Cross-Platform System of Medical Documents Protection Through Digital Signatures

Total Page:16

File Type:pdf, Size:1020Kb

Cross-Platform System of Medical Documents Protection Through Digital Signatures CROSS-PLATFORM SYSTEM OF MEDICAL DOCUMENTS PROTECTION THROUGH DIGITAL SIGNATURES Fernando Guilherme Ferreira Sousa Project/Dissertation developed under supervising of José Magalhães Cruz (PhD) in Glintt - Healthcare Solutions, S.A. 1. Motivation documents, which are then sent to the server and, consequently, validated and stored in the database. Due to the extreme information sensibility in the Subsequent to this process, each time a document is health area, it is really necessary to be absolutely sure opened to be viewed, for example, a check is made of about who performs certain medical transactions. It a possible change to the same document, in order to must have permission and authority to do so, i.e. be ensure that recurrently its integrity. Through really the right person to do this transaction. In areas cryptography-based security methods of public keys, involving health treatments, marking of exams or it is verified if someone tampered the document or even surgeries and new prescriptions, there must be made it invalid in some way. an extremely effective control to verify effectively that all transactions must be properly carried out, Each platform that the doctor use should read his without any type of deception or illegality. digital certificate, which is contained in a Smart Card and is installed on the machine, once inserted in a One of the biggest motivations is that the patient, in suitable card reader. Then, the digital signature is the future, might be aware that there is a control in performed with the certificate’s associated private the preparation of their medical documents. All key, which certificates the medical document. documents that are prepared on your health are guaranteed, prepared by doctors who signed the document, as with digital signatures, such is possible 3.1. System Architecture to be verified. The objective of the platform was to serve all clients 2. Main Goals Web, so that it can be used by many different operating systems and platforms. The main idea was Based on all this necessary control, comes the to have a WebSite that contains subscription services greatest goal of all, i.e., develop a system to control and validation of documents, that might be sent by a and validate all medical transactions. Since it is a client. To be easily accessible by the most various software system, it will be necessary to verify, in devices the first idea, that emerged, was to create a terms of computer security, the digital signature of platform that allows service to digital signatures on the doctor who makes the transaction. the server. It was performed a study on the use of cryptographic keys on this system, so that the fact This dissertation aims, mainly, to emphasize the need that it is cross platform does not violate any basic to ensure that all transactions in the area of health are principle of computer security and integrity. considered healthy, having been drawn up a Therefore, before the entire system architecture distributed system in which all those involved in the definition, it had to be adjusted to all key security area, with the respective data and digital certificates, principles. have the opportunity to sign a document to ensure, a posteriori, his authorship. 3.2. Study of Private Key 3. Work Description So, to be a Web service where you can sign documents, it must have knowledge of the private key to sign the The Multiplatform System is a Web application that document to encrypt the hash of the document. The provides server-side Web Services, such as the fact that the WebSite (server-side) have knowledge of possibility of someone send a signed document to the the customer's private key is a bad principle. The system the validate and store in database. The system private key must be sent together with the certificate also provides client-side, as the digital signature to the server to be able to perform to the signature, functionality, because they involve the use of doctor's which means that the private key to circulate on the private cryptographic key, and this cannot be used on net. This submission could be sent through a SSL/TLS the server side, as this would require that the key was channel so that the data had been encrypted and safe sent away for the Internet, which would be from capture by subject or entities without access to considered a basic security flaw. such information. Still, it's violated the principle that the private key is only known to the entity that owns The project consists, mainly, on the signature and should only be used locally. If this is sent away, (performed by doctors) of various types of this principle of security is broken. And even if the channel is safe, sending secret data several times is a consists in turning a large amount of data in a small bad practice of security. The alternative in this case is amount of data. Is a method that compresses the data to develop a native application for each operating in such a way that the output generated is unique. It is system, trying to use the most comprehensive also supposed that this information generated is programming technologies, to generalize as much as irreversible, i.e. from it not to be able to find out the possible and have a globalized system architecture. original information. Then, the writer of the For desktop systems it was developed a Java applet to document encrypts the message digest with his perform the digital signatures. private key. This cipher is sent together with the document to the reader. For the reader to ensure that that document is accurate, must also calculate a digest of the document and then decrypt with the 3.3. Mobile Platforms public key of the writer, the digest is sent along with the document. After that compares the digests and if For applications for mobile operating systems, the they are equal is a sign that the document has not user accesses it the same through a Web browser, changed and can be used with confidence. Even however when effects operations of digital signature, though subscriptions to be performed client-side, it is a native application is launched, making the signing intended that these are carried out as quickly as and returning the signed document without any possible, so that the doctor doesn't waste time with interaction with the user. The user interacts with the this procedure and can concentrate on what is really Web application. If the Smart Card has a middleware important to him. The signatures were implemented developed for these operating systems, so the for XML, PDF and Office documents. approach to these systems is this, however for those who have not, we had to consider another approach. 4. Conclusions It is necessary to enter a code which relates to a desktop machine that has a card reader. The doctor As we saw in chapter of architecture, at first the idea inserts this code of the machine and insert the card in was to provide a Web service for digital signature, the same machine. Thus, the signature is performed from which any client with a browser acedia and in the same on the client side, however on a foreign sending a file, receive it, then signed. However, this machine. would imply that the Web application had knowledge of the private key of the doctor you want to sign the 3.4. Smart Card document. The private key must always be with their respective entity and should only be used locally, and should not be sent to the Web. Then, it was necessary The Smart Card selected to support the dissertation to create a digital signature component to the client was the portuguese citizen card. This card has two side, so that the private key of the doctor was only used public-private key pairs, a suitable only for locally and was never sent to the WWW. Developed a authentication and another pair only to be used in Java applet for fixed operating systems and native digital signatures. applications for mobile operating systems. All part of digital signature is based on the same source code, Due to the non-availability of a middleware for based on the Java language. The entire source code of mobile operating systems like Android and iOS, we digital signatures off centered and used equally by all. decided to use the above approach for mobile And more important, combined with all this security, platforms, so that these systems no longer can all interaction with the interface of the system were perform digital signatures, thus ensuring the only with Web application. multiplatform concept. 3.5. Digital Signature A digital signature allows you to check a possible undue tampering of a document and also associate the document to its author. Thus, the reader of the document knows for sure who was the writer and this can not deny in any way that he wrote such a document. In addition, even the player, you can change the original document without this being detected. Public key algorithms, as we saw in chapter of bibliographical revision, are computationally heavy, and in the case of the document be long there will be some delay during the process. One of the techniques is to create a digest of messages using public key techniques too, but adds this nuance of the digest. This technique consists in calculating a summary / digest of the message, by calculating a hash. There are various techniques of hashing which .
Recommended publications
  • Applets, Servlets and JSP
    Java Programming : applets, servlets and JSP. SR03 Dritan Nace A summary of Java Java is a language developed by Sun, which is designed to be object oriented and Simple, robust and secure, independent of hardware architectures and Multitasking. Object oriented and simple : Simpler than C++, transparent memory managment… Robust et secure : Data typing is extremely strict. For applets, it is in principle impossible to access the resources of the host machine. Independant of hardware architectures : The compiler generates a universal code : the « byte-code ». An interpreter which is specific to the host machine, « virtual machine », executes the programs. Multitasking : Java seemingly allows execution of several processes. In reality, a time slot is given to each process on the processor (Multithreaded). J2SE versus J2EE J2SE (standard edition) contains the basic usable components from both the client and server side, – GUI, AWT/Swing for applications (client) or applets. Currently J2SE v1.6 (ou V6) J2EE (enterprise edition), is in a certain sense an extension of SE, designed for server side programming – Servlets, JSP, EJB, etc. • Currently J2EE v1.4 Java and object oriented programming • Classes, and objects – The objects include data and processing for the data. Communication is done via messages (methods). – A class corresponds to an abstract model for object construction. A class is made up of: • attributes (static part) • Methods (dynamic part), which define the behaviour. – Inheritance : the « is a » relationship : a car is a vehicule, – Polymorphism : the same message can be recognised by several objects and entail different behaviour. Portability: JVM The compiler compiles the java source in byte code : javac car.java => car.class Then, java is the name of the program which will interpret the generated byte code.
    [Show full text]
  • Abstract Window Toolkit Overview
    In this chapter: • Components • Peers 1 • Layouts • Containers • And the Rest • Summary Abstract Window Toolkit Overview For years, programmers have had to go through the hassles of porting software from BSD-based UNIX to System V Release 4–based UNIX, from OpenWindows to Motif, from PC to UNIX to Macintosh (or some combination thereof), and between various other alternatives, too numerous to mention. Getting an applica- tion to work was only part of the problem; you also had to port it to all the plat- forms you supported, which often took more time than the development effort itself. In the UNIX world, standards like POSIX and X made it easier to move appli- cations between different UNIX platforms. But they only solved part of the prob- lem and didn’t provide any help with the PC world. Portability became even more important as the Internet grew. The goal was clear: wouldn’t it be great if you could just move applications between different operating environments without worr yingabout the software breaking because of a different operating system, win- dowing environment, or internal data representation? In the spring of 1995, Sun Microsystems announced Java, which claimed to solve this dilemma. What started out as a dancing penguin (or Star Trek communicator) named Duke on remote controls for interactive television has become a new paradigm for programming on the Internet. With Java, you can create a program on one platform and deliver the compilation output (byte-codes/class files) to ever yother supported environment without recompiling or worrying about the local windowing environment, word size, or byte order.
    [Show full text]
  • Apache Harmony Project Tim Ellison Geir Magnusson Jr
    The Apache Harmony Project Tim Ellison Geir Magnusson Jr. Apache Harmony Project http://harmony.apache.org TS-7820 2007 JavaOneSM Conference | Session TS-7820 | Goal of This Talk In the next 45 minutes you will... Learn about the motivations, current status, and future plans of the Apache Harmony project 2007 JavaOneSM Conference | Session TS-7820 | 2 Agenda Project History Development Model Modularity VM Interface How Are We Doing? Relevance in the Age of OpenJDK Summary 2007 JavaOneSM Conference | Session TS-7820 | 3 Agenda Project History Development Model Modularity VM Interface How Are We Doing? Relevance in the Age of OpenJDK Summary 2007 JavaOneSM Conference | Session TS-7820 | 4 Apache Harmony In the Beginning May 2005—founded in the Apache Incubator Primary Goals 1. Compatible, independent implementation of Java™ Platform, Standard Edition (Java SE platform) under the Apache License 2. Community-developed, modular architecture allowing sharing and independent innovation 3. Protect IP rights of ecosystem 2007 JavaOneSM Conference | Session TS-7820 | 5 Apache Harmony Early history: 2005 Broad community discussion • Technical issues • Legal and IP issues • Project governance issues Goal: Consolidation and Consensus 2007 JavaOneSM Conference | Session TS-7820 | 6 Early History Early history: 2005/2006 Initial Code Contributions • Three Virtual machines ● JCHEVM, BootVM, DRLVM • Class Libraries ● Core classes, VM interface, test cases ● Security, beans, regex, Swing, AWT ● RMI and math 2007 JavaOneSM Conference | Session TS-7820 |
    [Show full text]
  • Migrating from Java Applets to Plugin-Free Java Technologies
    Migrating from Java Applets to plugin-free Java technologies An Oracle White Paper January, 2016 Migrating from Java Applets to plugin-free Java technologies Migrating from Java Applets to plugin-free Java technologies Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Migrating from Java Applets to plugin-free Java technologies Executive Overview ........................................................................... 4 Browser Plugin Perspectives ............................................................. 4 Java Web Start .................................................................................. 5 Alternatives ....................................................................................... 6 Native Windows/OS X/Linux Installers ........................................... 6 Inverted Browser Control ............................................................... 7 Detecting Applets .............................................................................. 7 Migrating from Java Applets to plugin-free Java technologies Executive Overview With modern browser vendors working to restrict or reduce the support of plugins like
    [Show full text]
  • Installing Open Java Development Kit – Ojdkbuild for Windows
    Installing Open Java Development Kit – ojdkbuild for Windows © IZUM, 2019 IZUM, COBISS, COMARC, COBIB, COLIB, CONOR, SICRIS, E-CRIS are registered trademarks owned by IZUM. CONTENTS 1 Introduction ......................................................................................................... 1 2 OpenJDK distribution .......................................................................................... 1 3 Removing Oracle Java ......................................................................................... 2 4 Installing OJDK – 32bit or 64bit, IcedTea Java .................................................. 3 5 Installing the COBISS3 interface ........................................................................ 7 6 Launching the COBISS3 interface .................................................................... 11 7 COBISS3 interface as a trusted source in IcedTea ojdkbuild ........................... 11 © IZUM, 16. 7. 2019, VOS-NA-EN-380, V1.0 i VOS Installing Open Java Development Kit – ojdkbuild for Windows 1 Introduction At the end of 2018 Oracle announced a new business policy for Java SE which entered into force in April 2019. That is why when you install Java a notification and warning window appears. All versions of Java from 8 u201 onwards not intended for personal use are payable. For this reason, we suggest you do not update Java 8 to a newer version for work purposes. If you want a newer version of Java 8, install OpenJDK 8 and IcedTea. Also, do not install Java 8 on new computers (clients), but install OpenJDK 8 with IcedTea support. 2 OpenJDK distribution OpenJDK 1.8. build for Windows and Linux is available at the link https://github.com/ojdkbuild/ojdkbuild. There you will find versions for the installation. The newest version is always at the top, example from 7 May 2019: © IZUM, 16. 7. 2019, VOS-NA-EN-380, V1.0 1/11 Installing Open Java Development Kit – ojdkbuild for Windows VOS 3 Removing Oracle Java First remove the Oracle Java 1.8 software in Control Panel, Programs and Features.
    [Show full text]
  • Home Java Plugin Detector Java (Using <Applet> And/Or <Object> Tag
    22/05/12 Java plugin detection with PluginDetect Home Java Plugin Detector Java (using <applet> and/or <object> tag) installed & enabled: true Highest Installed Java Version: 1,6,0,31 Java 1,6,0,10 or higher (using <applet> and/or <object> tag) is installed & enabled. Java detection: completed ON THE FLY (OTF) Deployment Toolkit browser plugin installed & enabled: false Next-Generation Java Plugin2 installed & enabled: true Java vendor: Sun Microsystems Inc. Java plugin name: Java(TM) Platform SE 6 U31 Java plugin description: Next Generation Java Plug-in 1.6.0_31 for Mozilla browsers navigator.javaEnabled(): true [This detector is capable of OTF & NOTF Java detection. Detection occurs before window.onload event has fired.] [window.onload event has fired successfully.] [ The plugin detector(s) in this web page use the following: PluginDetect_Java.js, detectJava_OTF_NOTF.js, getJavaInfo.jar ] Download PluginDetect and the jarfile here... In order to do Java detection, you will need 2 things: 1) download the getJavaInfo.jar applet along with a few Java detection examples. The jarfile (Java ARchive file) is used by PluginDetect in order to accomplish Java detection. 2) download the PluginDetect script itself. The PluginDetect script generator will allow you to customize the PluginDetect script to include whatever features you desire. That being said, I would still recommend that you read thru most of this page before creating your own Java detection code. A brief introduction to Java detection PluginDetect uses a number of different methods when trying to detect Java in your browser. These Java detection methods can be divided into 2 groups: a) the non-applet methods and b) the applet methods.
    [Show full text]
  • (Microsoft Powerpoint
    Entwicklung mit JavaFX Die Java UI-Technologie im JDK 8 Wolfgang Weigend Sen. Leitender Systemberater Java Technologie und Architektur 1 Copyright © 2016 Oracle and/or its affiliates. All rights reserved. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Agenda • Aktueller Status von JavaFX • Entwicklungsressourcen beim Engineering und in der Java Community • Linux on ARM Port • JavaFX-Aufbau und Architekturkonzept • Migration von Swing Komponenten • Barrierefreiheit • Vorteile bei der Entwicklung von JavaFX Anwendungen • SceneBuilder GUI Editor • Automatisiertes Testen von JavaFX GUI Komponenten • Open Source Projekt OpenJFX • Kundenbeispiele, Projekte und relevante Partnerlösungen • Zusammenfassung 3 Copyright © 2016 Oracle and/or its affiliates. All rights reserved. Aktueller Status von JavaFX • JavaFX 8 ist fester Bestandteil der Java SE 8 – General Availability for Windows, Linux, Mac OS – Java SE 8 Roadmap until 2025 and expected JDK 9 until 2028 – Java SE Development Kit 8 Update 6 for ARM • Starting with JDK 8u33, JavaFX Embedded is removed from the ARM bundle and is not supported – http://www.oracle.com/technetwork/java/javase/jdk-8u33-arm-relnotes-2406696.html – http://mail.openjdk.java.net/pipermail/openjfx-dev/2015-January/016570.html • Development Tools – NetBeans 8.2 – JavaFX Scene Builder 2.0 und Version 8.2.0 – e(fx)clipse • major release cycle alignment with eclipse roadmap • minor release cycle with JavaFX roadmap 4 Copyright © 2016 Oracle and/or its affiliates.
    [Show full text]
  • (F/K/A LCCP) Open Source Disclosure
    Below are the licenses for open source software used in the LCCP product and platform. You may download certain source code (as required by applicable licenses below) from verizon.com/opensource. 1. Xerces 3.1.1 2. Libtins 3. G3log v1.1 4. Winpcap v4.1.0.902 5. jersey-container-servlet-core 2.23.1 6. jersey-media-moxy 2.23.1 7. jersey-container-servlet 2.7 8. jersey-media-multipart 2.23.2 9. jersey-media-json-jackson 2.23.2 10. derby 10.12.1.1 11. Log4j 1.2.17 12. quartz 2.2.1 13. jetty-server/jetty-servlet/jetty-webapp 9.2.3.v20140905 14. commons-dbcp 1.4 15. json 20160810 16. gson 2.7 17. mimepull 1.9.3 18. poi 3.15 19. poi-ooxml 3.15 20. ibatis-sqlmap 2.3.0 21. commons-net 3.4 22. commons-lang 3 23. Angular JS/Angular Cookies/Angular Routes/Angular Sanitize 1.5.7 24. Angular ToolTips 1.1.7 25. Google Material Design 26. jQuery v3.0 27. ngDraggable 28. Simple Pagination 29. Animation 3.5.1 30. Freemarker library 2.3.25 31. jetty-runner 9 32. jersey-client 1.8 33. jersey-core 1.8 34. jackson-core-asl-1.7.1 35. jackson-mapper-asl-1.7.1 36. device-api 0.3.2 37. ddmlib 24.5.0 38. ADB 39. AdbWinAPI.dll 40. NVD 3 1.8.1 41. JSCH – 0.1.55 42. Libssh2 – 0.74 43. COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.1 44.
    [Show full text]
  • Introduction to Java Applets
    1 2020 Introduction to Java Applets 2005 Pearson Education, Inc. All rights reserved. 2 Observe due measure, for right timing is in all things the most important factor. — Georg Wilhelm Friedrich Hegel Painting is only a bridge linking the painter’s mind with that of the viewer. — Eugene Delacroix The direction in which education starts a man will determine his future in life. — Plato 2005 Pearson Education Inc. All rights reserved. 3 OBJECTIVES In this chapter you will learn: To differentiate between applets and applications. To observe some of Java's exciting capabilities through the JDK's demonstration applets. To write simple applets. To write a simple HyperText Markup Language (HTML) document to load an applet into an applet container and execute the applet. Five methods that are called automatically by an applet container during an applet's life cycle. 2005 Pearson Education, Inc. All rights reserved. 4 20.1 Introduction 20.2 Sample Applets Provided with the JDK 20.3 Simple Java Applet: Drawing a String 20.3.1 Executing an Applet in the appletviewer 20.3.2 Executing an Applet in a Web Browser 20.4 Applet Life-Cycle Methods 20.5 Initializing an Instance Variable with Method init 20.6 Sandbox Security Model 20.7 Internet and Web Resources 20.8 Wrap-Up 2005 Pearson Education, Inc. All rights reserved. 5 20.1 Introduction • Applets – Java programs that can be embedded in HyperText Markup Language (HTML) documents – The browser that executes an applet is generically known as the applet container 2005 Pearson Education, Inc. All rights reserved.
    [Show full text]
  • Applets Programming Introduction Building Applet Code
    Introduction Applets are small Java programs that are embedded in Web pages. Applets Programming They can be transported over the Internet from one computer (web server) Enabling Application Delivery Via to another (client computers). the Web They transform web into rich media and support the delivery of applications via the Internet. 1 2 Applet: Making Web Interactive and How Applets Differ from Applications Application Delivery Media ¡ 1 2 3 4 5 Although both the Applets and stand-alone applications are Java programs, there are certain restrictions are APPLET hello.class Create Accessing The browser Development AT SUN’S Applet from creates imposed on Applets due to security concerns: “hello.java” WEB tag in Your Organisation a new ¢ Applets don’t use the main() method, but when they are load, AT SERVER HTML window and automatically call certain methods (init, start, paint, stop, SUN.COM document a new thread destroy). and ¢ They are embedded inside a web page and executed in then runs the browsers. code ¢ They cannot read from or write to the files on local computer. Hello Java ¢ They cannot communicate with other servers on the network. <app= “Hello”> The Internet ¢ They cannot run any programs from the local computer. Hello ¢ They are restricted from using libraries from other languages. ¡ The above restrictions ensures that an Applet cannot do any damage to the local system. 3 4 Building Applet Code: An Example Embedding Applet in Web Page //HelloWorldApplet.java < HTML> import java.applet.Applet; < HEAD> import java.awt.* ; < TITLE> Hello World Applet < /TITLE> public class HelloWorldApplet extends Applet { < /HEAD> public void paint(Graphics g) { g.drawString ("Hello World of Java!",25, 25); < body> < h1> Hi, This is My First Java Applet on the Web!< /h1> } < APPLET CODE= "HelloWorldApplet.class" width= 500 height= 400> } < /APPLET> < /body> < /HTML> 5 6 Accessing Web page (runs Applet) Applet Life Cycle £ Every applet inherits a set of default behaviours from the Applet class.
    [Show full text]
  • Security Target Lite Rev
    NXP JCOP on SN100.C25 Secure Element Security Target Lite Rev. 3.1 – 2020-08-25 Evaluation documentation Release Company Public NSCIB-CC-195714_3 Document Information Info Content Keywords ASE, JCOP, Common Criteria, EAL5 augmented Abstract This document contains information to fulfill the requirements of the Common Criteria component ASE (Security Target) for the Evaluation of the NXP JCOP products deployed on NXP SN100 Secure Element, developed and provided by NXP Semiconductors, Business Unit Security & Connectivity, according to the Common Criteria for Information Technology Security Evaluation Version 3.1 at EAL5 augmented. NXP Semiconductors JCOP on SN100.C25 Security Target Lite Company Public Rev Date Description 2.0 2019-10-10 Product Maintenance for JCOP 5.0 on SN100 3.0 2020-08-24 Re-certification for JCOP 6.1 on SN100 3.1 2020-08-25 Corrected a typo in the references Release ©NXP B.V. 2019. All rights reserved. Evaluation documentation Rev. 3.1 – 2020-08-25 1 of 186 NXP Semiconductors JCOP on SN100.C25 Security Target Lite Company Public 1 ST Introduction (ASE_INT) The TOE consists of a software stack (JCOP), which is stored and executed on a certified embedded Secure Element (eSE), including an associated Crypto Library and Security Software. The Secure Element (eSE) is embedded in a micro-controller which also includes an Integrated NFC controller and a System Mailbox. 1.1 ST Reference and TOE Reference Title NXP JCOP on SN100.C25 Secure Element Security Target Lite ST Version Revision 3.1 Date Product 2020-08-25 Type TOE Java Card Name NXP JCOP on SN100.C25 Secure Element Certification ID NSCIB-CC-195714_3 CC version Common Criteria for Information Technology Security Evaluation Version 3.1, Revision 5, April 2017 (Part 1 [8], Part 2 [9] and Part 3 [10]) Tab.
    [Show full text]
  • Imode JAVA APPLET
    iMODE JAVA APPLET FEATURES Direct control of an iMode self-powered speaker system via any web browser No specifi c software is required: just a computer (with any Operative System), a web browser (any web browser) with Java plugin installed. Single loudspeakers’ complete control (gain, polarity, delay, fi lters, settings, input selection, …) Based on the on-board web server for a truly cross-platform compatibility Continuous real-time update of the loudspeaker(s) status and parameters Based on standard Ethernet technology-doesn’t require any special devices. Preset management function (save settings on to your computer’s hard disk) APPLICATIONS Complete control of the iMode-equipped self-powered loudspeakers, the Java applet can check the status of the system (levels, amplifier status, protec- tion, limiter, ...). The user has the ability to control a wide range of parameters, from the input section (analogue or digital), signal delay (up to two seconds), Gain, polarity, type of fi lter (parametric, low/hi shelf, low/high pass, phase) through to network settings. The applet is adapted to the specifi c product. With Mini-COM.P.A.S.S. it shows the set horizontal dispersion (one of many that can be set) while using the iSM loudspeaker one has the possibility to select any of the four presets in real time. DESCRIPTION The Java applet has been developed for use on all Operative systems. No matter if you are using PC, Mac or Linux, the iMode platform has a powerful web server inside, where the Applet and all the information is stored. You just need to have the latest Java plugin; open your preferred web browser, connect to the loud- speaker via its IP address or via Bonjour browser and you can access and control all the parameters.
    [Show full text]