Siemens TC65 manual Create a Secure Data Transfer Environment Step by Step

Page 72

TC65 JAVA User's Guide

Strictly confidential / Released

s

11.1.1Create a Secure Data Transfer Environment Step by Step

The following steps describe the creation of the configuration:

Java Security Mode is activated (see 11.2.1 Change to Secured Mode)

Certificate verification is activated for a data connection (HTTPS or SecureConnection)

The steps described below use the cygwin + openssl environment (for installation see http://www.cygwin.com/, the openssl documentation can be found here http://www.openssl.org/docs/apps/openssl.html)

1.Create CA and generate CA Root Certificate

-We need certificates with sha1 signature. Java Security supports a sha1 signature of the certificate only.

Add the parameter "-sha1" to the command "Making CA certificate ..." in the section of file CA.pl (cygwin location “\cygwin\usr\ssl\misc”)

-create a shell (use location \cygwin\usr\ssl\misc)

-execute commands

>perl CA.pl –newca

-convert file format from PEM to DER

CA certificate cacert.pem

>openssl x509 -in ./demoCA/cacert.pem -inform PEM -out ./demoCA/cacert.der -outform DER

CA private key file cakey.pem

>openssl pkcs8 -in ./demoCA/private/cakey.pem -inform PEM

-out ./demoCA/private/cakey.der -outform DER -nocrypt -topk8

2.Create server certificate and java keystore

-execute command

>keytool -genkey -alias server -keypass keypass -keystore customer.ks -storepass keystorepass -sigalg SHA1withRSA -keyalg RSA

the field “name” of the certificate is the domain name or the IP address of the server

3.Create certificate request for server certificate

-execute command

>keytool -certreq -alias server -file server.csr -keypass keypass

-keystore customer.ks -storepass keystorepass

4.Sign certificate request by CA

-execute command

>openssl ca -in server.csr -out server.pem

-convert file format from PEM to DER

>openssl x509 -in server.pem -inform PEM

–out server.der -outform DER

5.Import CA root certificate and CA private key into java keystore

-Use the CA Root Certificate for the creation of Java Security Command (see chapter 11.5.3)

-execute command

>java -jar setprivatekey.jar -alias dummyca -storepass keystorepass -keystore customer.ks -keypass cakeypass

TC65 JAVA User's Guide_V05

Page 72 of 90

26.09.2005

Image 72
Contents Java Users Guide Document Name TC65 Java Users Guide TC65 Java Users GuideSeptember 26 TC65 Java Users GuideV05Table of Contents Maintenance 3.3.2Compile and Run a Program without a Java IDE Debug EnvironmentJava Security Java Tutorial Differences from the TC45Sun Java Studio Mobility 6 Switching Emulators TablesPreamble New solution OverviewRelated Documents Terms and Abbreviations Abbreviation DescriptionInstallation Installation CDSystem Requirements Components Module Exchange Suite1.2 WTK SDK and Java StudioSiemens Mobility Toolkit Installation Installing the Standard Development ToolkitInstalling the Smtk Environment Installing Sun Java Studio Mobility Installing Eclipse Installing Borland JBuilder XInstalling Module Exchange Suite MES Smtk Uninstall UpgradesSoftware Platform Software ArchitectureInterfaces 1 ASC0 Serial Device General Purpose I/O3 DAC/ADC 4 ASC1JVM Interfaces IP NetworkingMedia Other InterfacesData Flow of a Java Application Running on the Module ADCHandling Interfaces and Data Service Resources Module StatesState 1 Default No Java Running State 4 Default Java Application ActiveState 2 No Java Running, General Purpose I/O and I2C State 3 No Java Running, General Purpose I/O and SPIState 5 Java Application Active, General Purpose I/O and I2C Module State Transitions Maintenance IP ServicePower Saving ChargingAirplane Mode AlarmShutdown Automatic ShutdownRestart after Switch Off Special AT Command Set for Java ApplicationsSwitching from Data Mode to Command Mode Mode Indication after MIDlet StartupConfiguration of Serial Interface Java CommandsRestrictions Flash File System MemoryPerformance JavaFrequencyB 1 / frequencyA Duration of each loop = 600 sPin I/O Data Rates on RS-232 APIPlain Serial Interface Voice Call in ParallelScenarios with Gprs Connection Upload75% 63% 55% 33% 65% 55% 33% 16%Download 91% 87% 81% 73%85% 78% 58% 48% MIDlets MIDlet Documentation MIDlet Life CycleMIDlet.destroyApp method Hello World MIDlet Here is a sample HelloWorld programCommand Line Based File Transfer to ModuleModule Exchange Suite Windows BasedSecurity Issues Over the Air ProvisioningOtap Over The Air Provisioning Otap Introduction to OtapOtap Overview Parameters Max. Length AT Keyword SM Install/update Delete Otap ParametersInstall operation Short Message FormatDelete operation Java File Format Procedures Install/Update Delete Time Out Values and Result Codes Tips and Tricks for OtapOtap Tracer SecurityHow To Compile and Run a Program without a Java IDE Build ResultsCompile Run on the Module with Manual StartRun on the Module with Autostart Switch on Autostart Switch off AutostartDebug Environment Data Flow of a Java Application in the Debug EnvironmentEmulator Java IDE Sun Java Studio Mobility 6 2004Q3 Switching emulators Projects Templates ExamplesCompile and run JBuilderX JDK settings Borland JBuilderExamples TC65 Java Users Guide JBuilder2005 JDK settings Eclipse IntegrationEclipse Plug-in installation Eclipse J2ME platform TC65 Java Users GuideV05 26.09.2005 Example Eclipse Project importEclipse Example Compile and debug Eclipse Create packageEclipse Configuration BreakpointsJava Security Secure Data Transfer ModeAsja Vasecuritycertificate J a va C u r i t y c e r t i f i c a t eCreate a Secure Data Transfer Environment Step by Step Create CA and generate CA Root CertificateUnsecured mode Secured modeExecution Control Change to Secured Mode Concept Build binary data for AT command AtsjsecGenerate key pair Generate customer root CertificateConcept for the Signing the Java MIDlet Encoded JAR-File HashStructure and Description of the Java Security Commands Application and Data ProtectionStructure of the Java Security Commands General structureBuild Java Security Command Hash SHA1Send Java Security Command to the Module ATSJSEC?Create Java Security Commands Export X.509 Root CertificateCommand switch off module exchange functionality Sign a MIDletUsing the AT Command API Class ATCommandJava Tutorial Instantiation with or without CSD SupportSending an AT Command to the Device, the send Method Data ConnectionsTC65 Java Users Guide ATCommandResponseListener Interface Non-blocking ATCommand.send MethodSynchronization ATCommandListener Interface ATEventsImplementation Registering a Listener with an ATCommand Instance Programming the MIDlet ThreadsExample TC65 Java Users Guide Differences from the TC45
Related manuals
Manual 123 pages 53.3 Kb

TC65 specifications

The Siemens TC65 is a compact and powerful GSM/GPRS module designed for a wide range of mobile communication applications. With its robust features, the TC65 perfectly meets the growing demands for connectivity in various industries, including automotive, telematics, and industrial automation.

A standout feature of the TC65 is its compact size, allowing it to be easily integrated into various devices without compromising on performance. The module supports GSM (Global System for Mobile Communications) and GPRS (General Packet Radio Service), providing reliable and efficient voice and data transmission.

One of the key technologies incorporated in the TC65 is its integrated TCP/IP stack, which allows for seamless internet connectivity and enables application developers to create IoT solutions with ease. This capability is essential for remote monitoring, data logging, and other applications that require continuous data exchange.

The TC65 also boasts extensive multimedia capabilities, including support for SMS, MMS, and voice calls. This makes it suitable for applications that require not only data transmission but also communication features. Additionally, it supports various codecs for voice compression, ensuring high-quality audio in voice applications.

Enhanced security features are another highlight of the TC65. It incorporates comprehensive security protocols to safeguard data transmission, making it suitable for sensitive applications in finance, healthcare, and other critical sectors. The module also includes an integrated SIM application toolbox that supports the development of secure and customizable applications.

For developers, the TC65 offers an easy-to-use software development kit (SDK), simplifying the process of application development. This means that businesses can quickly create and deploy solutions tailored to their specific needs.

The module operates across a wide voltage range and is designed to tolerate challenging environmental conditions, making it ideal for industrial use. It supports various interfaces, including UART, GPIO, and I2C, enabling it to connect with a variety of peripherals and sensors, thus expanding its usability.

In summary, the Siemens TC65 combines compact design, versatile communication capabilities, advanced security features, and developer-friendly resources, making it an excellent choice for anyone looking to implement reliable and sophisticated GSM/GPRS communication in their applications. The TC65 is a valuable asset in the evolving landscape of connected devices and IoT solutions.