digital pen en 2008
DESCRIPTION
TRANSCRIPT
Security Solutions & Services – SBL Enterprise - Architecture
Digital Pen Solutions
2 Security Solutions & Services – SBL Enterprise - Architecture
Contents
Contents
Overview
Technology
Business
Success cases
3 Security Solutions & Services – SBL Enterprise - Architecture
Breaking static links with the office, where the information systems are located.
Optimization - improvement of business processes that require professional journey.
Maximum usage of resources and investment in information systems
Mobility – Anywhere at Anytime
Overview
Mobility – A good investmentImplementation cost retrieved in 4,3 months
ROI about 129% in the first year
Better quality of life of employees
Costs reduction in remote access and laptops
IDC - 2005
IT efficiency (13.7%)
Other costreductions(23.7%)
IT Productivity(3.0%)
User productivity
(59.7%)
4 Security Solutions & Services – SBL Enterprise - Architecture
Technology – Mobile Forms General Vision
Using a “normal” pen, with a high technology inside, whatever you write ordraw can be sent to a PC or using a mobile phone through the Internet, toany web server local or remote.
System description
5 Security Solutions & Services – SBL Enterprise - Architecture
Technology – the device
Components: Digital PensUnique code: user identification
BluetoothTM
Allow data transmitting
Store coordinates, pressure, execution time, codes, etc.
Analyze images and establish stroke coordinates
Capture pattern photos
Memory
Camera
Ink
Battery
Processor
6 Security Solutions & Services – SBL Enterprise - Architecture
Technology – The Paper
Paper components
Pattern
Great points combination (2 raised to the power of
72).
6x6 points area gives a unique position.
Establishment of pen position.
It allows specific functions definition.
It could be printed in a lot of surfaces.
Almost invisible.
It has a specific code for each application.
7 Security Solutions & Services – SBL Enterprise - Architecture
Technology – General Architecture
THASH: Thales Application Source Handler
THOR: Thales prOcessing Router
8 Security Solutions & Services – SBL Enterprise - Architecture
Technology - Security
Unique pattern in all the word:Organization and application identification
Pen unique code in all the word:User identification
Previous sending pattern code and pen code identification
It could be requested a PIN code before sending (using a mobile phone or a PC).
Only strokes are the data which is sent. Only coordinates in a paper notrelated with the content semantic.
Whatever is written or drawn could be encrypted “end-to-end”
User could knows if his request had success, he could receive additionalinformation (SMS, etc)
Security
9 Security Solutions & Services – SBL Enterprise - Architecture
Business – Organizational Productivity
Processes
Processes optimization and cost reduction
Current sending forms process:
Recognize ValidateData
ExtractionFulfill
Send Delivery
Scan Recognize ValidateData
Extraction
FAX Sending
Fulfill
Receipt
Sending forms using Digital Pen:
10 Security Solutions & Services – SBL Enterprise - Architecture
Thales Offer
Integration and components: Thales supplies a set ofcomponents and tools to cover all the steps in the lifecycle of DigitalPen applications development and deployment:
Forms design and edition tools.Router applications to allow sending data through mobile phones ordirectly download into a PC platform.Data forms management components.Backend systems integration componentsForm printing systems and license management.
Infrastructures: Thales supplies infrastructures managementservices derived from the solution:
Hardware, basis software and server communicationsMobile devices management software
Related services: adding value to achieve a 360 service:Pens and paper licenses provisioningCentralized printing serviceUsers and administrators trainingHelpdesk serviceProcess consultancyBackend integration consultancyChange managementVerification service of handwriting recognition
11 Security Solutions & Services – SBL Enterprise - Architecture
Success cases: example
VB.NET technology for the router in PC.
ASP.NET Server.
ASP.NET validation web.
Technical Inspection of vehicles
12 Security Solutions & Services – SBL Enterprise - Architecture
Success cases: example
Java technology of router in the mobilephone
J2EE Server
J2EE validation web
Gas Natural inspections
Thank you for your attention