc. The situation in our country and the mobility established at European and international development issues smart card applications suggest the setting up interdisciplinary working group on assessment of the Greek situation, taking into account issues that either have arisen in other countries, or have not been addressed yet. Deliverable Task C3 'Smart Card 5 of 110 final 1.2 Objectives of the Working Group Objectives of the Working Group is to assess the current situation in our country, identifying the key problems of development smart card applications and propose actions to address the basis of international experience. It will focus its work in surveying and studying the various ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 240 approaches to smart card applications studied in our country, to identify the critical factors of development applications composing a framework of strategic and technological choices that will contribute to the necessary inter-sectoral collaboration and synergy. Specifically, this working group aims to: • to capture the current situation in Greece with emphasis on mapping of places - the views of all stakeholders in the design and implementation of new services with the use of smart cards including collegiate society. The fix would be to some extent complementary and comparative research conducted on the requirements of the users on the trail-blazer - User Interface & Consumer Issues. • identify key barriers application development in our country and proposed actions to address. • studying the existing legal framework in our country • identify actions to inform citizens and stakeholders in designing and implementing new services using smart cards. 1.3 Composition of the Working Group The composition of the Working Group was formed by people from the following locations: Public Sector: 3 people Academic - Research area: 10 people Market: 23 people (IT companies, consultants and system integrators) Banks: 2 people Telecommunications: 3 people Industry: 4 people Other: 3 people Further, the Working Group consists of the following: ENTITY NAME COMPANY-E-MAIL 1. Georgiadis University of Athens Panagiotis georgiad@di.uoa.gr 2. Mellon Technologies Karapetsas Stephen stefanos.karapetsis @ mellon. Deliverable Task C3 'Smart Card 6 of 110 final com.gr 3. NTUA Karounos Royal karounou@netmode.ntua.gr 4. Lawyer Karntasiadou Life zoikard@spark.net.gr 5. Accenture Tsiambaos Constantina dinats@yahoo.com 6. PLEFSIS Inc. Systems Information Charalampakis ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 241 John jchar@plefsis.com 7. Systema Informatics SA Tsoronis Theodore Thodoris.Tsoronis @ systema . Gr 8. OTE SA Chochliouros John ic152369@ote.gr 9. Head Business & Product Applied Technology COSMOTE Kapsoulakis John jkapsoulak@cosmote.gr 10. Alpha Bank Sotiris Kyriakos skyriakos@alpha.gr 11. Cytech Ltd Antoniadis Evangelos vanton@cytech.gr 12. INFORM P. WOLF cheese pieces Andreas a.tirakis @ lykos.gr 13. INFORM P. WOLF Pantis Peter p.pantis @ lykos.gr 14. Intersys SA cock Dimitris D. Petinos @ intersys.gr 15. INTRACOM Bobolou George gbob@intracom.gr 16. Truth AE Mizara Claus vmizaras@truth.com.gr 17. Athens Bar Association Sioulas Chris CSioulis@interbank.gr 18. ASYK SA Karanasios Constantine k.karanassios @ asyk.ase.gr 19. PAPASOTIRIOU SA Vavourakis John vavourakis@papasotiriou.gr 20. World Organization of Greek Kyvernonafton (P.O.T.E.K) Chasapidis John yianni@4u.net 21. University of Athens Dimitris Gouskos d.gouscos @ e-gov.gr 22. University of Athens Maria Ioannou marias@mm.di.uoa.gr 23. University of Athens bumps Panagiotis pkarou@e-gov.gr 24. University of Patras Vogiatzis Artemios bogart@ee.upatras.gr Deliverable Task C3 'Smart Card 7 of 110 final 25. University of Patras Dimitris Serpanos serpanos@ee.upatras.gr 26. Nikos Saridakis YPESDA ypesdda@gspa.gr 27. IS SA Drinos John ydrinis@ktpae.gr 28. APOLLO A.E. Kakoulidis George kakoulidis@apollo.gr 29. ENCODE SA Zoulovits Mina minazoulovits@hotmail.com 30. SIDCO S.A. Ghulam Dastgir Yama yamart@hellasnet.gr 31. NTUA George Rigopoulos grigop@epu.ntua.gr 32. INTRACOM SA cber@intracom.gr Chris Burson 33. Ideal Group Ioannis Giannoulis y.yiannoulis @ ideal.gr 34. OTE Vassilis Rigopoulos vrigopoul@ote.gr ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 242 35. BSE Petalas Claus vpetalas@ath.forthnet.gr 36. Siemens Moustopoulos Lycurgus Lykourgos.Moustopoulos @ s iemens.gr 37. Siemens Bogris Nicholas Nikolaos.Bogris @ siemens.g r 38. GROUP D Aggelopoulou Psiropoulos Panagiotis kossivas@angelopoulos.gr 39. Microsoft Hellas Draganidis Fotis fdragan@otenet.gr 40. INTRACOM Velidou Freedom ebel@intranet.gr 41. Mitrakas Andreas andreas.mitrakas @ globalsig n.net 42. Microsoft Hellas Flouris Myron myron@microsoft.com 43. NTUA Royal Gogos vgogou@biomed.ntua.gr 44. IBS George Paschalidis ibs@kav.forthnet.gr 45. Prefecture Pella China George kinasgeorg@pel.forthnet.gr 46. Aegean University Lambrinoudakis Costas Clam@aegean.gr 47. Combank Kotsikopoulou Basilica kotsikopoulou.v @ combank. gr 48. ARXIS ELECTRONICS Chtouris John info@arxis.gr Deliverable Task C3 'Smart Card 8 of 110 final 2 Smart Cards 2.1 General Definitions Many of us already use one or more smart cards in our daily lives. For example, smart card is a SIM card used in mobile system GSM. Smart cards are essentially tiny computers, the size and form a credit card on which is built an integrated circuit (chip), the front left side. The integrated circuit containing the contact entry and exit, and can contain only memory or microprocessor. The chip can provide a secure multi-level structure and to enable hierarchical access, making it difficult to access the data and the manipulation thereof to compute cryptographic functions (cryptographic functions) and perceived attempts to access directly, which is valid for as example, blocking the SIM card in case of import wrong PIN more than three-times-typically the main feature of smart cards is the ability to store and process information in a secure manner. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 243 The advantages of smart cards is to protect the data they contain, portability and ease of use. In order to complete it can be used in terminals or readers who do not have the size required for the import of the entire card, allowing the production of cards with notches around the full order was removed and placed in the terminal. Classic example cards SIM. 2.2 History of smart cards The ancestors of smart cards are credit cards issued by Diners Club agency in the 1950s. These cards were the size of a business card (business card) and had printed the name of the holder of the front. The show was enough for the service provider (eg hotel or restaurant) to provide credit to the holder. Thus facilitated business travel. Later the name was printed in relief (for example, now on the cards to withdraw money from ATMs of banks) to facilitate the recording of the name of the holder. Some years later, the cards became a magnetic stripe (magnetic stripe), which allow the mechanical recording of the data holder. In this way the raw data could be made electronically, speeding Deliverable Task C3 "Smart Cards" 9 out of 110 final transactions. But still the problem of fraud, and anyone having the right equipment could create fake cards. We could say that smart cards are the result of the simultaneous improvement of plastic cards and microchip. In 1969 occurred in France, journalist Roland Moreno, a concept for an integrated circuit card. Thus was born the smart card. Smart cards u954 developed independently in Germany (1967) Japan (1970) and the U.S. (1972). Smart cards flourished in the 1980s. During 1982-84 the Cartes Bancaire (Banking Card Association of France) ran the first pilot project for smart cards. The Union has worked with companies Bull, Philips and Schlumberger doing tests in the French cities of Blois, Caen, and Lyon. The tests were a huge success and only minor problems. One improvement that resulted from the pilot project was to integrate the magnetic strip in order to maintain compatibility with the then existing systems. After a very successful test, the French banks have introduced the use of smart cards for banking operations to the public. The use is the first example of a public function smart cards for banking operations. In parallel, a large advertising campaign when it introduced the term "smart card» (smart
card)

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

244

.

2.3 Types of smart cards Nowadays, smart cards can be categorized by two main criteria: cpu capacity and potential entry and exit. Under the first criterion, distinguished three categories of smart cards: 1. Memory cards - cards store information (memory cards). These cards contain a memory and logic in hardware (hardware logic), which can set or delete values in memory. Memory cards are improperly listed as smart cards, as they are not capable of processing data. 2. Smart cards (smart cards, IC cards, microprocessor cards). It is "traditional" smart cards or microprocessor cards. The CPU, in addition to storage and insurance information to take decisions in the specifications of the project which will be used . 3. Smart cards are generic (multi-application smart cards). The latest generation of smart cards come with open operating systems (Java, ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 245 MULTOS) and can carry more than one application. It also provides the user to "upload" new applications, or delete other according to their needs. The $ __________, microprocessor cards except CPU, ROM memory available for storing the card operating system, RAM for fast performance calculations and EEPROM memory for storing applications and data. This is essentially accomplished tiny PCs, which only lack of input / output. So in order to communicate with computers are using the smart card accepting devices (card readers) A second classification how to contact smart card with the external environment. Based on this criterion, we distinguish the following categories: Deliverable Task C3 'Smart Cards' 10 of 110 final 1. Smart cards with contacts (Contact Cards). These cards communicate with electrical contacts and be introduced to a reading device to read or introduction of information. 2. Wireless Smart Card (Contactless Cards). These cards have a tiny built-in internal antenna and can communicate with an antenna without physical contact with a reader so that the information be updated, changed or treated. 3. Hybrid cards and combination cards (Hybrid and Combination Cards). These cards incorporate both modes of transmission and therefore can not communicate if either wired or wirelessly. Smart card accepting devices (card readers) As mentioned above, in order to communicate with smart card devices are necessary for acceptance of smart cards. These devices are divided into two main categories: 1. Terminals, which have all the necessary equipment for communication with the card eg keyboard, printer, monitor, modem, etc. (EFT / POS, mobile phones, pay phones, vending machines and decoders) 2. Readers - register for smart cards. These devices do not have equipment and are connected to terminals that do not have smart card reader (PC, info kiosks, controllers, etc.) A key subset of readers are secure readers, who have a screen LCD display and PIN pad. Other subgroups are readers without cable, contactless readers, desktop, integrated into other devices (keyboard, CPU), etc. 2.4 Applications Smart cards are a practical notebook with enhanced security features on a natural level. The continuous progress in technology integration process currently provides features to smart cards that were available to the first personal computers. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 246 We present below some examples of using smart cards to make understandable the value and usefulness. 2.4.1 Wallet The smart card can store currency, greatly facilitating payments and purchases. Examples are the uses of controlled parking, toll roads, paying a ticket to public transportation (subway, train, bus), buying soft drinks from machines located in public places (venting machines), automatic payment of photocopies at public libraries and consumer markets species in any store. Deliverable Task C3 'Smart Cards' 11 by 110 final This will facilitate the immediate payment of outstanding amount as well as clearance between shops and banks. Successful examples are the electronic purse card and corresponding Mondex1 of Visa2. 2.4.2 Use of smart cards in transport Transport is implementing key - because they are abundant and stable audience. Applications Transport can offer smart cards are oiexis: • Pay fare on Public Transportation • Payment of tolls • Rights of parking • Booking air ticket reservations hotels and baggage transport • Documentation holder, electronic passport. Of these, the most important application, consistent with the analysis presented in this document is public transport, although in some years can be considered equally important and the implementation of toll collection. In addition, the application for parking rights may be combined effectively with the toll and / or public transport. Such a combination may authorize payments for parking to be credited even if someone parked his car and continued his journey by public transport. Yet air tickets booking service can be made by a separate card or included in a general smart card for citizens. 2.4.3 Card durability and customer service (loyalty cards) Retailers have the option to use smart cards to how effectively serve their customers and keep them loyal. For example, they know how to reward their customers with some of the points in each market and to reward them by giving them gifts to the redemption of these points when they reach a certain level of points. The fact that the points are stored in the chip offers two main advantages: a. There is no need to network between offices to inform a central database on the points of the customer. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 247 1 URL: http://www.mondex.com 2 URL: http://www.visa.com/pd/ewallet/main.html Source: ITS International, Deliverable Task C3 'Smart Cards' 12 by 110 final b. The client directly reward the achievement of maximum points, giving him extra incentive markets. By doing this they keep their customers loyal while getting information about their consumption habits, valuable information for both marketing strategy and sales and to better serve customers. 2.4.4 Control access to buildings A smart card can store the identification of an individual to control access to buildings and non-high-security workplace and in universities, schools, libraries and clubs. For higher security needs and access to specific services or information, a smart card can be a device for storing information such as images or other biometric features (eg fingerprints, iris of the eye) of the user. The same card can then keep a record of the identification of the individual computer systems of the body. An example is the card Mcard, which used than 110,000 members of the University of Michigan3 and that there information on the identity of each student and can be used financial transactions, purchase food, books, photocopying and other uses. 2.4.5 Access to open or closed networks Smart cards can store digital certificates (digital certificates) and other information to control user access rights to be use computing and network systems safely. The security here refers to both the authentication of the user, and in creation of virtual private network (VPN) to access corporate systems from public networks, such as the trade Internet.Trapezikes Large banks such as Visa and American Express view Smart cards are already in the next step in banking, and offer significant advantages over magnetic stripe cards. For this reason the company has established EMVco (EUROPAYMASTECARD-VISA co) is which process the EMV specifications which will be followed by all parties (banks, card makers and equipment developers software terminals and back office systems, etc.) to be achieve EMV transactions. The newest version EMV specifications are EMV2000. The EMV cards will replace credit and debit cards, magnetic circuit, while he could support and extra applications such as loyalty, electronic ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 248 purse etc. 3 URL: http://www.mcard.umich.edu/ Deliverable Task C3 'Smart Card 13 of 110 final The EMV cards can also be used in banking transactions on distance (internet banking, mobile banking), using electronic certificates for authentication of the user. 2.4.6 Health and Insurance The smart card can be used for secure storage of identification, Insurance and medical data of an individual or to store the location data are medical records (pointer cards). In this way the information is timely and accurate available to patients and physicians supporting and facilitating considerable freedom of movement for patients who can travel within and abroad, bringing with them the insurance and their medical file. Moreover, the smart cards in health care are used in applications identification of the patient and health professionals (doctors, nurses, etc.), electronic signatures for integrity and authenticity of medical data data is encrypted to ensure confidentiality (health professional cards), secure access to health networks, etc. 2.4.7 Advanced electronic signatures in electronic documents Smart cards, with the potential to create a pair of keys, and secure storage of private keys and electronic certificates provide an reliable part of "creation-devices" required by the European Directive 93 of 1999 "for electronic signatures, and the corresponding Greek Testament 150/2001- so their keepers, confirming their identity with "recognized certificates (under PD) from an appropriate "Service Provider Certification, be able to sign electronic documents with procedural value equal to that of handwritten signatures on paper documents. By applying these involved three (3) distinct entities: 1. Certification Service Provider (¨ Tuesday Trusted Entity) 2. End entity (recipient's e-signature and certificate, else "based party"), usually a service provider to secure network customers (eg banks) 3. End user signatures (eg customer Bank) 2.4.8 GSM cards phonecards _____________kai Smart cards have found application in many areas of everyday life. Two ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 249 of the most successful applications are in the telecom sector and even the simplest them (prepaid phone card) and more complex (GSM cards) form. Currently marketed worldwide billions and hundreds of phone cards million SIM cards after the GSM phones is estimated at 500,000,000. Deliverable Task C3 'Smart Card 14 of 110 final 2.4.9 Other applications Other applications of smart cards is their use in set-top boxes, Internet access, product tracking, driver's license (ideal for storage of penalty points and immediate removal diploma), etc. Deliverable Task C3 'Smart Cards' 15 by 110 final Known and potential smart card applications by sector and type of card Stored Value Cards Data / Information Files Identification / Access / Security Membership cards Bank Sector Wallet Banking Online Payments Insurance application Access to This account Security using internet from home Credit Cards Debit Cards Telecom Prepaid phone card number Storage Cards SIM / GSM Public Sector Account Manager (Pensions, allowances, etc.) Advanced electronic signatures in electronic documents Passport ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 250 Identity Driving Transport Electronic Tickets (Temporary validity contracts daily, monthly or annual tickets) Automatic toll payment payment modes electronic wallet (Bus, taxi, train, etc.) boarding pass - pass free boarding card right vehicle access controlled area access Card compliance post payment contract Health Payments Security Storage / recovery Health cards Deliverable Task C3 'Smart Cards' 16 by 110 final Medical Payments medical history Storage Information Donor Other Hotel Reservations Payroll Payments staff payment via TV money transfers from person a person Program sustainability and service (eg prizes) micro (eg sites parking, phone calls, etc.) Information / background staff Academic Information / Background ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 251 Storage Personal Information rental Archives cars Staff profile (eg preferences for service project customers) Express check in / out Access Club House Airport (Lounge) / room Departure room in Keys hotel Internet Access Access to buildings Access Networks Keys Rental Car Program Frequent traveler Card diatirisimot itas & Service reviews (Loyalty cards) Deliverable Task C3 'Smart Cards' 17 by 110 final 2.5 Safety and Benefits A typical tolerance to malicious manipulation (tamper-resistant) can detect and react to malicious manipulation (tamper-proof) Ensomatonoun the rapid developments in semiconductor technology, enabling continuous improvement of the characteristic The majority are reprogrammable feature calculation capabilities and operations (computing & calculating) feature logic and memory circuits process data and store information They can compare and manage complex information usually used for high security applications (high security) ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 252 allow off-line verification of data, as opposed to a card with magnetic stripe They option of what information the card can be accessed by different applications enable high security, and this is due to the complex cryptographic techniques used to decode the "movement" of information between smart cards and other devices offer high storage capacity information m__________e is compatible portable electronics Προσφέρουν Reducing financial crime efficiency and effectiveness of sales Business Customer Deliverable Task C3 'Smart Cards' 18 by 110 final 3 Presentation of Existing Conditions 3.1 The Situation in Europe For the European Union, Smart Cards are one of the priorities of the eEurope Action Plan under development safe and fast networks and strengthening of electronic services and e-business. A recent survey carried out by the company EDS Days and with the cooperation of the trailblazer 10 eEurope Smart Card Charter aimed to capture and study the applications of smart cards in electronic Governance cards - G2G (government-to-government), G2B (government-tobusiness), G2C (government-to-citizens) and e-Procurement in the public sector showed that applications of smart cards implemented in Europe on the following sections: Electronic signature Identification staff (civil servants, health professionals, etc.) Identification of companies and public administration agencies Electronic identity citizens Electronic identity members support services to relatively small areas (public transport, recreation, etc.) Specifically, the survey identified the following applications for each member country European Union. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 253 Country Project Name Description / Comments Austria citizen card (Bürgerkarte) Common framework social security and other citizen identity cards belpic BELgian Personal Identity Card for citizens and civil servants Belgium sis Social security card fineid Finnish identity cards satakunka Macro-pilot covering health and social security information. Finland North karelian hospital district Management and exchange of health data (FINEID card used for authentication) titre fondateur Common basis for electronic identity cards, potentially covering: personal identity card, driver licence, other specific cards teleprocedures Tax teleprocedures France sesam vitale Identification of insured persons (social security) Deliverable Task C3 'Smart Card 19 of 110 final Country Project Name Description / Comments gip cps Health Professional Card s adep A group of small and mid-sized towns to test usage of eprocedures with the citizen and with the administrations media @ komm Initiative for the development of e-procedures in townships and urban districts. The cities of Bremen, Nürnberg and Esslingen are pilots. Land of BadenWürttenberg Multifunctional cards to citizen and public e-procurement Germany beschaffungsamt e-procurement for administrations Ireland public services broker Secure access to public services. ieic Italian Electronic Identity Card aes Advanced Electronic Signature based on IEIC Italy ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 254 msc Multi Services organisation Card based on IEIC Netherlands pki overheid Government PKI for civil servants - Digital Signature - Health project (under development) Norway - National betting system (under development) Spain national PKI Usage of smart cards in public sector's PKI based applications: identification / authentication + e-sign for civil servants. Sweden ID CARD Multipurpose identity card Internal use within the Administration: National Taxboard, Social Insurance Board e-tendering System to allow UK departments to exchange tendering information (pilot stage) dfee Connections card: a scheme for 16-19 year olds in education, covering attendance monitoring, access to facilities, credits, etc. U.K. SMARTCITIES Local services with the City of Southampton as first pilot Source: study EDS - TA 10 This study suggests that the underlying problems - problems that have arisen the design and implementation of these projects may u948 summarized as follows: lack of equipment (card reader) from individuals and small companies an obstacle in implementing applications G2C the normal composition of jobs (workstations) is not sufficient and the number of users believe that the additional equipment required is relatively expensive compared to expected results from the use of smart cards. Deliverable Task C3 'Smart Cards' 20 of 110 final that the number of users feel that technology of smart cards are not ripe and there is likely to change in the near future. that some categories of workers - users consider that the use of Smart cards represent a shift in work habits and fear imposition of additional audits by national authorities to implement smart cards. But in all cases the projects were studied, showed that the smart cards are accepted and used effectively after the period adjustment. It is a general view that the evolution and effectiveness of applications ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 255 smart cards in Europe depends on the standards supported the content of applications and the ability to use one card for many different uses (multi-application usage). On the institutional context of two issues mentioned: 1. The protection of personal data under the national legislation and European Directive 97/66/EC 2. The electronic signature based on national legislation and European Directive 1999/93/EC Finally, the study shows that smart card applications in electronics Governance will focus mainly on health cards and social security as well as identification cards to citizens and public servants with electronic signature capabilities. The picture on the current status of smart cards in Europe given in-depth study "Open Smart Card Infrastructure for Europe prepared by the working groups worked within the eEurope Smart Card Charter. This study includes detailed mapping and evaluation of projects implemented to date in Europe, America and Japan as well as guidelines and standards for development interoperable smart card applications by sector. Here's the list Contents of the study «Open Smart Card Infrastructure for Europe", which is available on the website of the eEurope Smart Card Charter www.eeuropesmartcards. org. Volume Number and Title PART NUMBER PART TITLE AND SUBTITLE Part 1-1 eGovernment white paper on smart card applications and evolution .- Part 1 Analysis of developments Vol 1 Application White papers Part 1-2 eGovernment white paper on smart card applications and evolution .- Part 2 Survey Deliverable Task C3 'Smart Cards 21 to 110 final Part 1-3 eGovernment white paper on smart card applications and evolution .- Part 3: Survey on secure smart card based eGovernment Applications Part 2-1 ePayments .- Part 1: Migration of EMV / CEPs, status and roll-out plans o o EMV Migration Synchronization in Europe ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 256 o o e-Purse situation in Europe o o EMV Country summary (EXCEL sheet) oo EMV Migration (pointer to web-based information) Part 2-2 ePayments .- Part2: Blueprint on Mobile Payments Part 2-3 ePayments .- Part 3: Mobile payment business requirements Part 3 Public transport: White paper on smart card transport applications and evolution incl. Spreadsheet for Annex B Part 4 Healthcare: White paper on Smart Card evolution in the Health area Vol 2 User Requirements Part 1 Best practice manual incl. Requirements for cost transparency and Privacy code of conduct for multi application IAS Part 1 Contextual and conceptual modelling Part 2 Requirements for IAS functional interoperability Part 3 Recommendation for IOP specifications Vol 3 Global IAS interoperability Framework Part 4 Deployment strategies for generic IAS Part 1 Electronic Identity White Paper Part 2 Study on legal issues in relation to the use of public ID (Electronic Identity) Part 3 Bionorm. Need for Specifications and Standardisation to Achieve Interoperability in the Field of Smart Cards and Biometrics Part 4 Requirements Specification. Visual ID on smart card used as a travel document Part 5 Whitepaper on PKI Requirements Part 6 PKI Pre-inventory Survey Report Vol 4 Public electronic identity, Electronic signature and PKI Part 7 Network Authentication Module for internet End-users Electronic Signature (NAME-ES) Deliverable Task C3 'Smart Cards' 22 by 110 final Part 8 Requirements of terminal manufacturers and convergence model for multiplatform access to services Part 9 Telecom operators' requirements Part 1 Legal framework for multi-application cards and systems ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 257 Part 2 Current and future business models for multi-application systems Part 3 Basic Multi-application technologies for cards and systems Part 4 MAS prerequisites: Core Cross-Sectorial Architecture for Interoperable Multiapplication Systems Vol 5 Multiapplications Part 5 Integration of multi-application systems Part 1 White paper on requirements for the interoperability of Contactless Cards Part 2 White paper on Security and Threat Evaluation relating to Contactless Cards Part 3 White paper on the Future Roadmap for Contactless Cards (Draft to be available 10 December) Part 4 White paper on the Certification of Contactless Cards Vol 6 Contactless Technology Part 5 Field Trials Specifications and Guidelines for Contactless Card Systems Vol 7 Generalised Card Reader Part 1 Generalised Card Reader (relation to FINREAD and Embedded FINREAD CWAs) Part 1 The Application of Attack Potential to Smart Cards (Common Criteria Supporting Document) Part 2 The Application of CC to Integrated Circuits (Common Criteria Supporting Document) Part 3 ETR-lite for Composition (Common Criteria Supporting Document) Part 4 ETR-lite for composition: Annex A Composite smart card evaluation: Recommended best practice (Common Criteria Supporting Document) Part 5 ST-lite (Common Criteria Supporting Document) Vol 8 Security & Protection profiles Part 6 Guidance for Smart Card Evaluation (Common Criteria Supporting Document) Deliverable Task C3 'Smart Cards' 23 by 110 final Vol 9 Referenced standards Executive Summaries and online pointer to referenced EESSI standards and specifications - Area K "Application Interface for smart cards used as ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 258 secure signature creation devices WD1v012Draft Summary and references to CEN / ISSS Workshop Extended User Requirements Information. Summary and references to CEN / ISSS Workshop Fastest Summary and references to FINREAD CWAs and CEN / ISSS Workshop Embedded FINREAD Business Plan Japan's NICSS specifications o o Prerequisites o o Framework Scheme Overview o o Registration Operation Interface o o Operation System Interface o o Card Adapter Interface o o Card Interface Specification o o RW Card Communication Interface o o Operation Guideline o o Contract & Covenants Example USA GSC Specification NISTIR 6887/GSC-IS (V2.0) Vol 10 Glossary Part 1 eESC Glossary of Smart Card Terms and acronyms (Excel) Part 1 eEpoch Management Summary (DOW) eEpoch Announcement Press Release Vol.11Implementation and deployment demonstrators Part 2 Netc @ rds Management Summary (Presentation) Netc @ rds Announcement Press Release Annex A eEurope Smart Card Charter Brochure Annex B Clustering information on smart card projects Annex C Weblinks pointers and summary information on selected standards forums and workshops relevant to smart cards Deliverable Task C3 'Smart Cards' 24 by 110 final 3.2 Smart Cards in Greece The first pilot smart card applications have emerged in our country 1988 in the health sector. Since then various applications, mainly in research - a pilot environment and the use of smart cards Telecommunications - mobile phones and pay phones. The important uses and applications of smart cards in our country are: Telecommunication Cards ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 259 • mobile phone cards SIM - a few million • OTE - Prepaid cards (Memory) - Tens of millions Banking Cards • Several banks - Smart Card as Security Application Modules Tens of thousands • E-Wallet National Bank - Several hundred • E-Wallet Cafe and National Commercial Bank - Some hundreds • National Bank - Project IST Starfish - A few dozen Health Cards, Social Security • Public AMAROUSIOU (implementation of the European project Cardlink) Thousands • EODEAP (Insurer) - Several thousand • Red Cross - card diabetics - Several hundred • Hospital of Nice - card heart disease - Several hundred Loyalty Card customer • Ethnocarta - Show (loyalty) - Tens of thousands • Shopping VETO (loyalty) - Several thousand Various applications • ASE - ASYK (PKI - digital signatures) - Several thousand • TEO - Attiki Odos - TILEKARTES (prepaid) - Tens chiliadesKarta toll, public transport and parking in Thessaloniki (implementation of the European Project ADEPT II) - Some hundreds Deliverable Task C3 'Smart Cards' 25 by 110 final • multifunction card for payment of transport services, services Health and personalized access to information in Thessaloniki (implementation of the European project DISTINCT) - Some hundreds • Company petrailoeidon distribution (fleet card) - Tens of thousands • Secure cargo weighing AGET - Several hundred 3.3 Institutional Framework 3.3.1 Institutional framework 'directly' to 'smart cards' Smart cards, given the recent emergence as a 'medium of exchange, but and the emerging diversity in their use and applications , does not have (at least yet), 'unchanged object' of a regulation, both national and European level. Feature is that the phrase 'Smart Cards' to our national law occurs only once (according to data from the 'Bank Legal Information, the Athens Bar Association, www.dsanet.gr) and that the ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 260 Ministry Decisions. 3227/31-1-2002 (FEK 23/13-02-02) of the Ministry of Foreign Affairs, on Publication of Decision 1382/2001 of the UN Security Council "as product forms (conditional) to the embargo (sanctions) against Iraq! Of course, smart cards (smart cards) referred to in many 'Preparatory texts' (ie texts not immediately mandatory) European Union, such as announcements, resolutions, recommendations, opinions, etc., particularly in the context of the approved action plans eEurope2002 (and, more recently, eEurope2005) which reflected the intention promotion and adoption of the medium as a key factor for achieve the much sought safety in the "Information Society". Also, identification, technical specifications, and creating relevant 'Technical standards' by standardization bodies (eg ETSI, CEN, ISO, ITU, etc.) or by various private consortiums (eg EMVCo)-specific uses or otherwise, are not alone, institutional framework, the extent however, there are no relevant laws, regulations or administrative provisions that refer or refer them! (Since the 'standard' even been published by 'approved bodies', not-from themselves, required!) 3.3.2 Institutional framework related (indirectly) with "smart cards" On the other hand, at least at European level (to the extent in line with what our national legislation and national) have establish a set of provisions (mainly European Parliament Directives and the Council) on issues of specific applications of 'smart cards'. Thus, depending on the type of application that uses a smart card can be made and features the following instruments: Deliverable Task C3 'Smart Cards' 26 by 110 final Smart card as a 'device for conditional access' (in 'Protected services') - Directive 98/84/EC "on the legal protection of services based or consisting of, conditional access " With this directive, measures against illicit devices providing unauthorized access to protected services, and will be protected (art. 3 § 2) 'the free movement of apparatus for conditional access'. The term "access device terms, given (No. 2, approx c) the following definition: ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 261 "Any equipment or software designed or adapted to enabling access to a service in an intelligible form "and apparently finds application in many cases the smart card is used as (Part) of such equipment eg for decoding satellite television labels for access to the network GSM (mobile phone), even access to specific telematics services, such as system 'HERMES' the Athens Stock Exchange using smart cards for identification of users! Smart Card as (part of) the 'safe-creation device (E) signature- Directive 99/93/EC "on a Community framework for electronic signatures With this directive (which has been incorporated into our national law by presidential decree 150/2001), although not mentioned by name in 'smart cards', they offer the basic standards to be met by operators (not only) of private keys ("Signature-creation data ') end-users to ensure the required level of safety to create (and if there other conditions, such as the issue 'qualified certificates') 'Qualified electronic signature' (n 5 § 1 of the Directive, or 3 § 1 of the Greek PD), which enjoys absolute equivalence to the corresponding hand signature. Although as 'bodies of signature creation data' can be use other means (eg USB tokens), the use of 'smart card' (Which will keep the 'technical' and 'Standards' issued by the European standardization organizations and specialize in customrelative 'epitropis'-the provisions of that Directive) as a key safe means for storing private keys and an 'accredited signatures', is given! (Due to those mentioned above for approved action plan 'eEurope2005'). Smart Card as' electronic purse 'or, failing that, the' operator credits' Although specific applications of smart cards are already used in pilot programs (eg BalcanCard) or practical applications (eg known, calling cards, the prepaid units), but not yet Deliverable Task C3 'Smart Cards' 27 by 110 final relevant legal framework and related (evidentiary) contracts are governed entirely the principle of freedom of contract "where users and providers related services according to their own data and evidence ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 262 operation of the equipment they use! Under the directive expected "for the distance marketing consumer financial services "(see No. 11 of the Preamble Directive, the e-commerce) are likely to settle on issues and they are put some 'safety standards' in 'in' with used for them. However, it is assumed that the extent appropriate, apply for the 'smart Cards any provisions governing the use and operation of analogue instruments payment '(eg' Decision of the Council on 28.5.2001 combating fraud and counterfeiting of means of payment Non-cash ', OJ L 149, 2.6.2001, p. 1) 3.3.3 Other provisions indirectly related to "smart cards" Other important provisions-related, but mainly how development of applications using 'smart cards' and not directly they themselves are numerous and apply as appropriate. For example: Directives 95/46/EC and 97/66/EC on data protection nature Directive 97/7/EC on consumer protection in distance contracts 00/31/EK Directive on electronic commerce. Deliverable Task C3 'Smart Cards' 28 by 110 final 4 Working Group Activities The Working Group held four public consultation: 1st Public Consultation "Smart Cards in Public Administration 2nd Public Consultation "Smart Cards - Buy & Research 3rd Public Consultation - "Smart Cards & Banking Telecommunications' 4th Public Consultation - 'All stakeholders' Furthermore, requested by the representatives of actors to fill questionnaire for surveying services, products or applications Smart cards offer, have implemented pilot or operating production and future plans and views on technology Smart Cards. The sections below present the topics, participants, conclusions of public consultation and the information obtained 4.2 2nd Public Consultation "Smart Cards - Buy & Research The 2nd Public Consultation on Smart Cards held in Hotel Holliday Inn, Cosmos Hall B Wednesday, October 2, 2002, 3:00 pm - 7:00 pm Invited representatives of universities, research centers, ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 263 IT companies, consultants, manufacturers cards and related equipment and service companies using Smart Cards. The 2nd Public Consultation had three objectives: 1. to illustrate the various approaches to smart card applications considered or implemented in our country 2. to identify the critical factors of development applications, "Smart Card ' 3. to discuss possible areas of cooperation - synergy between the involved bodies. Deliverable Task C3 'Smart Cards 33 of 110 final 4.2.1 Program 14:30 to 15:00 Arrival 15:00 to 15:15 Introduction by the chairman of the event, Prof. P. Georgiadis Moderator Group C3 Greetings from GRNET 15:15 to 15:25 Presentation Goals Working Smart Card - Plan Work and Work to date, B. Karounos - Rapporteur Group C3 15:25 to 15:40 Achievements and prospects of the eEurope - Smart Cards Charter, St. Karapetsas - Moderator Group C3 15:40 to 16:10 Presentations by Companies - Systems Integrators • TRUTH SA, B. Mizara • Datamed - Group ALTEC, • Mellon Technologies, Amsterdam. Angelopoulos ____________16: 10 - 16:40 Presentations by Industry • INTRACOM • Group A. Angelopoulos Angelopoulos• ARCADIA TECHNOLOGIES SA, I. Kouroglou 16:40 to 17:00 Coffee Break 17:00 to 17:30 Presentations by companies - Service Providers • ASYK SA, K. Karanasios • LYKOS GROUP, A cheese pieces • HELLASNET S.A. (FORTHNET Group), P. Ioannidis • ADACOM S.A, P. Vasiliadis ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 264 • Institutional Framework, Ch Sioulas, MSW 17:30 to 17:40 Presentations by Companies - Software Providers • Microsoft Hellas 17:40 to 18:30 Presentations of Research and Development • Biomedical Engineering Laboratory, NTUA • Computer Systems Laboratory, Univ. Patras, D. Serpanos • INTRACOM • TRUTH SA • Mellon Technologies Deliverable Task C3 'Smart Cards 34 110 final • General Secretariat for Research and Technology 18:30 to 19:00 Discussion and conclusions Coordinator - P. Georgiadis 4.2.2 Participants ENTITY NAME COMPANY-E-MAIL 4.2.3 Conclusions Presentations by representatives of different companies and research institutions showed that the smart card applications in real production environment is very low compared with the hitherto participation of companies and academics - research institutes schetikaprogrammata research and development of the General Secretariat for Research and Development and the European Union. As key issues impeding the development of applications for smart cards in our country, reported the following: • High cost of development applications in relation to expected benefits high cost of terminal, non-cooperation between various agencies with similar applications. • Delay in adoption of technology by public bodies in particular inadequate infrastructure • Not familiar with the technology • Lack of adequate standards on the part of the wider public sector • Lack of mechanism for the transfer of results and know-how research in production from all the attendees noted the need to create frameworks for cooperation and search for new alternative business models from large users - government bodies, semi-public Deliverable Task C3 "Smart Cards" 38 110 final and the private sector to address issues of cost necessary infrastructure, and promote interoperability and infrastructure applications. It also noted the need for our country a body (not profit) to ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 265 promote European - International standards and guidelines development of interoperable applications, supporting both the public and the private sector in planning and implementing smart card applications . A significant number of attendees agreed to contribute financially to the creation and operation of that institution. 4.2.4 Results Questionnaires Imprint Existing Situation The Questionnaire for consultation on smart cards with the "Buy & Research "were sent to 50 institutions of public and private partnerships participate in research and development of the European Union, the three companies manufacture cards in our country, in universities, technical institutes and research centers participating in the National Network for Research and Technology as well as links to IT Companies in Greece and consulting firm to notify its members them. Questionnaires completed by 24 institutions (see Annex - section 7.4.1). The table below shows the number of bodies completed the questionnaire, depending on the type of business activity. Body Type * Number of responses AEI Research Laboratory 4 8 Software Company Consulting Firm 3 System Integrator 10 Company diathesisKarton 4 Unit production Karton3 Other 2 * Many organizations say more than one kind of business and thus included in the above one type of business Deliverable Task C3 'Smart Cards 39 110 final The following table shows the entities by type business activity and whether they provide or plan to develop products services smart card, respectively. Type of Institution Number of agencies providing products Services Number of players who design products services; Research Laboratory University 4 4 Software Company 5 8 Company Advisors 2 3 System Integrator 6 10 Company diathesisKarton 4 4 Card Production Unit 2 3 Other 1 2 ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 266 * Includes entities that provide products - services and plan to continue developing the business of The completed questionnaires were relatively weak. Of the 20 questions only 6 completed a sufficient number of operators and provide practical information and specialization are: Question 1: Describe the services, products or smart card applications you deliver or offer. The following responses were specific to each organization: ADACOM S.A SIM Cards - SIM APPLICATION TOOLKITS CARDS EMV SMART CARDS SMART CARD FOR E-GOVERNMENT APPLICATIONS (Electronic Identity Card, Health Card, Digital Signature Card SMART CARDS FOR LOYALTY SHEMES (Expertnet), ICCS-NTUA Services and smart card applications have been implemented at pilot level in part of the project La Mer. The project aims to provide a Deliverable Task C3 'Smart Cards' 40 of 110 final practice-a mechanism for the development of electronic commerce in developing countries to present a scalable business experiment, which aims to secure interconnection of the chambers developing countries of Southeast Europe, whereas technical, legal and social issues positions and tactics. The La Mer is determined by the use of smart cards in the infrastructure of trusted third entities to provide additional privacy; confidentiality. Smart cards used for secure authentication access, storage media and multi-license applications electronic commerce. NETMODE-ICCS-NTUA Develop pilot management u921 Medical History CSP using electronic cards. System Electronic Health Card for Diabetics and European Research Project AIM - DIABCARD. European Research Programme for Health Telematics - Cardlink II. Participation in the Concerted Action EUROCARDS Project AIM GREEK ORGANIZING (HOTech) Study mask card Health, safety and production data personalization software components and use the card data encryption software for the production of phonecards using SAM management software to access and record keeping visitors using ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 267 visitor card Develop an integrated monitoring system of production connection with the machines, managing data security and access to premises and personnel work, computerization of quality assurance, information and statistics reports Evaluation and costing ID SYSTEMS CORPORATION CONSTRUCTION - TRADE ELECTRONIC - Software APPLICATIONS FOR CARDS WITH CHIP - MAGNITIKIS Movie - Microprocessor (M-CPU) - Wireless card (RFID) ARCADIA TECHNOLOGIES SA Production: Chip module cards, Deliverable Task C3 'Smart Cards' 41 by 110 final Prepaid scratch off cards, Access cards, Loyalty cards, Electronic purse cards etc. LYKOS GROUP Cards recharge mobile Banking cards visa classic / gold / electron - mastercard - maestro Card loyalty: smart club shell Cards internet connection All types of membership cards (thermal, embossing, inkjet printed encoding of magnetic stripe - printing of barcodes, pictures etc) Mellon Technologies Implementation of the European project CARDLINK II - Medical card Medical File - Municipality of Maroussi Implement access control system in the harbor DEPOT using contactless smart card (contactless) - Thessaloniki Port Authority (Port Authority Thessaloniki) Supply prepaid smart card, smart readers cards and library (DLL) to integrate the card system in automated fare collection system of toll - TEO (National Fund Road) software development, supply terminals and smart cards for loyalty card stores PRESENTATION - Cooperation with Ethnocarta ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 268 supply smart card readers and application development personalization for the implementation of medical records on smart cards Working with DATAMED - EDOEAP Installing PKI infrastructure with the capacity to store ensomato__________meni private keys and certificates on smart cards - ASYK card purchase of fuel for large oil companies. Development software, data capture, procurement cards and terminals, personalization Card - FLEET CARD Pilot program Electronic wallet subsidized by the EU - OPERA Microsoft Hellas Deliverable Task C3 'Smart Cards 42 110 final PKI applications e-banking, development libraries Smart cards, Interoperability with Certificate Server - PKI, which is included in platform Windows &. NET Server UNIVERSITY OF THE AEGEAN PKI - RSA smart cards ENVIRONMENTAL CORPORATION Construction - marketing telephone cards with chip, smart cards with processors, memory, magnetic tape and scratch area for telecom operators. Systema Technologies S.A. Provision and Planning Smart Cards and the Kartanagnoston HID Integrated Security Systems to store biometric data (iris eye, fingerprints) on smart cards Secure physical access Communication Networks Laboratory, Department of Computer Science University Athens Using Smart Cards in the program EURO-CITI, funded by the European Union. The program involves Elections for local issues and provide advisory services to citizens. Users of this product is Local authorities and municipalities to promote electronic democracy and the direct involvement of citizens in various aspects of their region. ASYK Inc. (Systems Development and Support ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 269 KEFALAIGORAS SA) development of public key infrastructure (PKI) and services certification (CA services) under PD 150/2001 Complete Digital Certification Services (PKI / CA Services) the ASYK A.E. system Hermes Athens Stock Exchange (ASE) ATMEL HELLAS A.E. Deliverable Task C3 'Smart Cards 43 of 110 final The company has integrated circuits for all applications, smart cards. These products are produced in factories of the company in the U.S. France and England. DATAMED A.E. X / / carta: Smart Card Health, manages the laptop documentation to provide high quality health services in point of care (Point-of-care). Accompanied by Platform IT solutions tailored to the needs of each business sector. Smart card health of European travelers. R & D project of the EU at DATAMED which developed the smart card subsystem health. topos communications sa Smart card system for drivers ILPAP. Within ILPAP telematics system (a system in normal function) has implemented a pilot working hours of drivers with Readers smart cards installed in 5 vehicles and a depot. The application aims to record hours of driving time from beginning to shift the vehicle or depot, as well as recording breaks and ending time of the shift. Apart from recording the time the application is running as well use the card for handling data from the database of the telematics system, in which interfaces the reader of the reader depot of the vehicle where the computer is informed of the vehicle. TRUTH Inc. Consultancy: Technical and Business Planning Implementation and enforcement Smart card systems Consultant project management smart cards Pilot Applications: Electronic toll payment Electronic payment in Public Transportation Electronic payment Parking Access Control in parking Vehicle Zone Access control ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 270 Card Driver Multi-application Smart Card Deliverable Task C3 'Smart Cards 44 of 110 final Application User Related Information (URI) for customization user interface according to profile owner Product Development: Multi-application smart card for hotels (Smart Hotel) Question 9: Provide research - pilot projects, services, products or smart card applications that you plan to develop and provide. The range of applications reported by the various stakeholders on the following: Installation complete development of PKI countries South East Europe with the use of smart cards u941 Incorporation services smart card applications in the field of telemedicine Electronic signature - data security - identifying user Jump to Environment Contact less Microprocessor Cards current smart card applications system for access - security control, bonus system e-payment energy savers, electronic purse, medical card, electronic ticket for public transport SIM Cards / access chip cards / electronic purse / health cards / loyalty cards etc EMV CREDIT CARDS Various SMART CARDS APPLICATIONS, eg Smart Campus Cards to first pilot in Universities Loyalty-Access Control Smart Cards Microsoft is implementing major research programs in the Smart Cards (total R & D investment over 5 billion USD - PKI applications, ebanking, Full support of Smart Card technology to all products wireless card, construction and research on medical card Karga identity driver's license. transport applications Applications for m-commerce Integrated circuits: - GSM - Banking Applications - Public Key Infrastructure (PKI) - Application ID (identity cards, health cards, etc.) ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 271 - Transport (transportation) Deliverable Task C3 'Smart Cards' 45 of 110 final Question 10: Do you see a demand for such services and applications from citizens and administration " The answer is affirmative, and particularly related to categories of operators and applications, including: • Telecommunications Companies • Public Agencies • Credit Institutions • Retail Companies • Safety - Access Management • Fast & Secure Transactions • Loyalty Schemes • Medical applications (patient history) • Wallet • Tourist units - access control • Large businesses • Visa cards • Identification cards • Cards for tolls • Biometrics • Multi Application cards • Authentication, secure e-mail, web-based applications • Sports Facilities • SYZEFXIS - Sub 9 Question 16: Indicate any problems you find that prevent adequate dissemination and use of these services and applications by end users. The main issues - the problems reported are the following: • High cost compared to the magnetic card • Additional cost of card-reader as they are incorporated in more PCs • Delay in adoption of technology from mainly public bodies • Lack of information koinoupar Deliverable Task C3 'Smart Cards 46 110 final • Economic situation, course of technological development in the country • Prejudice • Problems of proper management of personal data • Inadequate infrastructure • Not familiar with the technology • Lack of communication and information • Inadequate legislation - The PKI infrastructure is not adequate in ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 272 Greece • Not enough preparation on the part of the wider public sector • Problems of compatibility of technologies and understanding of technology end users • Cost of terminal non-cooperation between different clients with similar applications. • For users: incomplete information, lack of advertising, but variety of different cards for such applications. • Distrust in electronic data management • Uncertainty regarding data loss / theft • Legal framework Question 18: Is your agency organized structure or personnel to necessary expertise to implement or provide services, products or smart card applications? The replies are: Yes: 17 No: 1 No Response: 7 Question 19: "I need to create a scientific - Steering Committee will monitor and support the implementation of Smart Card projects in our country;" The replies are: Yes: 19 No: 1 No Response: 5 Deliverable Task C3 'Smart Cards' 47 of 110 final Add the following comments were received regarding the need for a scientific - Steering Committee will monitor and support the implementation of Smart Card projects in our country. • H committee should be composed of knowledgeable and smart card has very good theory - technical training. • Please note that all the working groups and the forum involved with any way to work smart cards should be taken seriously what is happening in the EU to prevent development projects that do not comply with common European standards. • The committee should consist of experienced individuals with experience and very good technical training on the field of smart cards to take quick and effective decisions on all relevant issues and implementation of international standards. ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 273 • The existence of science - Steering Committee will be meaningful only in When there is a specific timetable and commitment state for introduction of smart cards in a wide range of applications. In a this case, the role of the committee will be very important for identification of appropriate technologies, transfer of experience other countries and quality standards will be met by end systems. Issues to be addressed: - Standardization - Legal framework - Awareness 4.3.2 Participants ENTITY NAME COMPANY-E-MAIL 1. METRO Kasampalis D. dkasabalis@ametro.gr 2. ASPIS BANK Nikos Papageorgiou 3. ABG Card Inc. Bubbles Dimitris dibou@atekarta.gr 4. Novabank Giannopoulou Christina christina@novabank.gr 5. Winbank Orphanidou Elena orfanidou@winbank.gr 6. Systema DATA Tsoronis Theodore Thodoris.Tsoronis @ system a.gr 7. NTUA George Rigopoulos grigop@epu.ntua.gr 8. Commercial Bank Duke Catherine douka.a @ combank.gr Deliverable Task C3 'Smart Cards' 49 of 110 final 9. Commercial Bank Tzouras Menelaos 10. National Bank Eleni Spiliopoulou espil@nbg.gr 11. Commercial Bank Kotsikopoulou Royal kotsikopoulou.v @ combank. gr 12. ABG Card Inc. Komninos Dimitris komninos@atekarta.gr 13. Greek Union Banks Vasileios Panagiotidis vpanagio@hba.gr 14. Greek Union Anna Banks Garyfallia hbal@otenet.gr 15. Info-quest Smyrnios Chris xsmyr@quest.gr 16. Panagiotis Ioannidis Hellasnet ioant@hellasnet.gr 17. METRO Simopoulos Anthony asimopoulos@ametro.gr 18. Inform P. Lykos Robust Konstantinos l.nikolopulou @ lycos.gr 19. Inform P. Lykos Nicholas Danos n.danos @ lykos.gr 20. Egnatia Bank Chairs Peter petros.Kareklis @ egnatiaba nk.gr 21. General Cards Inc. George Maris gmaris@geniki.gr ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 274 22. Winbank Pappou Dimitra pappoud@winbank.gr 23. Commercial Bank Eleni Sotiriou sotiriou.e @ combank.gr 24. Adacom Skiadopoulos Claus vskiadop@adacom.com 25. Inform P. Lykos Nikolopoulou Lina l.nikolopulou @ lycos.gr 26. EFG Eurobank Ergasias Andreas Vlachiotis avlachiotis @ eurobankcards. gr 27. IDEAL Group Panos Vassiliadis Panos@idealnet.net 28. HSBC Perpinia Julia PersonalBanking.Cards @ hs bc.gr 29. e-card Papioannou George Georges.Papaioannou @ ecard. fr 30. Novabank Georgopoulos Dimitris Dimitris@novabank.gr 31. Novabank Malesovas John MalesoYi@novabank.gr 32. NTUA embittered John gpik@telecom.ntua.gr Deliverable Task C3 'Smart Cards 50 110 final 33. Costas Papageorgiou Ethnocarta kpapag@ethnokarta.nbg.gr 34. Cosmote Spiro Magoulas smagoulas@cosmote.gr 35. Cosmote Athena Kollias akollia@cosmote.gr 36. Cosmote Kapsoulakis John jkapsoulak@cosmote.gr 37. Intracom Tzelepis Konstantinos ktzel@intracom.gr 38. Intracom cber@intracom.gr Chris Burson 39. NAMAKO Ritsos Panos ritsos@namako.com 40. Accenture A.E. Taya Andreas andreas.tagios @ accenture.c om 41. Accenture A.E. Makrystathis Aristotle aristotelis.makristathis @ acc enture.com 4.3.3 Conclusions Although the participation of representatives from the banking sector was not significant there were no presentations by institutional banks or banks because the design of products - services by using technology smart card is a high confidence - secrecy. Both the presentation of the representative of COSMOTE and the remaining attendees highlighted the contribution of smart card development new telecommunications and banking products - services and mobilebanking as well as security of financial transactions and has extensive reference to the need for strategic partnerships between ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 275 banks, telecom operators, public transport operators and public sector. The creation of common infrastructure was identified as a key factor in the viability of such products - services. Finally, there was talk of creating in our country a body (not profit) to promote European - international standards (EMV), proposed in prior consultation with market research and a significant number of attendees agreed on the need for both the project and the financial contribution for the creation and operation of that institution. 4.3.4 Analysis of Existing Conditions Imprint Questionnaires The Consultation Questionnaire for Smart Cards with "Banks Telecommunications "were sent to 16 agencies were received poorly completed 3 questionnaires (see Annex - section 7.4.1) which do not result in usable data for the current situation in the Banking and Telecommunications. Deliverable Task C3 'Smart Cards' 51 from 110 final 4.4 4th Public Consultation - 'All stakeholders' The 4th Public Consultation on Smart Cards held in Hotel Holliday Inn, Cosmos Hall B Wednesday, October 30, 2002, 9:00 a.m. to 2:00 pm Invited the representatives of the bodies were participate in previous consultations and those who were invited but did not participate in previous consultations. Also issued a press release to inform any other interested persons or bodies The 4th Public Consultation was to present and discuss problems and prospects of smart cards in various fields of application and final formulation of strategic proposals of the Working Group for the state . 4.4.2 Participants ENTITY NAME COMPANY-E-MAIL 1. BULL Tsilagas Costas k.tsigalas @ bull.gr 2. 01 Information Panos Takis tpanos@01p.gr 3. 01 Computer Tsiakaliaris Chris ctsiakal@01p.gr 4. ABC Professional Services S.A. Karabasi Evangelos vkaraba@abc.gr 5. ABC Professional Services S.A. Nick Monanteras nmonant@abc.gr 6. Adacom Giaourtopoulos Minas giaourtopoulos@adacom.c om 7. Adacom Kalimeris Katerina k.kalimeri @ adacom.com 8. AIS tiated Vicky vzomenou@ais.gr 9. ALTEC Garbis Dimitris gard@altec.gr 10. ALTEC Kanavos John gik@altec.gr 11. ALTEC Papadeas Andreas anpa@altec.gr 12. Arcadia Technologies Weyland Lars lweyland@arcadiagrp.gr ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 276 13. Arcadia Technologies Kouroglou Theodore tkouroglou@arcadiagrp.gr tkouroglou@sanyo.gr 14. Archetypon Inc. Vatikiotis Dinos dva@archetypon.gr 15. Archetypon Inc. Timmy Tambouris tambouris@archetypon.gr 16. ASPIS Bank Tsavdaridis John tsavdaridis.ioannis @ aspisb ank.gr 17. ATMEL-Hellas Bournakas John ybournakas@patras.atmel.c om 18. Business Innovation Saponidou Wisdom sophia@bi.gr 19. Cosmote John Karidis ykaridis@cosmote.gr 20. DATALEX Sgouros Stamatis stamos@datalex.gr 21. Datamed A.E. Billiris Anthony abil@datamed.gr 22. Datamed A.E. Pavlopoulos Sotiris spav@datamed.gr 23. Delta Singular Papastamatiou George gp@delta-inf.gr 24. e-card Papioannou George Georges.Papaioannou @ eParadoteo Working Group C3 "Smart Cards' 53 by 110 final card.fr 25. EFG (e-solutions) Gerosideris Miltos mgerosideris @ esolutions. gr 26. EFG Eurobank Ergasias Andreas Vlachiotis avlachiotis @ eurobankcards. gr 27. Expertnet Kaliontzoglou Alexander alexandros.kaliontzoglou @ expertnet.gr 28. General Data Business Lessi Alice alessi@gdb.gr 29. Panagiotis Ioannidis Hellasnet ioant@hellasnet.gr 30. HITACHI Moumouris Chris chris.moumouris @ hitachieu. com 31. Ideal Group Panos Vassiliadis panos@idealnet.net 32. Info-quest Georgios Papadopoulos gpap@info.quest.gr 33. Info-quest Harare George george_chararis @ decision. quest.gr 34. Inform P. Lykos Konstantinos Lagios k.lagios @ lykos.gr 35. Inform P. Lykos Spyros Manias s.manias @ InformPS.gr 36. Inform P. Lykos Nicholas Danos n.danos @ lykos.gr 37. Nicos Charalambous Informer ncha@informer.gr 38. Infratech Bereris Spyros info@infratec.gr 39. Intracom Corporal Venus afrodite.dekanea @ intraco m.gr ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 277 40. Intracom Eleftheriou Minos minos.eleftheiou @ intraco m.gr 41. ITEC Ch Theofanis FanisG@itec.edu 42. KPMG Kyriazoglou John jkyriazoglou@kpmg.gr 43. Lino Media Charikiopoulos Peter pharikiopoulos@lino.gr 44. Master Hellas Delapaschos Athanasios tdel@masterhellas.gr 45. Master Hellas Chatzistamatiou Theodore tcha@masterhellas.gr 46. MDI Kipiadis Chris ckip@mdi.gr 47. MDM Pagourdakis John mdm@compulink.gr Deliverable Task C3 'Smart Cards' 54 of 110 final 48. Mellon Technologies Angelos Angelopoulos a.angelopoulos @ mellon.co m.gr 49. Mellon Technologies Delaki Panagiotis p.delakos @ mellon.com.gr 50. Mellon Technologies Marco Vala v.marcou @ mellon.com.gr 51. Mellon Technologies Orfanoudaki Alexia a.orfanoudaki @ mellon.co m.gr 52. Microsoft Hellas Liakos Constantinos kostasl@microsoft.com 53. Microsoft Hellas Dodos George georgedo@microsoft.com 54. Microsoft Hellas Skiathos Maria mariaski@microsoft.com 55. PCS Batoudakis Stavros stavrosb@pcs.gr 56. PCS Penne Spyros spyrosp@pcs.gr 57. Printec A.E. Challak Anthony a.hallak @ printecgroup.co m 58. Siemens A.E. Nick Houliaras nikolaos.chouliaras @ sieme ns.gr 59. Space Hellas Mavroidis P rmav@space.gr 60. Space Hellas Tselios Panagiotis ptsel@space.gr 61. Truth S.A. Mizara Claus vmizaras@truth.com.gr 62. Charles Forst Winbank ForstK@winbank.gr 63. EVENING Xeniotou Beatrice veatrikix@yahoo.com 64. ABG Card Inc. Komninos Dimitris komninos@atekarta.gr 65. METRO Simopoulos Anthony asimopoulos@ametro.gr 66. Gen. Secr Social Insurance Department Transnational Social Insurance Tsamis Friday ptsami@hotmail.com 67. General Cards Inc. George Maris gmaris@geniki.gr 68. PROCEDURE Inc. New Chris info@diadikasia.gr 69. DIAS SA Sidiropoulou ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 278 Panagiota sidiroyg @ diasinterbank. com.gr 70. National School Public Administration apost@ekdd.gr John Apostolakis 71. National Bank of Magadha Claus vmag@nbg.gr Deliverable Task C3 'Smart Cards 55 110 final 72. Police Sfendourakis Constantine sfendour@mopo.gr 73. NTUA embittered John gpik@telecom.ntua.gr 74. Commercial Bank Kotsikopoulou Basilica kotsikopoulou.v @ combank . Gr 75. Commercial Bank Eleni Sotiriou sotiriou.e @ combank.gr 76. Greek Union Anna Banks Garyfallia hbal@otenet.gr 77. Greek Union Banks Vasileios Panagiotidis vpanagio@hba.gr 78. NSS General Registry Catania Stratis sty@statistics.gr 79. C. Vlachopoulos SA Panagiotis Deredinis sales@vlachopoulos.gr 80. KIFKY Sklias Leonidas khykyb@ath.forthnet.gr 81. Loading Vamiedaki Vicky vvam@naftemporiki.gr 82. Panhellenic Federation Hoteliers Rerres Kyriakos pox@otenet.gr 83. University of Patras Dimitrios Serpanos serpanos@ee.upatras.gr 84. Takis Zarifopoulos SA Chatzivagias Manolis infoath@zarifopoulos.com 85. TEI Epirus Meletiou G. gmelet@teiep.gr 86. WTR Mylosis Konstantinos milosis@mopo.gr 87. YEN Sakarellou Helen helsak@mail.yen.gr 88. MTT Maravegias Constantine k.maravegias @ yme.gov.gr 89. Ministry of Development, Secretary Trade Parliaros Constantine parl@gge.gr 90. Michael Karahalios YPESDDA gskp.ggdd @ syzefxis.gov.g r 91. YPESDDA Moschonas Chris c.mos @ syzefxis.gov.gr 92. Ministry of the Interior / NGDD / UNHCR Kingdom John j.vas @ syzefxis.gov.gr 93. Ministry of the Interior / NGDD / ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 279 UNHCR Vlavianos Dimitris d.vla @ syzefxis.gov.gr 94. Ministry of the Interior / NGDD / stop Anthony a.sta @ syzefxis.gov.gr Deliverable Task C3 'Smart Cards 56 of 110 final UNHCR 95. Ministry / NGDE, Department of Information Emmanuel Drakakis mkd@tee.gr 96. Ministry of Labour & Social Insurance, General Secr Social Insurance Gravvanis George gravvanis@ggke.gr 97. Garyfalos John ygary@internet.gr 98. Corot Dimitrios 99. Daniel Labrianidis danoplia@yahoo.com 4.4.3 Conclusions The findings of 4 Consultation on the problems and prospects smart cards in our country may be summarized as follows: The use of smart cards is indicated where data portability The application is essential (or desirable) or the data or applications must be available in more than one information system or a need for off line data information upon request or need increased data security. In all these cases, the smart cards are the best, safest and most effective means of processing and data transfer or high availability applications. It is estimated that smart cards can contribute effectively to: In secure access to personal - confidential data to inefficient management and dissemination of information 's dynamic update information in a safe and timely manner coordination procedures between different in improving relations service providers and citizens The fast and efficient service to all citizens Generally regarded as critical factors retarding the development of intelligent applications cards generally indicate the following: lack of infrastructure lack Standards lack of legislative framework high costs Deliverable Task C3 'Smart Cards' 57 of 110 final ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 280 lack of open operating systems lack of social acceptance In the discussion mentioned the following items of development evaluation technology in our country to some extent weaken the above factors and create a positive outlook for the development of applications smart cards in our country. About the lack of infrastructure cited data: Many thousands of POS terminals market Many thousands of telephone terminals All ATM's are delivered with smart card readers and all banks have plans upgrade of old The new CPU's and keyboards come with built-in readers About the lack of standards to ensure interoperability systems, the data cited: Since the late 90s, ISO and the CEN had been reached standards relating to physical and electrical characteristics of the cards. The effort today is focused on standardizing the technology no longer «Per se», but applications that use it. The International Organisation for Standardization, the European Community - eEurope smart card charter, and many other organizations and agencies agree that the smart card technology is ready to be used effectively in all proposed areas. About the lack of legislative framework, the data cited: The laws have more to do with confidentiality, the confidentiality of sensitive personal data and protection consumer. Many European countries have begun to modernize the legislative framework where necessary (DIR 93/99, Decree 150/2001) About the high cost compared with alternatives, given the elements: A higher initial investment costs effectively reduce costs in production processes operation of the project (management costs, lifetime Card, off line, multiple applications) Falling prices of cards and equipment Deliverable Task C3 'Smart Cards' 58 of 110 final About the "closed" operating systems cards, cited by Java card technology and MULTOS About the problems of acceptance of smart card technology by specific social groups, estimated that the reactions are almost ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 281 disappeared and are familiar because tilektarton, cash cards, SIM Finding general acceptance among the attendees is that maturity The market is the only critical factor for the development and success works today. Specifically, the maturity in the formulation of necessary partnerships to meet the various technical issues as a very small number of strains possessing the required knowledge and well as the use of international / European standards. Deliverable Task C3 'Smart Cards 59 110 final 5 Conclusions and Recommendations Strategy 5.1 General axles (Proposals for the state) Smart cards are selected worldwide as a safe place infrastructure security of information systems, particularly as a means of access open networks. Branches of banks and mobile operators have invest invest billions of euros and new users are Organizations Mass Communications and the Public Sector for a number applications. In Europe and the U.S. and Japan, the responsible government agencies implement large-scale projects with smart cards and promote research and similar development in complementary technologies such as biometrics. In Greece, apart from the telecom operators have made massive investments. Indeed, the success of calling cards to Greece during the last decade has led to the construction of three factories which look at emerging markets. H Working Group of e-business forum, the Ministry of Development, he managed to together for the first time all stakeholders-users, researchers and suppliers of smart cards in the media and exchange views. The Working Group proposed unanimously to continue this effort through: 1. The creation of a non-profit organization that Smart Cards funded by private and public sectors. The purpose of this group is to elaborate issues: staff training in these technologies together academic institutions Promotion of Research and Development ensure the legal and institutional framework line with the European ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 282 ensure interoperability of various infrastructure branches exploring joint investment in various sectors alignment with European initiatives as developed after publication of the Open Smart Infrastructure Cards for Europe as part of the initiative e-Europe. The effort to promote solutions to neighborhood 2. Organizing Greek Conference (possibly exposure products and applications) smart cards that will be repeated annually. 3. To prepare a proposal Greek Research Roadmapping Project, probably within the upcoming project of e-business GSRT. The project must include all players in the Greek Deliverable Task C3 'Smart Cards' 60 of 110 final Market (Academic & Research Institutes, Industries and cards readers, software companies, consultants). Objectives of the project will must be: Smart cards technology foresight for the next 5 years Smart cards business development foresight for the next 5 years Recognition needs to search for the development of Greek Smart Card Industry Identify infrastructure needs and structures to support Entrepreneurship in Greek industry smart card Determination of measures to meet these needs. Pilot efforts to develop technology and applications for Validation of these results 5.1.1 Suggestions for Public Sector The first meeting of the Working Group concerning the Public Sector attended by representatives of 8 ministries and agencies. There is interest for this technology and lack of familiarity of users but also technology risk wasting resources to study and develop separate systems uncooperative or duplication. It is characteristic that the cards tolls Attica Road and National Road Fund do not cooperate. The proposal to create a body to coordinate the development of infrastructure and issuing the cards can prevent such unnecessary wastage. At the same time can be created for this purpose - in the institution - a commission for the purpose only in the public sector. Already at the European level - and acceding countries - are well coordination of such initiatives: The Porvoo Group which brings together 15 countries and aims to trans-European Electronic Identity, aided by European Commission project eEpoch, initiative eEurope Smart Cards ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 283 and other dealing with specific applications such as E-111 card, etc. The proposed body would ensure that no Greek involvement and involvement in all initiatives and antiresonance between these initiatives. In particular there is a participation self-financed by the Greek Ministry of Interior, Public Administration Decentralization and the work eEpoch. A particularly important issue is the transfer of know-how developed internationally in public administration. This can be achieved through a A series of seminars, workshops etc, but especially through some pilot to be implemented at local level in order to gain their own experience. 5.1.2 Information and Awareness The findings of the Smart Card Group, along with their deliverables eEurope Smart Cards, can and should be promoted to all stakeholders. Deliverable Task C3 'Smart Cards' 61 by 110 final They are recording the most relevant information, white papers, proposals and standards in Greece and Europe. The promotion and view should be the first members of the proposed institution. 5.2 Technical Issues - Standards Deliverable in the Open Smart Card Infrastructure for Europe u963 prepared under the initiative e-Europe, a detailed report both the basic technical issues and the standards, and new needs standardization. The initiative involved and participate actively to Standardization key centers such as the CEN / ISSS and ETSI, and many experts participate in committees ISO. As the participation of our country is limited - only two people involved in the committees of eEurope Smart Card Charter and the Hellenic Organization for Standardization not participate in committees smart card standards will be promoted to relevant information stakeholders. Deliverable Task C3 'Smart Cards 62 from 110 final 6 Bibliography - Sources 6.1 Smart Card Marketing Initiatives http://eeurope-smartcards.org/ (The eEurope Smart Card (eESC) initiative, launched in December 1999 by the European Commission. It aims to accelerate and harmonize ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 284 the development and use of smart cards across Europe, etc.) http://smart.gov/ (USA Smart Cards and e-government solutions, etc.) 6.2 Templates - Directions http://www.cenorm.be/isss (CEN / ISSS - provides market players with a comprehensive and integrated range of standardization-oriented services and products, in order to contribute to the success of the Information Society in Europe, etc) http://www.finread.com (Financial Transactional IC Card Reader standards, etc.) www.cepsco.org (The Common Electronic Purse Specifications (CEPS) define requirements for all components needed by an organization to implement a globally interoperable electronic purse program, while maintaining full accountability and auditability, etc.) www.emvco.com (provides information on EMVCo and allows you to view or download Integrated Circuit Card Specifications for Payment Systems and related Type Approval process and requirements specifications, etc.) www.opencard.org (common interface for both the smart card reader and the applications on the card, based on Java technology) http://www.javacardforum.org/ (java card specifications) www.pcscworkgroup.com (promote standard specification to ensure that smart cards, readers and computers made by different manufacturers) http://www.cenorm.be/isss/Workshop/URI/Default.htm (User related information extended to multi-application smart cards) http://www.cenorm.be/isss/Workshop/fastest/default.htm (Facilitating smart card technology for electronic ticketing and seamless travel) http://www.cenorm.be/isss/Workshop/Triangle/Default.htm (Interoperable & multiapplication smart cards related to the mobility of the user) http://www.contactless-club.comm (CLUB is a non-profit association established March 3rd 1995 in Konstanz, born from an initiative of the cities of Venice, Lisbon, Paris and the Bodensee Region. At this time, only a few "pioneer" ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 285 companies had started working on contactless technology applications, and the need for a "gettingtogether" of these pioneers became obvious in terms of reflections and helping each other, etc.) http://www.etsi.org (ETSI - the European Telecommunications Standards Institute is a not for profit organization whose mission is to produce the telecommunications standards that will be used for decades to come throughout Europe and beyond, etc.) http://www.anec.org (The European consumer voice in standardization, etc.) Deliverable Task C3 'Smart Cards' 63 of 110 final www.linuxnet.com (Movement for the Use of Smart Cards in a Linux Environment, etc.) 6.3 International Market Initiatives to promote standards and applications Smart Cards www.smartex.com (Smartex - a global organization - creates and manages forums in which companies and individuals in the smart card industry meet to exchange ideas, learn about new developments, etc.) http://www.apsca.org (The Asia Pacific Smart Card Association is the Asia Pacific division of an international affiliation of Smart Card associations around the world founded by the Smartex organisation (www.smartex.com). Through Smartex, APSCA is affiliated with smart card forums in the United Kingdom, Europe and Southern Africa and has close links with organisations in the USA, etc.) www.eurosmart.com (the voice of the smart card industry) www.scia.org (Smart Card Industry Association, a global trade association provides information on, Smart Card Technology, Applications of Smart Card Technology, Smart Card industry News, Links to other Smart Card sites, SCIA Members & Products, and the SCIA organization, etc.) ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 286 www.smartcardalliance.org (The Smart Card Alliance is the leading notfor-profit, multi-industry association of over 185 member firms working to accelerate the widespread acceptance of multiple application smart card technology, etc.) http://www.globalplatform.org (GlobalPlatform was formed in 1999 by organizations interested in issuing multiple application smart cards to their customers. These founding organizations decided to provide the resources and leadership necessary to move this opportunity forward. A major goal of GlobalPlatform is the definition of specifications and infrastructure for multi-application smart cards, etc.) 6.4 European Research Projects www.cordis.lu/ist/cpt/cpa5r.htm (IST projects "related" to 2000CPA5 Smart Cards and the available fact-sheets may provide useful information for prospective proposers in terms of the kind of ongoing related activities and of the organizations involved, etc) http://www.cordis.lu/ist/projects.htm 6.5 International Market - Manufacturers / Suppliers Schlumberger Sema http://www1.slb.com/smartcards/ Gemplus http://www.gemplus.com/ OBERTHUR http://www.oberthurcs.com SETEC http://www.setec.fi Visa http://www.visa.com/ Deliverable Task C3 'Smart Cards 64 110 final MasterCard http://www.mastercard.com/ American Express http://www.americanexpress.com/ Orga http://www.orga.co.uk/ STMicroelectronics http://www.st.com/ Mondex http://www.mondex.com/ Microsoft http://www.microsoft.com/smartcard/ http://java.sun.com/products/javacard/ 6.6 News - Articles - News www.e-smartransaction.com (Portal for smart cards) www.smartcard.co.uk (Smart Card Group provides international news and ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 287 information about the Smart Card Market, through its popular hardcopy newsletter and its website. SCG issues the following printed publications: Monthly Newsletter, Supplements, Technical Tutorials, Reports, etc.) Deliverable Task C3 'Smart Cards' 65 of 110 final 7 Annexes 7.1 Standards and guidelines for smart cards 7.1.1 General The integrated circuit card using a smart metallic contacts, have been set based on international standards: • VCC - Power Supply Voltage • RST - Reset the Microprocessor • CLK - Clock Signal • GND - Ground • VPP - Programming or Write Voltage • I / O - Serial Input / Output Line • RFU - Future Use Of these only the I / O and the Ground is necessary for the card and should follow international standards, everything else is optional. 7.1.2 International Standards Organization - ISO The global standards set by an organization known as ISO (International Standards Organisation-International Standards Organization), the which is based in Geneva. The agency IEC (International Electrotechnical Commission) is interested in standards in the field of electronics. In many Where standards of both organizations were combined and reported as ISO / IEC standards. The ISO / IEC has appointed a committee JTC1 (Joint Technical Committee), which monitor patterns of computers. Part of this is the JTC1 SC17, o which deals with 'ID cards. The SC17 consists of 6 groups Work (WG). The group WG4 deals with standards of cards Integrated circuit and contacts (Contact Integrated Circuit), while group WG8 deals with standards of wireless smart card (Contactless Integrated Circuit). Deliverable Task C3 'Smart Cards 66 110 final 7.1.2.1 Standard cards with contacts - Contact Card Standards (ISO / ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 288 IEC 7816) ISO / IEC 7816-1:1998 Physical Characteristics of IC cards, physical dimensions o Improvement 1 (1998): Re-issue March 1998 It defines the physical dimensions of the card (width, length and thickness) which are the same as a normal credit card. Additional features referred to in ISO / IEC 7816 -1, and those refer to X-rays, points of contact surface, mechanical power, electromagnetic characteristics and static electricity • ISO / IEC 7816-2:1999 Position of Module and Contacts on IC cards Sets the size and the area in which the contacts are placed • ISO / IEC 7816-3:1997 Electrical specifications and communication protocols o Improvement 1 (1992) Protocol T = 1 o Better 2 (1994): Review of the selection type Protocol o Better 3 (1998): Introduction 3 Volts ICCs Check the characteristics of electrical signals and transfer protocols and the standardization of card «Reply Restore" • ISO / IEC 7816-4:1995 Command set for microprocessor cards o Improvement 1 (1998): Review of Safe Shipping Message (Secure Messaging) Controls: orders between different industries, the specifications of the APDU, historical features «Answer to Reset», the file structures, methods of access and secure messaging • ISO / IEC 7816-5:1994 Application identification Registrar system that holds data for recognition applications and allows several terminals to choose undoubtedly an application from the card • ISO / IEC 7816-6:1996 Inter-industry data elements Provides data elements for sharing Deliverable Task C3 'Smart Cards of 67 110 final • ISO / IEC 7816-7:1999 Inter-industry commands for Structured Card Query Language (SCQL) Sets SCQL and commands that allow the management ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 289 relational databases in the smart card • ISO / IEC DIS 7816-8 Security related inter-industry commands Provides security for commands used between Industries • ISO / IEC DIS 7816-9 Additional inter-industry commands and security aattributes Provides additional security for commands and features used between industries • ISO / IEC DIS 7816-10 Electronic signals and answer to reset for synchronous cards Provides electronic signals and "reset reply" to smart cards using modern data transmission 7.1.3 Standards contactless cards - Contactless card standards The contactless cards are recognized by the Organization ISO (SC17WG18) as "ID cards". The physical characteristics are in line with ISO 7810 and ISO 7813. Their only difference is the thickness of a card and past the card without contact was thicker. There are 3 types of contactless cards that are recognized by the ISO and other relevant agencies. There are 3 different groups dealing with these cards 7.1.3.1 First Team (Task Force 1) This group deals with the strict proximity cards (Close Proximity Cards), which need to be close to the card reader function correctly. • IS 10536 -1 Physical Characteristics Control the physical characteristics of the card but also includes other elements such as profiles of the surface electromagnetic capabilities, and operating temperature • IS 10536 - 2 Dimensions and locations of coupling areas Raises different possibilities • DIS 10536 - 3 Electronic Signal and mode switching Deliverable Task C3 'Smart Cards 68 110 final Is still in its early stages and includes information on electronic signals and reset procedures on the cards their initial conditions • CD 10536 - 4 Is still in its early stages and includes information on protocols, especially for implementing full-duplex communication 7.1.3.2 Second Group (Task Force 2) This group deals with the category "Remote Coupled" cards without contacts, and interesting facts are labeling / handling problems when ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 290 one or more cards are in the "card reader" • CD 14443 - 1 Is still in its early stages and includes information on physical characteristics • 14443 - 2 Is still in its early stages and describe radio frequency interface • 14443 - 3 Is still in its early stages and describe protocols Transport • 14443 - 4 Is still in its early stages and describe characteristics safe transport 7.1.3.3 Third Group (Task Force 3) This group deals with contactless cards operating at a distance. The This group is still in its early stages and there are no Results 7.1.4 Pilot / Check Card - Card Testing • ISO 10373 Refers to methods of control used to control smart cards, such as bending the card horizontal and vertical axis control at different temperatures and humidity, etc. Deliverable Task C3 'Smart Cards' 69 in 110 final 7.1.5 Protocols Messaging - Message Exchange Protocols • ISO 8583 Financial transaction card originated messages - interchange message specification Message standards from financial cards trade - identify and messaging standards • ISO 9992 Financial transaction cards - messages between the integrated circuit card and the card accepting device Card standards for financial transactions - messages between IC card and card reader 7.1.6 Standards for Security Issues - Security Related Standards • ISO 9564 Banking - PIN management and security Standards for banking operations, management and security Personal security code • ISO 9796 IT security techniques - digital signatures Standards for security techniques - Digital signatures • ISO 9797 IT security techniques - data integrity mechanism Standards for security techniques - a mechanism that controls the accuracy ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 291 of stored data using a cryptographic operation • ISO 9798 IT security techniques - entity authentication Standards for security techniques - entity authentication • ISO 10202 Financial transaction cards - security architecture using IC Cards Card standards for financial transactions • ISO 11568 Banking - key management (retail) Standards for banking operations - retail 7.1.7 European Organisation for Standardisation - CEN The standardization of card driven by the Technical Committee (Technical Committee 224 - TC224) of the European Standards Organisation and some groups dealing with the following: • WG1 - Physical Characteristics Cards • WG5 - Primarily to obtain payment messages • WG6 - Surface Machine • ERWG8 - Thin and flexible cards Deliverable Task C3 'Smart Cards 70 from 110 final • WG9 - Applications in Telecommunications • WG10 - Electronic wallet in various fields • WG11 - Applications in transportation • WG12 - Application health The European standards organizations publish standards with the prefix EN. Standards are currently being tested, which can last as a maximum of 3 years and used in areas where technology rapidly growing bear the prefix ENV. All members of CEN should be published EN standards as their own and promote such standards as ISO Two useful standards are EN 726 and EN1546. Deliverable Task C3 'Smart Cards 71 110 final 7.2 Terminology Smart Card Index ABS (Acrylonitrile Butadiene Styrene) Akrylonitriko Voutaniediko Styrene. The plastic used for injection of skeletons of cards for various cards Acceptor earnings. The agency (usually a dealer), who receive a card (for example, a payment). Acquirer Mediator transactions. The Bank, which processes transactions a merchant and forwarding system ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 292 clearance (px clearing system). It may also be a organization that manages the exchange of information and data between a system administrator payment and the person providing the various services. AID Application Identifier. Application identifier. The AID recognizes an application on a smart card. Defined in Standard ISO / IEC 7816-5. Part of AID may enshrined in national or global level. In this case, the application referred to is unique recognizable. The AID consists of two parts: RID (Registered Identifier) and PIX (Proprietary Identifier). ALD (Application Load Certificate) is used by Multos specification and similar systems for "Formalize" an application that is loaded on a card generic Algorithm Algorithm. A mathematical process used to make calculations (in cryptography: algorithm Encryption) Analog Analog. Used as opposed to "Digital" Anti-collision avoidance conflict. An algorithm used to identify two or more wireless smart card when operating simultaneously. Anti-tearing One feature of the card, which protects data in memory when the card depart before completing a transaction. APDU (Application Protocol Data Unit) Application Protocol Data Unit. It is a "Box" database software, used for encapsulation of data, so they can exchanged between a smart card and a terminal. ASIC (Application-Specific Integrated Circuit) integrated Deliverable Task C3 'Smart Cards 72 110 final Special circuits purposes. These circuits minimize production costs by implementing circuits have all the features of high ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 293 Technology Asymmetric Cryptography Symmetrical or asymmetric cryptography (also "Public key cryptography. Refers to the method encryption where there are two encryption keys. One is used to encrypt the text and the other for decryption. ATC (Application Transaction Counter) counter which is media card and increases by one unit each time that a transaction ATM (Automated Teller Machine) special terminal, which placed in public places and enables financial transactions. ATR (Answer To Reset) is a sequence of byte, which sent from a smart card after (hardware) reset. Among other things contains several parameters on the transmission protocol card Authentication Identification. The process of proving the authenticity of a entity (eg smart card or through the holder) using cryptographic methods External Authentication Outdoor Identification. The process used to identify the "outside" world (eg a terminal) by smart card. Internal Authentication Internal Identification. The process used to to establish a smart card that is genuine. BIP (Bearer Independent Protocol) protocol that allows a SIM card to communicate directly with remote servers Black list Black list. H list, usually in a database containing all the cards are no longer authorized use in a system CA (Certification Authority) Certification Authority. The organization that issues certificates and be accountable for liabilities arising from validity of the data holder CAM (Card Authentication Method) Method of Authentication ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 294 card. This method is used to determine If the card is from a valid publisher Card accepter accepting cards. Entity which can use smart cards for a particular Deliverable Task C3 'Smart Cards 73 110 final application Card body House card. Plastic card, the intermediate product in construction of the Smart Card. In the next step construction, incorporating the integrated circuit Card issuer issuers. Entity responsible for issuing smart cards. Typically, the application provider and publisher of same card on a smart card application. Card manufacturer Manufacturer card. The entity, which constructs houses card incorporates an integrated circuit and by implement the plan (eg memory cards) or simply prepare to be scheduled by another entity. Card owner Owner card. It is the natural or legal entity the legal control of the card. In the case of cards debit or credit card, the cardholder is usually the bank issuing the card. Customers use the card is usually just "hold card "(cf. Cardholder). Card possessor main card. The entity that owns a card Card reader apparatus with a relatively simple electrical and mechanical construction that can accept smart cards and to interact them Card user The person using the card. Not necessarily the lawful holder Cardholder Cardholder. Refers to the entity which is real right of possession and use of the card. The cardholder does not need it and cardholder Certificate Certificate. Archive digitally signed by an authority Certification CEN (Centre European pour la Normalisation - European Standards Centre) The European standards body CEN is on Brussels. Consists of all (European) national standards organizations and is the official ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 295 European Union Agency for European standards Challengeresponse Method of identification, the system requires authentication sends a random "challenge". The product identification of object (eg a smart card) calculates "reply" to the "challenge". The system can be confirm the authenticity of the object based on that «Reply. Deliverable Task C3 'Smart Cards 74 of 110 final Chip card card chip. Referred also "smart card", but often used such a way as to include memory cards, which are not 'intelligence' Clearing / Clearance The process of transmission, alignment and validation prompt financial institutions Clearing system Information System, which performs a central implementation arrangements for trade between financial institutions or financial institutions and third Cloning Cloning. Trying to "attack" a system of smart card by copying the ROM and EEPROM memory a true to a fake card CMS (Card Management System) tools and procedures used to develop and manage applications smart cards. To CMS is used primarily for life cycle management of cards and applications their COS (Chip Operating System / Mask) sequence embedded prompt memory ROM of the smart card Confidentiality Confidentiality. Refers to methods and procedures ensuring that information is accessible only by entities authorized to have access Combined Combination Card Card. Smart card which combines the two technologies (with connections and wireless) Contact Smart Card Smart Card contacts. Smart card, which requires physical contact with the reader, to share data Contactless Smart Card ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 296 Without contacts or smartcards. Refers to u954 smart cards, which transmit and receive data using RF Coupler Computer system - implement used to can read the usual wireless smart card CQL (Card Query Language) subset of SQL (Structured Query Language) has been implemented on a smart card CRC (Cyclic Redundancy Check) method of sound transmission Data Cryptography Cryptography. The science and art of transformation strings (eg texts, arithmoseiron etc.) in unintelligible form, for those who do not have adequate mechanism to restore its original form (key) Deliverable Task C3 'Smart Cards' 75 by 110 final CVM (Cardholder Verification Method) Method of Verification Cardholder DDA (Dynamic Data Authentication) Method of certification card using the response mechanism DF (Dedicated File) Organization of memory cards with microprocessor. A DF is a logical entity, which consists of EF (elementary file) The Diffie-Hellman invented public key cryptography Digital Cash (eCash) Digital money that can be stored in a bank account, personal computer or smart card Dual Slot Dual Deposit. Smart card reader that can be 2 use smart cards simultaneously. Used payment systems, to identify the Bank both the merchant and the customer Dual Interface Card (Combicard) Smart Card, which has two media: wired through electromechanical contacts and wireless communication, through an appropriate antenna Duplication (Cloning) Transfer of original data in a second pass to create an identical card e-Cash Digital / electronic money that can be stored in bank account, personal computer or smart card Code.Enas ECC Error Correction Code Error Correction ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 297 detects errors in data in many Where can correct EEPROM (Electrically Erasable Programmable Read-Only Memory) ROM type of memory that can be reprogrammed to applying an electric field EF (Elementary File) Elementary File. Part of the rationale organization of a memory card with a microprocessor, the a similar data file Embedding Integration. The process of integrating a oloklirom__________enou circuit in a smart card body
EMV (Europay – Mastercard – Visa)

A series of international standards for payments based on smart card, developed by the agencies Europay, Mastercard and Visa Encryption Encryption. The transformation process string into unintelligible form using a appropriate key ETU (Elementary Time Unit) Unit Standard Time. The basic Deliverable Task C3 'Smart Cards 76 of 110 final time unit of the smart card, which are all based The timings of the communication card. Defined as the time transfer one bit of data from a smart card Fabrication The fabrication process of integrated circuit smart card Filtered Filtered. Characterization data or functions of the which have been loaded into memory of the smart card Memory Flash Memory which can be written once but be removed, should be deleted corresponding block FRR (False Reject Rate) Unit of measurement error rejection an entity in a system. Used in the main Biometric systems GSM (Global System for Mobile communications, Group Speciale de Mobile)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

298

Cellular system widespread in Europe Garbage Collection Operation type smart card Java Card, which collects the memory no longer in use by an application and converts to free memory for use by other Applications Hard Mask In a smart card with a hard mask the greater part of program code is implemented in ROM memory HSM (Host Security Module) device, used for secure storage of keys and the (internal) implementation of cryptographic functions, driven by a computer Hybrid Card Hybrid Card. Type of smart card that uses two different media. SD. Dual Interface Card ID-I card smart card with an ISO standardized dimensions. IFD (Interface Device) Another reader called smart card Initialization The first stage of issuing cards. The purpose this process is to load data from implementation of smart cards Intelligent memory card Intelligent memory card. An additional memory card detailed logical circuit design that allows / provides additional security features that record the memory usage Integrity Integrity. Refers to methods and procedures Deliverable Task C3 'Smart Cards' 77 of 110 final ensure that the information has been amended only by entities have been appointed to Interoperability Interoperability. The ability of different
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

299

systems manufacturers to interact. ISO (International Standards Organization) The organization ISO including working in the area of smart cards, with to ensure, through the standards requires that the integrated manufacturers, developers and smart card companies follow the same standards ITSO (Integrated Transport Smart Card Organisation) body founded in the UK to help deployment of smart card systems to media transport ITU (International Telecommunications Union) Body coordinates, standardizes, and creates the world telecommunications A Java Card specification for implementing a subset of Java language on a smart card JCRE (Java Card Runtime Environment) The execution environment which runs Java Card. The JCRE responsible for any management actions such as loading and initialization of applications Key management Key management. All management functions related to the creation, distribution, storage, update the cryptographic keys Key escrow method of filing the private key to a third party usually to ensure recovery of data has been encrypted or signed with the private key. The filing of the private key, especially in the case of use electronic signatures, is prohibited in most jurisdictions. Lifecycle Lifecycle. Refers to the stages of preparation operating a smart card, since the construction of an integrated, up withdrawing from the use and destruction of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

300

MAC (Message Authentication Code) Identification Code Message. Process, usually by using algorithms encryption, which guarantees that the message comes the original recipient, but has changed to course Magnetic Strip Card Card with magnetic strip, on which data can be stored and read Deliverable Task C3 'Smart Cards' 78 by 110 final Memory card Memory card. Refers to cards that contain only selective memory and logic built into the hardware (Hardwired logic). It is used in contradistinction to the term chip card or smart card, which indicated the ability processing MF (Master File) is the root directory of the tree file that implements the logical organization of a memory smart card. The main file is automatically selected each time starts the smart card Microprocessor Card Card microprocessor. Card which includes: Processor (CPU), memory (RAM, ROM, EEPROM) and selective arithmetic coprocessor (NPU, numerical coprocessor), which allows direct execution of algorithms. It is used in contradistinction to the term "Memory Card» (Memory Card). Mono-application smart card Single smart card application. Card is ability to execute a single application, usually preinstalled in this Mono-functional smart card
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

301

Smart card single operation. Card whose operating system supports only one specific application Multi-application smart card Smart Card Multiple Applications. Refers to younger generation smart cards, which allowed to perform multiple applications from different manufacturers, unlike previous ones, which executing applications on a single manufacturer Multi-functional smart card Card of which operating system supports more than one application and contain adequate management functions to record and delete applications and files mP card different name on the card mikroexergasti. SD. Microprocessor card Non-Volatile Memory Stable memory. It refers to memory which maintain their data when power is interrupted (as in example, data stored in memory a smart card) Numbering Numbering. Is making up the numbers Smart cards OCF (OpenCard Framework) architecture for cards and terminals is designed to standardize the terminal Applications Open application applications in the smart card to make it available to u954 Deliverable Task C3 'Smart Cards 79 110 final various service providers without having to mutual legal relationship between Optical memory
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

302

card Optical memory card. Card, in which information is enrolled in a reflective surface visually, similar to the operation of the CD. OSI (Open Systems Interconnection) model of the ISO organization Communications PAC (PIN Authentication Code) Code Certification Personnel Password Padding A method whereby one or more bit add a message to acquire size required Passivation layer mattress hibernation. A material that covers the integrated circuit card to be resilient to the effects of external environment PCC (Proof-carrying code) code which includes proof of compatibility with a given security policy PC / SC Architecture communication terminals and smart cards. The PC / SC was proposed by Microsoft and others Manufacturers of smart cards and PC to standardize the interfaces and hardware Software smart cards to communicate with PC PKCS (Public-Key Cryptography Standards) Informal standards relating to cryptography public kleidiou.Echoun published by the company RSA Inc PKI (Public Key Infrastructure) Public Key Infrastructure. It shall apply in the case of asymmetric encryption and refers to the existence of a pair of keys, the public and private) for security. Composed by appropriate software and hardware.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

303

Plug-In Smart Card with a small shape and arrangement used especially for mobile phones Processor card SD. Microprocessor card PVC (Polyvinyl Chloride) polyvinyl chloride. The plastic from which made the body of the smart card RAM (Random Access Memory) Random Access Memory RISC (Reduced Instruction Set Computer) architecture A Computer Design Retry Counter Counter efforts. Meter, comprising Deliverable Task C3 'Smart Cards' 80 of 110 final negative work / results and decide whether any key will continue to be used. If surveyor reached the maximum number of unsuccessful u964 efforts since the key is disabled and can not unusable ROM (Read Only Memory) read-only memories. A type memory, where data originally entered can only be accessed RSA (Rivest-Shamir-Adleman) encryption algorithm public key, which takes its name from the three inventor, the Rivest, Shamir and Adleman SAM (Security Access Module) module, which is used as part of a terminal for the safe storage keys and algorithms SDA (Static Data Authentication) The method of identifying a card by signing a copy from selected card data Secret Key Secret key. 1. The public key encryption key which must remain secret. 2. The key to symmetric encryption key. In this case the key must remain secret Session Session. Refers to the time between two reset a card or the
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 304 time between the supply (power up) and Cut-off (power down) SET (Secure Electronic Transaction) Secure Electronic Transaction. Protocol developed by MasterCard and Visa for sending encrypted numbers credit cards via the Internet (Internet). According the SET, the merchant never learns and the number of credit card, thus reducing the risk of fraud SHA1 (Secure Hash Algorithm 1) NIST standard body of U.S., which refers to the creation of cryptographically coin safe (small data) from more dataset Signed Applets Signed Applications. Refers to Java applications or Java Card, which are accompanied by digital signature. The signature proves the identity of the manufacturer application or distributor SIM (Subscriber Authentication Module) Authentication Module Subscriber SMG9 (Special Mobile Group 9) team of experts determine the specification of interactions between smart cards Deliverable Task C3 'Smart Cards' 81 by 110 final and mobile phones Super Smart Card Indicates a smart card with embedded complex elements, such as display and numerical pliktrologio SVC (Stored-Value-Cards) Term used for Prepaid cards have a predetermined value and used __________mechri exhaustion of that value TASI (Terminal Application Services Interface) The way an application which interfaces with the "outside world" TC (Transaction Certificate) Certificate of Transaction TTP (Trusted Third Party) Tuesday Trusted Entity Transfer Card movement. It is a smart card, which used as a means of transferring data between two entities. Usually contains a large memory data this purpose and typically contains keys for identification entities and their actions (read / write data) Transmission Protocol Transfer Protocol. The set of rules for transmission used for data transfer between terminal and smart card Application Verifier that processes the incoming code and ensure compatibility with the planned safety Virgin Card Card which is not yet the microprocessor and not yet personalized Volatile Memory Unstable memory. It refers to memories that lose their data when power is interrupted (such as memory RAM of a personal computer) VOP (Visa Open Platforms) ambiguous system architecture which allows the rapid development of global practices Smart card systems White List White list. The list, usually in a database, which contains all the cards may be used in a This system WORM (Write Once Read Many) refers to the memory of the smart Cards can be written on the card only once and read many Deliverable Task C3 'Smart Cards' 82 by 110 final 7.3 Questionnaires Consultation on Smart Cards 7.3.1 Questionnaire for consultation on smart cards with the "Public Administration » Working Group C3 "Smart Cards" in e-businessForum invites stakeholders to submit views and comments building on the following questionnaire: Contact details of person completing questionnaire: Name: Title / Position: Organization: Phone: e-mail: Body Type: Ministry utilities Regional Administration / Local ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ, ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ, 305 Government Other Date completion: 1. Services, products, or smart card applications offered or function

Q1: Describe the services, products or applications, smart cards have complete or offer. If you do not continue to question Q9. Deliverable Task C3 'Smart Cards 83 110 final Q2: What are cooperating agencies in the implementation or provision of services, products or smart card applications. Q3: What are the end users. Q4: Which actors involved in the development of user requirements and what method used for collecting user requirements (eg survey, mapping processes and user behavior); Q5: What are the signs of use (eg home, kiosks, point of transaction presence of an operator) Q6: Please provide figures for use. Card Number: number of card readers: number of transactions: Q7: Please indicate any problems you find that preventing adequate dissemination and use of these services and applications from end users. Deliverable Task C3 'Smart Cards' 84 of 110 final Q8: Please provide a summary of technologies using smart cards (Eg contact, contact less, way of reading cards) 2. Future development plans and infrastructure services Q9: Please research - pilot projects, services or applications Smart Cards are planning to develop and provide in the Operational Programme Information Society or other program. Q10: Do you see a demand for such services and applications? Yes No. If yes, provide a list of , . priority order. Q11: Who are the stakeholders in the implementation or provision of services products and smart card applications planned. Deliverable Task C3 'Smart Cards 85 from 110 final Q12: What are the end users. Q13: Which players will participate in the formulation of requirements users and what method of collecting user requirements to be use (eg research, surveys and behavioral processes users)? Q14: What will be the points of use (eg home, kiosks, point transactional presence of an operator) Q15: Please provide an assessment of quantitative data (eg card number, number card readers, number of transactions). Card Number: number of card readers: number of transactions: Q16: Identify the issues that might be considered difficult for
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

306

implementation or provision of services, products or smart card applications. Q17: Provide a summary of the Smart Card technology to be use (eg contact, contact less, way of reading cards) Deliverable Task C3 'Smart Cards' 86, 110 final Q18: Has your agency organized structure or personnel with the necessary expertise to implement or provide services, products or smart card applications Yes , No. . If yes, briefly describe. Q19: It is estimated that there is a need for a scientific - Steering Committee will monitor and support the Smart Card projects in our country; Yes , No. . Q20: Comments Deliverable Task C3 'Smart Cards' 87 of 110 final Deliverable Task C3 'Smart Cards 88 from 110 final 7.3.2 Questionnaire for consultation on smart cards with the "Buy & Research » Working Group C3 "Smart Cards" in ebusinessForum invites stakeholders to submit views and comments building on the following questionnaire (for any clarifications - B. Karounos, karounou@netmode.ntua.gr, tel 0973 53 35 14) Contact details of person completing questionnaire: Name: Title / Position: Organization: Phone: e-mail: Body Type: Research Laboratory University Research Laboratory Research Center Software Company Consulting Company System Integrator Society of cards Unit production Cards Other Date completion: 1. Services, products, or smart card applications offered, have implemented pilot or operating Q1: Describe the services, products or u949 smart card applications that you complete or offer. If you do not continue to question Q9. Deliverable Task C3 'Smart Cards' 89 of 110 final Q2: What are cooperating agencies in the implementation or provision of services, products or smart card applications. Q3: What are the end users. Q4: Which actors involved in the development of user requirements and what method used for collecting user requirements (eg survey, mapping processes and user behavior); Q5: What are the signs of use (eg home, kiosks, point of transaction presence of an operator) Q6: Please provide figures for use. Card Number: number of card readers: number of transactions: Q7: Please indicate any problems you find that preventing adequate dissemination and use of these services and applications from end users. Deliverable Task C3
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

307

'Smart Cards' 90 of 110 final Q8: Please provide a summary of technologies using smart cards or offer. 2. Future development plans and infrastructure services Q9: Please research - pilot projects, services, products or smart card applications that you plan to develop and provide. Q10: Do you see a demand for such services and applications citizens and the administration? Yes , No. . If yes, please provide a list of priority order. Q11: Who are the stakeholders in the implementation or provision of services products and smart card applications planned. Deliverable Task C3 'Smart Cards' 91 of 110 final Q12: What are the end users. Q13: Which players will participate in the formulation of requirements users and what method of collecting user requirements to be use (eg research, surveys and behavioral processes users)? Q14: What will be the points of use (eg home, kiosks, point transactional presence of an operator) Q15: Please provide an assessment of quantitative data (eg number _________karton, number card readers, number of transactions). Card Number: number of card readers: number of transactions: Q16: Identify the issues that might be considered difficult for implementation or provision of services, products or smart card applications. Deliverable Task C3 'Smart Cards 92 of 110 final Q17: Provide a summary of the Smart Card technology to be use or offer. Q18: Has your agency organized structure or personnel with the necessary expertise to implement or provide services, products or smart card applications Yes , No. . If yes, briefly describe. Q19: It is estimated that there is a need for a scientific - Steering Committee will monitor and support the Smart Card projects in our country; Yes , No. . Q20: Comments Deliverable Task C3 'Smart Cards 93 from 110 final Deliverable Task C3 'Smart Cards, 94 of 110 final 7.3.3 Questionnaire Consultation on Smart Cards with "Banks Telecommunication » Working Group C3 "Smart Cards" in ebusinessForum invites stakeholders to submit views and comments building on the following questionnaire: Contact details of person completing questionnaire: Name: Title / Position: Organization: Phone: e-mail: Body Type: Bank Company Management Card Company Service Card Date completion: 1. Services,
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

308

products, or smart card applications offered, have implemented pilot or operating Q1: Describe the services, products or applications, smart cards have complete or offer. If you do not continue to question Q9. Q2: What are cooperating agencies in the implementation or provision of services, products or smart card applications. Deliverable Task C3 'Smart Cards 95 from 110 final Q3: What are the end users. Q4: Which actors involved in the development of user requirements and what method used for collecting user requirements (eg survey, mapping processes and user behavior); Q5: What are the signs of use (eg home, kiosks, point of transaction presence of an operator) Q6: Please provide figures for use. Card Number: number of terminals accepting cards: number of transactions: Q7: Please indicate any problems you find that preventing adequate dissemination and use of these services and applications from end users. Q8: Please provide a summary of technologies using smart cards or offer. Deliverable Task C3 'Smart Cards 96 110 final 2. Future development plans and infrastructure services Q9: Please research - pilot projects, services, products or smart card applications that you plan to develop and provide (Eg debit, credit, electronic wallet, key web-banking, loyalty, transport, etc.) Note: The data will fill kept strictly confidential. Q10: Who are other stakeholders in the implementation or provision of services, products or applications, smart card programming. Q11: What are the end users. Q12: What will be the points of use (eg point of sale, machinery ATM, home, kiosks, ..) Deliverable Task C3 'Smart Cards' 97 in 110 final Q13: Please provide an assessment of quantitative data (eg card number, number card acceptance terminals, expected number of transactions). Card Number: number of terminals accepting cards: expected number of transactions: Q14: Identify the issues that you think that might be difficult for implementation or provision of services, products or smart card applications. Q15: Provide a summary of the Smart Card technology to be use or offer (eg, types of cards, contact cards, etc.) Q16: Has your agency well-organized structure or personnel with necessary expertise to implement or provide services, products or u949 smart card applications or
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

309

should be trained in the current staff or to recruit and another Yes , No. . Give a brief description of the response Deliverable Task C3 'Smart Cards' 98 of 110 final Q17: Do you think that there is a need for a coordinating committee monitor and support the implementation of Smart Card projects in our country; Yes , No. . Q18: Comments Deliverable Task C3 'Smart Cards' 99 by 110 final 7.4 Respondents to the questionnaires 7.4.1 Questionnaire for consultation on smart cards with the "Buy & Research » The questionnaire was answered by the following: Body Body Type Manager e-mail 1. Laboratory Network Communications Section Information University Athens Research Laboratory Universities Anastasios Ioannidisaioann@di.uoa.gr ICCS - NTUA Research Laboratory Universities Despina War Despina.polemi @ expertnet.net.gr 3. NETMODE - ICCS - NTUA Research Laboratory Universities Basilica Karounos karounou@netmode.ntua.gr 4. Section Engineering Information and Communication Systems University Aegean Research laboratory Universities Lambrinoudakis Konstantinos clam@aegean.gr 5. ASYK Company SA Software / Company Consultants / System Integrator Konstantinos Karanasios k.karanassios @ asyk.ase.gr 6. Expertnet SA Company Advisers Despina War Despina.polemi @ expertnet.net.gr 7. M.D.I. SA System Integrator Chris Kipiadis xkip@cpi.gr 8. topos communications Company Software / Apostle Feroukas apos@n-topos.gr 9. DESPEC MULTIMEDIA SYSTEMS Company Software RODOLFO ONTONI Rodolfo@despecmulti.gr 10. ID SYSTEMS SA System Integrator AMPATZIS KONSTANTINOS
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

310

ampatzis@angelopoulos.gr 11. Systema Technologies S.A. Company Software / System Integrator /Company disposal Cards Anastasios Charissis tasos@systema.gr 12. Mellon Technologies System Integrator Angel Angelopoulos a.angelopoulos @ mellon.com.gr 13. GREEK ORGANIZING ( HOTech) Company Software / Company Consultants / system Integrator GALERIDIS DIMITRIS dgg@hotech.gr info@hotech.gr 14. ADACOM SA Company Software / System Integrator /Company disposal Cards P. Vassiliadis panos@idealnet.net 15. HELLASNET SA FORTHNET) Panagiotis Ioannidis ioant@hellasnet.gr 16. Microsoft He Society Software Athanasius Vamvakas athvam@microsoft.com 17. DATAMED A.E. System Integrator Sotiris Pavlopoulos spav@datamed.gr 18. BYTE A.E. System Integrator Cheropoulos, Konstantinos khairop@byte.gr 19. Computer science Expertise Company Software Alexander Pantelakis apantelakis@multiland.gr 20. INTRACOM Freedom Velidou 21. ARCADIA TECHNOLOGIES SA Company disposal Card / Unit production Cards Theodore Kouroglou tkouroglou@arcadiagrp.gr 22. ENVIRONMENT SA Unit production Cards FLOKOS DIMITRIS cards@angelopoulos.gr
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

311

23. LYCOS GROUP Unit production Cards Andreas cheese pieces a.tirakis @ lps.gr 24. ATMEL HELLAS A.E Company production Integrated Circuits smart Cards JOHN BOURNAKAS ybournakas@patras.atmel.com Deliverable Task C3 'Smart Cards 102 110 final 7.4.2 Questionnaire Consultation on Smart Cards with "Banks - Telecommunication » Body Body Type Manager email 1. Cards Division,Piraeus Direct Services Company Management Cards Sap, Siwarde sapsiwarde@e-phonia.gr 2. Cosmote Company Provider Services Cards Spiro Magoulas smagoulas@cosmote.gr 3. EUROBANK CARDS Bank Oikonomaki MICHAEL T meconomakis @ eurobankcards. Deliverable Task C3 'Smart Cards' 7.5 Minutes of working group meetings 7.5.1 Proceedings of the 1st Meeting, 05 June 2002 Present B. Karounos (NTU), pp Karapetsas (APRC), A. cheese pieces (Inform P. Lykos), D. Rooster (Intersys SA), G. Bobolou (Intracom), K. Karanasios (ASYK SA), C. Sioulis (D.S.A.), A. Vogiatzis (Univ. of Patras), C. Tsiambaos (Accenture), I. Tsoronis (Systema Informatics), D. Gouskos (Univ. of Athens), D.Stathopoulou (e-Business Forum). When the meeting was a summary of attendance and the scope and objectives of the group. In the discussion that followed was broken for the work to be completed by the end of the cycle of the working group. Also proposed to place an event on the first Smart Cards 15-day in July. Scheduling and distribution operations in the Working 1. Create a glossary of Mrs. K. Tsiambaos and Mr. A. Vogiatzis.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

312

2. Play CD's and send on the e-Europe Smart Cards by Mrs. D. Stathopoulos. Send e-mail to all team members to register now Links importance beyond those of the e-Europe Smart Cards by B. Karounos 3. Summary and classification of subjects of the CD on the eEurope Smart Cards and other important Links by Mr. Ch Sioulas, A. cheese pieces, V. Karounos D. rooster. 4. Topics to be presented at the event in July by Mr. S. Karapetsas The next meeting of core members is scheduled to Wednesday, June 19 ________kai at 16:00 at the offices of GRNET SA Mesogeion 56 Ambelokipi. 7.5.2 Proceedings of the 2nd Meeting, June 19, 2002 Present: B. Karounos (NTU), pp Karapetsas (APR), P. Pantis (Inform P. Lykos), D. Rooster (Intersys Inc.), K. Karanasios (ASYK SA), C. Sioulis (D.S.A.), A. Vogiatzis (Univ. of Patras), C. Tsiambaos (Accenture), I. Tsoronis (Systema Computing), G. Chasapidis (World Organization of Greek Kyvernonafton (P.O.T.E.K)), N. Saridakis (YPESDA), D. Stathopoulos (eBusiness Forum). Deliverable Task C3 'Smart Cards' 104 of 110 final At the beginning of the meeting was the presentation of two new team members Work Chasapidi C. and N. Saridaki and then discussed the following topics: Minutes of previous meeting
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

313

All participants agreed the minutes of the previous meeting. Update on progress of sub-groups • «Handbook for smart cards The Tsiambaos Ms. K. and Mr. A. Vogiatzis submitted draft Handbook, which were discussed and suggestions for improvement. The new version will be sent to States within 10 days. • «Sort of important links» Messrs. Ch Sioulas, A. cheese pieces, V. Karounos D. rooster submitted plan Classification of important links suggested by members of the group, discussed and made suggestions for improvement. The new version will be sent to States within 10 days. Information about the meeting in Madrid eEurope - Smart Cards Charter by Mr. St. Karapetsas The meeting in Madrid that: • Planning meeting of the eEurope - Smart Cards Charter in Athens in the spring of 2003, which will become the overall result Action 2000-2002 and planning within the eEurope2005. • Informing the public sector for work eEpoch (e identity) and a proposal to implement a pilot basis of the standards the eEpoch (own resources). • Create a Commission to investigate / promotion issue "Smart Card E111" - with members of the (initial): G. Chasapidis D. cocks, Sagkrioti T., T. Tsoronis, K. and B. Tsiambaos Karounos. Planning meeting - consultation on smart cards Decided to make a closed meeting - consultation with Public Sector, entitled "Smart Cards - Public Administration
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

314

on July 18 2002, 9:00 a.m. to 1:00 pm with the following key areas: international experience, key issues in implementing applications and Greek reality - works programmed in the public sector. It is a collaboration of ebusinessForum and YPESDA. The Organizing Committee are the B. Karounos, St. Karapetsas N. Saridakis, K. Karanassios. The next meeting was set on July 9, 2002 at 4:00 pm at the offices GRNET SA Mesogeion 56 Ambelokipi. 7.5.3 Proceedings of the 3rd Meeting, July 9, 2002 Present: Deliverable Task C3 'Smart Cards' 105 of 110 final B. Karounos (NTU), pp Karapetsas (APR), P. Georgiadis (University Athens), D. Gouskos (Athens), E. Vellidis (INTRACOM), B. Mizara (TRUTH AE), University Pantis (Inform P. Lykos), Ch Sioulis (D.S.A.), A. Vogiatzis (Univ. of Patras), C. Tsiambaos (Accenture), I. Tsoronis (Systema Computing), G. Chasapidis (World Organization of Greek Kyvernonafton (P.O.T.E.K)), N. Saridakis (YPESDA), D. Stathopoulos (eBusiness Forum). Topics: Minutes of previous meeting All participants agreed the minutes of the previous meeting. Update on progress of sub-groups • «Handbook for smart cards The Tsiambaos Ms. K. and Mr. A. Vogiatzis filed the 2nd edition of Handbook, which will be sent to all members for suggestions
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

315

for improvement. The next improved version will be distributed at the meeting consultation with Public Sector, entitled "Smart Cards in Public Administration on 18 July 2002 and placed on the page of the Working Group. • «Sort of important links» Today was the first major approach to classification of links and placed on the page of the Working Group. Organization meeting - public consultation on 'Smart Cards in Public Administration Finalized the invitation and program of public consultation On "Smart Cards in Public Administration", to be held on 18 July 2002, 9:00 a.m. to 1:00 pm at Hotel Holliday Inn (room Cosmos A) with participation of two speakers from the eEurope Smart Card Charter (Jan van Arkel & Lutz Martiny, co-chairman - eEurope Smart Cards Charter), who will present the international experience Key issues and the implementation of smart card applications, respectively. Public Consultation Questionnaire Discussed and agreed the questionnaire will be sent to operators, which will form the basis for consultation Planning consultation with the banking sector, telecommunications, marketing and research. Decided to conduct three public consultations with the banking sector and telecommunications market research September - October. The next meeting was set on August 27, 2002 at 4:00 pm at GRNET SA offices Mesogion 56 Ambelokipi. 7.5.4 Proceedings of the 4th Meeting, August 27, 2002 Present:
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

316

Deliverable Task C3 'Smart Cards 106 110 final B. Karounos (NTU), pp Karapetsas (APR), P. Georgiadis (University Athens), E. Vellidis (INTRACOM), B. Mizara (TRUTH AE), D. cock (Intersys SA), A. Vogiatzis (Univ. of Patras), C. Tsiambaos (Accenture), I. Tsoronis (Systema Informatics), G. Chasapidis (World Organization of Greek Kyvernonafton (P.O.T.E.K)), N. Saridakis (YPESDA). Topics Minutes of previous meeting All participants agreed the minutes of the previous meeting. General assessment of the meeting - public consultation on the "Smart Cards in Public Administration All participants agreed that the meeting was successful - it good turnout of executives of public and parastatal and presentations for foreign speakers were very informative. The presentations - attitudes of executives in the public sector was relatively limited. We prepared a detailed report of the meeting until next meeting. Questionnaire Public Consultation Public Administration Since nobody responded to completion of the questionnaire, sent prior to the meeting discussed and agreed process of promoting the questionnaire from both Public bodies - ministries participated in the meeting on 18/7/02 as and others who design projects using smart cards. The process
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

317

is: i. Contact with public institutions - ministries involved in meeting and cooperation in completing the questionnaire by group members (B. Karounos, S. Karapetsas B. Myzaras E. Vellidis). ii. Contact the Society SA (Mr. Drinos) for recording projects using smart cards and not recorded. (V. Karounos) iii. Contact the Managing Authority of IS for recording projects using smart cards and not recorded. (V. Karounos) The aim is to complete the questionnaire by all public bodies Ministries of planning or planning projects using smart cards to identify areas of potential synergy between them. Planning consultation with the banking sector, telecommunications, marketing and research. Decided to conduct two public consultations on Banking Sector telecommunications and market - Research in the last week of September and first week of October. Members of the Working Group made the following tasks: Deliverable Task C3 'Smart Card 107 of 110 final i. Training for state recipients' banking sector Telecommunications (D. cocks, S. Karapetsas) ii. Training for state recipients' market - research (S. Karapetsas, B. Karounos E. Vellidis) iii. Training questionnaire consultation 'banking sector Telecommunications (S. Karapetsas) iv. Training questionnaire consultation 'market - research (B. Karounos)
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

318

These will be sent to all members by Friday 6 / 9 and finalized at the next meeting. Manual "Smart Cards" The Mr. Tsiambaos will incorporate the comments suggestions - fill in Manual for "Smart Cards", which took time. The next meeting was set on September 10, 2002 at 4:00 pm at GRNET SA offices Mesogion 56 Ambelokipi. 7.5.5 Proceedings of the 5th Meeting, September 10, 2002 Present: B. Karounos (NTU), pp Karapetsas (APR), P. Georgiadis (University Athens), D. cock (Intersys SA), A. Vogiatzis (Univ. of Patras), G. Chasapidis (World Organization of Greek Kyvernonafton (P.O.T.E.K), P. Pantis (INFORM P. Lykos), Ch Sioulas (ASYK SA). Topics Minutes of previous meeting All participants agreed the minutes of the previous meeting. Public Consultation "Smart Cards - Buy & Research Were informed about the actions they have done to organize consultation. The invitation and the questionnaire sent to 160 recipients (Mainly universities and research centers and institutions involved in European research programs). Decided to send the invitation and the questionnaire to clubs APR SESME GCS and to notify their members. Also discussed the preliminary program of consultation, which will finalized on Monday, 30 / 9. Public Consultation "Smart Cards - Banks & Telecommunications» The consultation on 'Smart Cards - Banking & Telecom, will become the Wednesday, October 9, 2002, 3:00 pm - 7:00 pm, at the central hotel of Athens.
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

319

Over the next few days will define the place of consultation. Decided to send the invitation and the questionnaire to state recipients has been developed so far. (14 recipients) The next meeting on the discussion on the program of consultation "Smart Cards - Banking & Telecom" will be held on Wednesday 2/10/2002, 7:00 pm at the Holliday Inn, at the end of the consultation on 'Smart Cards market

& Research. 7.5.6 Proceedings of the 6th Meeting, October 2, 2002 Present: B. Karounos (NTU), pp Karapetsas __________( APR), P. Georgiadis (University Athens), D. cock (Intersys SA), A. Vogiatzis (Univ. of Patras), G. Chasapidis (World Organization of Greek Kyvernonafton (P.O.T.E.K), K. Tsiambaos (Accenture), E. Vellidis (INTRACOM) Sioulis C. D. Stathopoulou (e-Business Forum). Topics Minutes of previous meeting All participants agreed the minutes of the previous meeting. Assessment of public consultation "Smart Cards - Market & Research Expressed by all members present group expressed satisfaction both for participation and for the concerns and issues discussed Public Consultation "Smart Cards - Banks & Telecommunications» Were informed about the actions they have done to organize Consultation: The invitation and the questionnaire sent to 14 recipients. It also discussed the preliminary program of consultation, which will be finalized on Monday 7/10/2002. Public Consultation, "all involved" Consultation with all stakeholders will be held Wednesday, the 30th October 2002, 9:00 a.m. to 2:00 pm, at the Hotel Holliday Inn. Deliverable Task C3 "Smart Cards" 109 by 110 final was decided to send an invitation to all players who were invited in previous consultations and agencies involved in previous consultations. It also decided to issue the relevant Bulletin Press the next meeting on the discussion on the consultation program "Smart Cards - All Stakeholders" will be held on Wednesday 9/10/2002, 7:00 pm at the Holliday Inn, at the end of the consultation on 'Smart Cards Telecommunication & Banking " 7.5.7 Proceedings of the 7th Meeting, October 9, 2002 Present: B. Karounos (NTU), pp
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

320

Karapetsas (APR), P. Georgiadis (University of Athens stimio) D. cock (Intersys SA), A. Vogiatzis (University stimio Patras), G. Chasapidis (World Organization of Greek Kyvernonafton (P.O.T.E.K), K. Tsiambaos (Accenture), E. Vellidis (INTRACOM), N. Saridakis (YPESDA) Sioulis__________ C. D. Stathopoulou (e-Business Forum). Topics Minutes of previous meeting All participants agreed the minutes of the previous meeting. Assessment of public consultation "Smart Cards Banking & Telecommunications » Expressed by all members present group expressed satisfaction with the participation of representatives from banking and telecommunications operators and their own institutions, but the thinking and the issues discussed focused mainly on the need for partnerships between institutions to promote investment and application of smart cards. Public Consultation, "all involved" were informed about the actions they have done to organize the consultation: The invitation will be sent out to all players who were invited in previous consultations and agencies involved in previous consultations. Also decided to issue relevant Press Releases Complaints epilythei http://www.kepka.org/Grk/support/Complaints/c0412.htm The KE.P.KA. protect consumer rights and intervene in its favor. When the consumer is not satisfied with the quality of services or goods received, the mediated KE.P.KA. solves. Daily advice to consumers, inform and receive many complaints. Of these, a significant number of resolved quickly and with only a simple intervention by the KE.P.KA. Some, however, differences require special effort to solve them. Below indicatively some interesting cases: Financial Services The KE.P.KA. received the following consumer complaint, relating to aggressive credit card issuing banks, which no one knew what it is because the card appeared a "plain logo. "We back the card you edited irregularly (because there was none at my request) in my name and I reserve all my legal rights. We inform you that a complaint was made in KE.P.KA. - Consumer Protection Center because in your letter does not indicate either a bank or lending rate. We send a registered letter and the documents you and please do not repeat. "
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

321

Once discovered, after communication with the Bank of Greece, which bank was, I forwarded the complaint on December 8, 2005, the General Secretariat for Consumer Affairs, the Union of Greek Banks and the Ombudsman for Banking - Investment Services. The bank responded to us with a bulky letter, which, however, did not give any substantive response to complaints. The KE.P.KA. in the letter of reply, to the bank, said: ... In response to your letter of 18/1/2006, we note that the information consumers were completely inadequate: 1. Consumers do not have to know the logos of banks. 2. Nor, in a letter accompanying the card, or the response file, the name of the Bank. Concerned only the logo, which does not mean anything for the consumer. 3. In all your mail, nothing tells the consumer, to rate SEPPE, right of withdrawal, the identity provider and all its elements, such as those arising from N.2251/94 on Canvassing contracts and contracts from a distance . 4. It also appears as the reasonable question why the consumer is not received by you, a copy of the alleged contract consumer loans and credit cards? 5. Sending credit cards, including PIN, by ordinary mail in accordance with the complaint, sent to 216/6.1.06 our paper, the Ministry of Development, and the numerous telephone complaints we receive in KE.P.KA. We invite you, then fix your practice and adjust to the Greek legislation on consumer protection. Following this letter, the Bank has undertaken: "... We would like to inform you in writing that on the reactions we received from you and other consumers, considering that the method of communication and delivery of our credit card, though lawful, was not sufficient for the general public, we decided to change the first letter of communication with our customers and since last February has been put into production. The new way of communication, the card is now sent via registered mail while the client is informed of the reason the mission name (reminder of its contract), it is even clearer that the card is issued to our table, and how to activate the card by phone, while the file is already included in the brochure repeat the terms of use, regardless of whether the customer has activated or not. Examples of a consumer loan and credit card, signed with our customers and the new first letter of
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

322

communication are available on request. I say not willing to take into account any of your observation for the purpose of improving services offered to consumers and our customers. We are at your disposal for any clarification " A consumer canceled her credit card, having arranged all the debts. Six years after the cancellation, received a bill, which had seemed to 23.94 euros. In this account, says the date of the previous account, which was, indeed, 6 years ago. Concerned that a consumer has used the KE.P.KA. which, with the assistance of the Banking Ombudsman, secured the removal of the alleged debt and a discharge certificate, so that a consumer be enforced, against any arbitrary action by the Bank in future. Credit card For a credit card from a bank, was a prerequisite for the consumer or underwriting of real estate. The consumer, listening, random, a member of KE.P.KA. explaining that there is no compulsory insurance for a credit card, called the bank, cancel the policy, cancel the amount charged in the card. The bank refused, and for this reason, the Consumer sent in KE.P.KA. with the operation of which, the Consumer acquitted from the charge, and the policy canceled. Consumer member KE.P.KA. lost her credit card, when he stole his professional bag. Soon realized the theft, or 17 hours later, alerted the bank that issued the card. The next day, the bank issued a new card and sent it by registered letter. However, a month later, the Consumer was informed by a detailed account that the time of the theft to the statement of loss, made purchases worth EUR 1101.44. Firms, which made these purchases were not made in any authentication or signature of the bearer and the legitimate holder of the credit. The consumer just has this breakdown, made a statement to the police. The Bank, meanwhile, began to attract a certain amount. Consumers turned in KE.P.KA., having got a negative response from the Bank, cancel the amount charged, to his credit. Subsequently, the Bank argued that under the contract concluded with the consumer space of 17 hours is not considered "immediate" declaration of loss, but gross negligence. The correspondence KE.P.KA., relevant agencies, lasted eight months, but ultimately, the Consumer vindicated. The Bank of antilogise the amount of EUR 1101.44. Insurance Company
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

323

Consumer member KE.P.KA., experiencing problems with an insurance company. The repair of the car after an accident cost, the consumer, 1.822 euro. The insurer, however, compensate the consumer with 1,500 euros, citing the age of the car ('87 model). The Consumer rough around half-time discussions and negotiations, which have not been anywhere. Then the KE.P.KA. intervening paid, the consumer the sum of 1822 euros, was paid to the workshop. Insurance Company Consuming KE.P.KA. member, was involved in an accident, liability, which brought the truck driver who struck the car of the complainant, which had stopped at traffic lights. The driver took over fully responsible for the accident and signed a declaration on insurance. The car was driven, in the garage and repair the damage cost 2402 euros. The insurance company would also be willing to pay only 2300 euros, citing the age of the vehicle (model 2002). The problem raised by a consumer, to the KE.P.KA. and after-effects which were related, the issue was paid, in consuming the entire amount paid for the repair of the car. The period from June 1, 2007 to May 31, 2008, there were 322 complaints and from June 1, 2008 to May 31, 2009 were 1507 complaints. QUESTION TO THE MINISTER OF DEVELOPMENT According to the annual report of the Consumer Ombudsman, have risen excessively complaints against banks and insurance companies. These records in the Annual Report by the Consumer Ombudsman. This year's report, published Monday, July 27, for the period from June 1, 2008 through May 31, 2009. The complaints against banks more than quadrupled compared with the corresponding period last year. The period from June 1, 2007 to May 31, 2008, there were 322 complaints and from June 1, 2008 to May 31, 2009 were 1507 complaints. As a percentage of 56.4% of the complaints were unfair, illegal, or unspecified charges related to poor control of the trading taftoprosopeias. Overall, consumer was 88.8% of the complaints and 3.9% was in favor of the supplier and 7.3% is not resolved after exhaustion of all means of conciliation. With regard to insurance services, the Authority finds more than double the consumer complaints against insurance companies with 835 against 292 in the corresponding period last
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

324

year. As a percentage of 33.8% were unilateral changes to contracts of life insurance, high premiums and annual adjustment terminating annual rate policies while 33.2% were partially or not losses. Overall, 82.5% rate of complaints found in favor of consumers at a rate of 7.9 for the supplier but not resolved in 9.6% of cases. In view of these does the Minister: 1. What measures are taken to protect consumers against banks and insurance companies? 2. In light of the foregoing, it intends to take further action and if so what are they to protect the consumer from the arbitrariness of banks and insurance companies? PRESS RELEASE "Complaint for Unlawful and Abusive Collection of Purchasing Bank" Because no final judicial decisions and the recent decision of the Minister of Development, referred to in terms of abuse to some banks, but they still respected by the banks, especially from the Commercial Bank (Branch of Chania), according to branded consumer complaints , continue to receive 1.50 Euro to supply "when consumers make a deposit into an account for a third party, and not only officials generate the correct treatment of consumers, who are recalcitrant to accept to pay the etsithelika a premium, but are and violations of the Penal Code, the general behavior, consumers, call this Bank immediately stop this practice, and according to the following decisions have held that unfair requirement, both to inform consumers on how to manage the problem. How should we respond I. - may write to request our branch disputing the amount with which unreasonably, illegally and improperly charged and ask reversal. 2.-addressed to Mr. OP YMCA with proof of payment of 1.50 euros, which we needed and we paid. The non-observance of legislation relating to unfair conditions imposed on consumers by banks, open road is accepted by the OP Ms Khan for collective actions and demands of consumer rights and complaint to the competent authority responsible for imposition of administrative measures. Here are the decisions of the Greek Courts: * 430/05 and 1219/01/15/2007 Ol. Supreme Court of Cassation, * 5253/03 and 6291/00 of Appeal of Athens * 1119/02 and 1208/98 the regional court of Athens, * 961/07 of the regional court of Athens, the party has become
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

325

irreversible, * 1896/2007, 3441/2007, 726/2004 of the Athens County Court, * Corresponding positions Consumer Ombudsman, * And from G1 24/06/2008 yp.ar decision of the Minister of Development, For more information of each consumer can apeftheinete the OP at T. HAN Phone 2821092666 The President of the OP K. HAN Joanna Melaki Class action against banks by the Consumer Association and the Municipality of Volos Written by: magnesianews.gr 07/09/2009, 19:45 Class actions against banks will deposit the Consumer Association of Volos, the claim for repayment, ie the money illegally and improperly withheld from borrowers. Already in class actions involving 60 borrowers, as announced in a joint press conference Prefect Apostle Papatolia and executives of the Consumers' Association and, according to the Office of Consumer Prefecture, from January 2009 until today have been over 3,000 and telephone complaints. As pointed out by the Prefect "by the complaints and petitions of citizens accept, it has become apparent that many companies, even the broader public sector, arbitrary and offend against consumers. On the other hand, the state, namely the Ministry of Development and the General Secretariat for Consumers, it seems weak, if not reluctant to impose rules. Illegal Charges stated that Mr. Papatolias that banks charge illegally and improperly: -Borrowers with prior authorization and file charges with penalties discount, -Savers at the expense of account, banking costs to third parties, costs for accounts not running etc. The prefect asked the Ministry of Development and the Bank of Greece, to ensure compliance of Greek banks with the requirements of society and to impose penalties on banks that arbitrary and banks to respond directly to their obligations arising from the liquidity of 28 billion granted to them to help businesses and individuals to tackle the economic crisis and to pursue reductions in the rate of the European Central Bank to refrain from illegal modifications of loan agreements and to comply with laws and court decisions. As happened in the past, using frequencies and collars with copper nails which were based on the explosive mikro-krystal who
ΠΑΡΑΓΓΕΛΙΕΣ ΤΗΛ. +30.6937097443

ΛΙΑΠΗΣ ΠΑΝΑΓΙΩΤΗΣ,

ΑΝΤΙΜΕΤΡΑ Δ ΡΑΙΧ,

326

whistling copper pin at the neck of the prisoners nefelim EL led them to Tartarus where the sentences, using the same technology and pistrotikes cards are now attempting to Nefelim trap people filling their minds with misinformation and anxiety that creates free rzes air oxidation of the TEM and kills but the WEATHER IS EGYC. LIAPIC PANAGIOTIC

ΠΑΡΑΓΓΕΛΙΕΣ

ΤΗΛ. +30.6937097443

Sign up to vote on this title
UsefulNot useful