In the context of the Open eCard Project, industrial as well as academic
experts have decided to work together on providing an open source and cross
platform implementation of the eCard-API-Framework (BSI-TR-03112), through
which arbitrary applications can utilize authentication and signatures with
arbitrary chip cards.
The artifacts of the project consist of modularized, and to some extent
extensible, libraries as well as client implementations such as a Desktop
application (richclient), an Android app and a Java Applet.
This client also contains an add-on (abc) for supporting the capabilities of the
IRMA card, together with a card info file for performing its detection. It requires all the libraries described at http://credentials.github.io/. In this respect, follow again the
instructions from http://credentials.github.io/ for generating the jar files. Then copy them to addons/abc/lib. The libraries
can be instaled from addons/abcr as:
mvn install:install-file -Dfile=lib/credentials_api.dev.jar -DgroupId=org.irmacard.credentials -DartifactId=credentials -Dversion=1.0 -Dpackaging=org.irmacard.credentials
mvn install:install-file -Dfile=lib/credentials_idemix.dev.jar -DgroupId=org.irmacard.credentials.idemix -DartifactId=credentials-idemix -Dversion=1.0 -Dpackaging=org.irmacard.credentials.idemix
mvn install:install-file -Dfile=lib/idemix_library.dev.jar -DgroupId=com.ibm.zurich -DartifactId=ibm-idemix -Dversion=1.0 -Dpackaging=com.ibm.zurich
mvn install:install-file -Dfile=lib/idemix_terminal.dev.jar -DgroupId=org.irmacard.idemix -DartifactId=idemix-terminal -Dversion=1.0 -Dpackaging=org.irmacard.idemix
mvn install:install-file -Dfile=lib/scuba.dev.jar -DgroupId=net.sourceforge.scuba -DartifactId=scuba -Dversion=1.0 -Dpackaging=net.sourceforge.scuba
The abc4trust addon (addons/abc4trust) is used to generate presentation tokens from presentation policies
sent by a certain SP. It requires the full abc4trust implementation in addons/abc4trust/deployment.
Besides, the ABC4Trust engine must be
running in the client-side. Moreover, an issuer is expected to issue or have issued
the credential that is being used during the verification. Building instructions can be found at
https://forge.fi-ware.org/plugins/mediawiki/wiki/fiware/index.php/Privacy_-_Installation_and_Administration_Guide
Finally, the user webservice should be running in the client-side:
java -jar selfcontained-user-service.war 9200
This webservice can be loaded via the configuration menu of the client.
$ mvn clean install