[https://www.oracle.com/java/technologies/java-card-tech.html '''Oracle Java Card<sup>TM</sup>''' '''technology'''] is a software platform technology that allows [[Java platform|Java]]-based applications ([[applet]]s) to be run securely on [[smart card]]s and more generally similar secure small memory footprint devices.<ref name="Chen 2000">{{cite book | last=Chen | first=Z. | title=Java Card Technology for Smart Cards: Architecture and Programmer's Guide | publisher=Addison-Wesley | series=Addison-Wesley Java Series | year=2000 | isbn=978-0-201-70329-0 | url=https://archive.org/details/javacardtmtechno00zhiq | url-access=registration | access-date=9 April 2019 }}</ref>which are called “secure elements” (SE). A Secure Element is a tamper-resistant hardware environment capable of securely hosting applications and their confidential and cryptographic data. The most common form of secure element is a one-chip secure microcontroller, found in smart cards and other removable cryptographic tokens. But new form factors have started to emerge though, from embedded SEs (a non-removable secure microcontroller soldered onto a device board) to new security designs embedded into general purpose chips. Java Card<sup>TM</sup> addresses this hardware fragmentation and specificities while retaining the openness and code portability brought forward by Java. Java Card<sup>TM</sup> is the tiniest of Java platforms targeted for embedded devices. Java Card<sup>TM</sup> gives the user the ability to program the devices and make them application specific. It is widely used in [[Automateddifferent tellermarkets: machine|ATM]]wireless telecommunications within SIM cards and embedded SIM, payment within banking cards.<ref>{{Citation|last=Oracle Learning Library|title=Developing Java Card Applications|date=2013-01-30|url=https://www.youtube.com/watch?v=khgT5dwKvOo |archive-url=https://ghostarchive.org/varchive/youtube/20211213/khgT5dwKvOo |archive-date=2021-12-13 |url-status=live|access-date=2019-04-18}}{{cbignore}}</ref> and TheNFC firstmobile Javapayment Cardand wasfor introducedIdentity incards, 1996healthcare bycards, [[Schlumbergerand Limited|Schlumberger]]'spassports. cardSeveral divisionIoT whichproducts laterlike mergedgateways withare [[Gemplus]]also to form [[Gemalto]].using Java Card<sup>TM</sup> based products areto basedsecure oncommunications thewith a cloud service for instance. End users of Java Card<sup>TM</sup> Platformtechnology specificationsinclude developedmobile byoperators, [[Sunfinancial Microsystems]]institutions, (latergovernments, amobile [[subsidiary]]device ofmakers, [[Oraclehealthcare Corporation]]).associations, Manyenterprises Javaand cardtransportation productsauthorities. alsoStandards relybodies onsuch theat GlobalPlatform[[ETSI]], specifications[https://globalplatform.org/ forGlobalPlatform], the[[GSMA]] secureand managementothers ofleverage applicationsJava onCard<sup>TM</sup> theas cardpart (download,of installation,their personalization, deletion)specifications.
The first Java Card<sup>TM</sup> was introduced in 1996 by [[Schlumberger Limited|Schlumberger]]'s card division which later merged with [[Gemplus]] to form [[Gemalto]]. Java Card<sup>TM</sup> products are based on the specifications by [[Sun Microsystems]] and continued [[Oracle Corporation]]. Many Java card<sup>TM</sup> products also rely on the GlobalPlatform specifications for the secure management of applications on the card (download, installation, personalization, deletion).
The main design goals of the Java Card technology are portability and security.<ref>{{cite journal |author1=Ahmed Patel |author2=Kenan Kalajdzic |author3=Laleh Golafshan |author4=Mona Taghavi | year = 2011 | title = Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card | journal = International Journal of Information Security and Privacy | pages = 1–18 | volume = 5 | issue = 3 |publisher = IGI | url = http://www.igi-global.com/article/international-journal-information-security-privacy/58979 }}</ref>▼
▲The main design goals of the Java Card technology are portability, security and securitybackward compatibility.<ref>{{cite journal |author1=Ahmed Patel |author2=Kenan Kalajdzic |author3=Laleh Golafshan |author4=Mona Taghavi | year = 2011 | title = Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card | journal = International Journal of Information Security and Privacy | pages = 1–18 | volume = 5 | issue = 3 |publisher = IGI | url = http://www.igi-global.com/article/international-journal-information-security-privacy/58979 }}</ref>