lokale BKU funktioniert, Online BKU nicht

  • Meine gesamte Software (Betriebsystem, Treber des Kartenlesers,
    Java, Browser) ist auf dem aktuellen Stand.
    Bei einem Versuch bei Finanzonline ueber die neue Online BKU einzuloggen ist zuerst lange nichts passiert dann bekam ich nachfolgende Java Exceptions in der Konsole angezeigt.
    Nach Terminierung des a-sign clients und des trustdesk basic
    hat das Login funktioniert.


    Java Plug-in 1.6.0_11
    Verwendung der JRE-Version 1.6.0_11 Java HotSpot(TM) Client VM
    Home-Verzeichnis des Benutzers = C:Dokumente und Einstellungenleopold zyka
    ----------------------------------------------------
    c: Konsole löschen
    f: Objekte in Finalisierungswarteschlange finalisieren
    g: Speicherbereinigung
    h: Diese Hilfemeldung anzeigen
    l: ClassLoader-Liste ausgeben
    m: Speicherbelegung anzeigen
    o: Protokollierung auslösen
    p: Proxy-Konfiguration neu laden
    q: Konsole ausblenden
    r: Richtlinien-Konfiguration neu laden
    s: System- und Bereitstellungseigenschaften ausgeben
    t: Threadliste ausgeben
    v: Thread-Stack ausgeben
    x: ClassLoader-Cache löschen
    0-5: Trace-Stufe auf <n> setzen
    ----------------------------------------------------
    java.lang.InterruptedException
    at java.lang.Object.wait(Native Method)
    at java.lang.Thread.join(Unknown Source)
    at java.lang.Thread.join(Unknown Source)
    at sun.applet.AppletPanel.run(Unknown Source)
    at java.lang.Thread.run(Unknown Source)
    java.lang.NullPointerException
    at sun.plugin.viewer.LifeCycleManager.destroyAppletPanel(Unknown Source)
    at sun.plugin.viewer.WNetscapePluginObject$3.run(Unknown Source)
    java.lang.NullPointerException
    at sun.plugin.viewer.LifeCycleManager.destroyAppletPanel(Unknown Source)
    at sun.plugin.viewer.WNetscapePluginObject$3.run(Unknown Source)
    java.lang.NoClassDefFoundError: Could not initialize class at.gv.egiz.bku.online.applet.BKUApplet
    at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance(Unknown Source)
    at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(Unknown Source)
    at java.lang.reflect.Constructor.newInstance(Unknown Source)
    at java.lang.Class.newInstance0(Unknown Source)
    at java.lang.Class.newInstance(Unknown Source)
    at sun.applet.AppletPanel.createApplet(Unknown Source)
    at sun.plugin.AppletViewer.createApplet(Unknown Source)
    at sun.applet.AppletPanel.runLoader(Unknown Source)
    at sun.applet.AppletPanel.run(Unknown Source)
    at java.lang.Thread.run(Unknown Source)

  • An sich ist die Online-BKU so konzipiert, dass sie parallel zu a-sign Client und trustdesk funktioniert.


    Hier tritt der Fehler sehr früh auf, es konnte das Online-BKU Applet noch gar nicht geladen werden. ("Could not initialize class at.gv.egiz.bku.online.applet.BKUApplet").


    Das kann auch bei Browser-Interaktionen (Zurück / Reload) beim Laden passieren.


    Wir konnten es zusammen mit a-sign client und trustdesk auf verschiedenen Systemen nicht nachstellen. Aus der Fehlermeldung ist ein Problem mit der Java-Umgebung wahrscheinlich (hier ist aber irritierend, dass die Online-BKU dann ohne a-sign client / trustddesk funktioniert hat, die beide mit der Java-Umgebung nichts zu tun haben).

  • Erhalte bei Finanz-Online folgende Exception.
    Lokale BKU lauft vorbildlich.


    javax.xml.parsers.FactoryConfigurationError: Provider IMW0254E <HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY bgcolor="#FFF7E7"><H1>Error 501</H1>IMW0112E The request is not valid or not recognized "INVALID-METHOD"<P><HR></BODY></HTML> not found


    Stacktrace:
    Java Plug-in 1.6.0_11
    Verwendung der JRE-Version 1.6.0_11 Java HotSpot(TM) Client VM
    Home-Verzeichnis des Benutzers = C:Dokumente und Einstellungenasdf
    ----------------------------------------------------
    c: Konsole löschen
    f: Objekte in Finalisierungswarteschlange finalisieren
    g: Speicherbereinigung
    h: Diese Hilfemeldung anzeigen
    l: ClassLoader-Liste ausgeben
    m: Speicherbelegung anzeigen
    o: Protokollierung auslösen
    q: Konsole ausblenden
    r: Richtlinien-Konfiguration neu laden
    s: System- und Bereitstellungseigenschaften ausgeben
    t: Threadliste ausgeben
    v: Thread-Stack ausgeben
    x: ClassLoader-Cache löschen
    0-5: Trace-Stufe auf <n> setzen
    ----------------------------------------------------
    [DEBUG] BKUApplet - Called stop()
    [DEBUG] BKUApplet - Called destroy()
    [INFO] BKUApplet - Welcome to MOCCA
    [DEBUG] BKUApplet - Called init()
    [INFO] BKUApplet - applet parameter: Locale: null
    [DEBUG] BKUApplet - setting locale to de_AT
    [INFO] BKUApplet - applet parameter: GuiStyle: null
    [INFO] BKUApplet - applet parameter https://finanzonline.bmf.gv.at…ackgroundFinanzOnline.png
    [INFO] BKUApplet - applet parameter https://finanzonline.bmf.gv.at/bkuonline/help/
    [DEBUG] BKUGUIImpl - scheduling gui initialization
    [DEBUG] BKUGUIImpl - initializing gui
    [DEBUG] BKUGUIImpl - loading background https://finanzonline.bmf.gv.at…ackgroundFinanzOnline.png
    [DEBUG] AbstractSMCCSTAL - Registering STAL request handler: InfoboxReadRequest
    [DEBUG] AbstractSMCCSTAL - Registering STAL request handler: QuitRequest
    [INFO] BKUApplet - applet parameter: SessionID: 5A31E225BAC08EB66F5A6B1100DA8DAF
    [DEBUG] BKUApplet - Called start()
    [DEBUG] BKUGUIImpl - scheduling welcome dialog
    [INFO] BKUApplet - applet parameter https://finanzonline.bmf.gv.at/bkuonline/stal?wsdl
    [DEBUG] AbstractBKUWorker - STAL WSDL at https://finanzonline.bmf.gv.at/bkuonline/stal?wsdl
    [DEBUG] BKUGUIImpl - show welcome dialog
    [TRACE] HelpMouseListener - setting help topic: help.welcome
    [INFO] BKUApplet - applet parameter: HashDataDisplay: null
    [DEBUG] AbstractBKUWorker - register SignRequestHandler for STAL port WSDL_URL
    [DEBUG] AbstractSMCCSTAL - Registering STAL request handler: SignRequest
    [INFO] AbstractBKUWorker - Received 3 STAL requests: class at.gv.egiz.stal.InfoboxReadRequest class at.gv.egiz.stal.InfoboxReadRequest class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] InternalSSLSocketFactory - Checking if server is egov agency
    [INFO] InternalSSLSocketFactory - Server cert: [
    [
    Version: V3
    Subject: CN=finanzonline.bmf.gv.at, OU=IT-Sektion, O=Bundesministerium fuer Finanzen, L=Wien, ST=Wien, C=AT
    Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5


    Key: Sun RSA public key, 1024 bits
    modulus: 151708116765463881239657895784491687900296398517265875296427569871215168791389076628389255732878315408788240817277184085215668626948923239841876218368531397563929159317576898162246152781976222637367710850001486373001145952006331178302656186439696446751344439411635975803930800293237107846695383370610383539217
    public exponent: 65537
    Validity: [From: Fri Jan 11 16:14:58 CET 2008,
    To: Tue Jan 12 12:03:38 CET 2010]
    Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
    SerialNumber: [ 1fab9f05 9fadf93c d6d4999e 138eb81a]


    Certificate Extensions: 4
    [1]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
    [DistributionPoint:
    [URIName: http://crl.thawte.com/ThawtePremiumServerCA.crl]
    ]]


    [2]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
    serverAuth
    clientAuth
    ]


    [3]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
    CA:false
    PathLen: undefined
    ]


    [4]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
    [accessMethod: 1.3.6.1.5.5.7.48.1
    accessLocation: URIName: http://ocsp.thawte.com]
    ]


    ]
    Algorithm: [SHA1withRSA]
    Signature:
    0000: 7C 6D FB D2 A6 FF 6B 24 15 7E 07 25 31 8E B9 48 .m....k$...%1..H
    0010: 8C B9 C0 D6 01 D0 4A BC 0B CD 87 F2 EF AD 3B BB ......J.......;.
    0020: 71 A9 A1 A9 CD 58 2E 19 01 42 83 5C AA 47 89 5D q....X...B..G.]
    0030: 1A BA 55 17 99 A8 E2 5C 7D FC 6B E2 61 D8 8A 8C ..U......k.a...
    0040: D4 2D C7 B4 AA DA 55 3C B0 B2 4E F7 94 4F 99 E9 .-....U<..N..O..
    0050: 6A 59 87 09 8A 94 22 BA E4 BF C5 2F 54 82 47 D8 jY...."..../T.G.
    0060: F1 13 E0 10 74 D3 8C 08 82 F2 DD 26 2F 15 61 97 ....t......&/.a.
    0070: 4A FF 5E 1F FF ED BE 8D 0B 58 47 8C E2 CB D7 96 J.^......XG.....


    ]
    [DEBUG] AbstractSMCCSTAL - Got request list containing 3 STAL requests
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Retry #0 of 3
    [DEBUG] SmartCardIO - TerminalFactory : TerminalFactory for type PC/SC from provider SunPCSC
    [DEBUG] SmartCardIO - CardTerminals : sun.security.smartcardio.PCSCTerminals@12ca580
    [INFO] SmartCardIO - Found 1 card terminal(s):
    REINER SCT cyberJack pinpad/e-com USB 52
    [TRACE] SmartCardIO - terminals.list(State.CARD_REMOVAL)
    [TRACE] SmartCardIO - terminals.list(State.CARD_INSERTION)
    [TRACE] SmartCardIO - Trying to connect to card.
    [TRACE] SmartCardIO - terminal &#39;PC/SC terminal REINER SCT cyberJack pinpad/e-com USB 52&#39; card inserted : PC/SC card in REINER SCT cyberJack pinpad/e-com USB 52, protocol T=1, state OK
    [TRACE] AbstractSignatureCard - Setting IFS (information field size) to 254
    [TRACE] SMCCHelper - Found supported card (a-sign premium) in terminal &#39;REINER SCT cyberJack pinpad/e-com USB 52&#39;, ATR = [3b:bf:11:00:81:31:fe:45:45:50:41:00:00:00:00:00:00:00:00:00:00:00:00:f1].
    [DEBUG] InfoBoxReadRequestHandler - Handling identitylink infobox
    [TRACE] AbstractSignatureCard - CommmandAPDU: 13 bytes, nc=7, ne=256
    00:a4:04:00:07:a0:00:00:01:18:45:4e:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 30 bytes, SW=9000
    [78ms]
    6f:1a:84:07:a0:00:00:01:18:45:4e:85:0f:50:0d:44:49:47:53:49:47:20:43:43:20:45:4e:43:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 8 bytes, nc=2, ne=256
    00:a4:00:00:02:c0:02:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 11 bytes, SW=9000
    [47ms]
    6f:07:80:02:05:dc:82:01:01:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=1
    00:b0:00:00:01
    [TRACE] AbstractSignatureCard - ResponseAPDU: 2 bytes, SW=6982
    [78ms]
    69:82
    [DEBUG] BKUGUIImpl - scheduling card-pin dialog
    [DEBUG] BKUGUIImpl - show card-pin dialog
    [TRACE] HelpMouseListener - setting help topic: help.cardpin
    [DEBUG] BKUGUIImpl - scheduling wait dialog
    [DEBUG] BKUGUIImpl - show wait dialog
    [TRACE] AbstractSignatureCard - CommmandAPDU: 13 bytes, nc=8, ne=0
    [TRACE] HelpMouseListener - setting help topic: help.wait
    [TRACE] AbstractSignatureCard - ResponseAPDU: 2 bytes, SW=9000
    [47ms]
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:00:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    30:82:02:15:02:01:01:0c:26:68:74:74:70:3a:2f:2f:77:77:77:2e:61:2d:74:72:75:73:74:2e:61:74:2f:7a:6d:72:2f:70:65:72:73:62:32:30:34:2e:78:73:6c:0c:2a:73:7a:72:2e:62:6d:69:2e:67:76:2e:61:74:2d:41:73:73:65:72:74:69:6f:6e:49:44:31:31:37:32:30:35:33:31:37:32:38:36:33:32:36:35:33:0c:19:32:30:30:37:2d:30:32:2d:32:31:54:31:30:3a:31:39:3a:33:32:2b:30:31:3a:30:30:a0:45:30:43:0c:18:47:65:46:52:31:4d:35:74:72:66:71:54:52:69:61:46:33:67:69:34:65:41:3d:3d:0c:0f:57:6f:6c:66:67:61:6e:67:20:4d:61:72:74:69:6e:0c:0a:48:6f:6c:7a:68:61:6d:6d:65:72:0c:0a:31:39:38:30:2d:30:33:2d:31:33:30:0a:a0:03:02:01:00:a0:03:02:01:01:03:82:01:01:00:74:7f:7b:44:c5:be:20:3a:cc:40:40:0b:39:fe:ee:2d:a9:7f:64:f4:90:a7:76:62:69:a8:fd:84:9f:94:a1:1f:59:14:5a:78:08:5d:35:db:61:10:fd:0c:2c:54:67:ff:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:fe:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [344ms]
    33:23:e4:82:cc:8a:2f:77:79:95:25:64:8f:66:dc:e7:b4:11:0f:94:ed:9c:d5:ee:49:6a:6b:93:de:6d:dc:f1:cb:5f:ed:34:f4:a4:82:dc:49:2a:ad:8d:24:58:77:af:1f:0e:d4:e6:98:18:96:2c:ec:12:87:bc:df:a9:b2:f5:4a:31:3e:b3:fa:87:45:46:a2:03:f9:71:d1:c1:a4:d3:ab:f1:6b:37:81:8d:11:e1:30:4f:97:de:dd:a3:4f:dc:bc:e2:1f:ad:90:df:5a:93:ed:06:b9:4e:4d:54:4f:d4:3e:ea:e7:6d:bf:f7:5c:40:5d:55:52:e0:7a:74:85:b3:fa:58:5f:e8:27:4a:95:71:dc:d3:b4:07:d0:09:d5:f2:66:7b:d2:c7:28:2f:f4:93:5f:cf:76:64:fb:7a:e9:4f:6d:14:e4:aa:4f:c3:ee:18:c8:10:38:80:7b:f3:99:78:27:5b:7e:11:d5:d5:8f:af:dc:f3:25:20:b6:d2:98:c8:9c:54:7e:47:7a:20:74:ff:b4:4c:80:83:72:2e:ab:5f:a0:17:03:15:00:96:1c:94:b5:df:25:db:31:d8:9b:3e:c3:7a:bc:9f:aa:d1:10:7d:81:a1:17:03:15:00:42:e8:e2:0f:e5:10:78:bf:99:b0:e1:59:43:0f:91:40:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=29
    00:b0:01:fc:1d
    [TRACE] AbstractSignatureCard - ResponseAPDU: 31 bytes, SW=9000
    [78ms]
    b0:28:6a:57:a2:17:03:15:00:27:15:62:10:90:77:17:33:b6:11:2a:0b:4b:9e:91:fb:8f:86:2f:24:90:00
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Retry #0 of 3
    [DEBUG] SmartCardIO - TerminalFactory : TerminalFactory for type PC/SC from provider SunPCSC
    [DEBUG] SmartCardIO - CardTerminals : sun.security.smartcardio.PCSCTerminals@13c4c09
    [INFO] SmartCardIO - Found 1 card terminal(s):
    REINER SCT cyberJack pinpad/e-com USB 52
    [TRACE] SmartCardIO - terminals.list(State.CARD_REMOVAL)
    [TRACE] SmartCardIO - terminals.list(State.CARD_INSERTION)
    [TRACE] SmartCardIO - Trying to connect to card.
    [TRACE] SmartCardIO - terminal &#39;PC/SC terminal REINER SCT cyberJack pinpad/e-com USB 52&#39; card inserted : PC/SC card in REINER SCT cyberJack pinpad/e-com USB 52, protocol T=1, state OK
    [TRACE] AbstractSignatureCard - Setting IFS (information field size) to 254
    [TRACE] SMCCHelper - Found supported card (a-sign premium) in terminal &#39;REINER SCT cyberJack pinpad/e-com USB 52&#39;, ATR = [3b:bf:11:00:81:31:fe:45:45:50:41:00:00:00:00:00:00:00:00:00:00:00:00:f1].
    [DEBUG] InfoBoxReadRequestHandler - Handling secure signature keypair infobox
    [DEBUG] ACOSCard - Get certificate for keybox &#39;SecureSignatureKeypair&#39; (AID=a0:00:00:01:18:45:43 EF=c0:02).
    [TRACE] AbstractSignatureCard - CommmandAPDU: 13 bytes, nc=7, ne=256
    00:a4:04:00:07:a0:00:00:01:18:45:43:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 30 bytes, SW=9000
    [78ms]
    6f:1a:84:07:a0:00:00:01:18:45:43:85:0f:50:0d:44:49:47:53:49:47:20:43:43:20:45:43:43:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 8 bytes, nc=2, ne=256
    00:a4:00:00:02:c0:02:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 11 bytes, SW=9000
    [31ms]
    6f:07:80:02:07:d0:82:01:01:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=1
    00:b0:00:00:01
    [TRACE] AbstractSignatureCard - ResponseAPDU: 3 bytes, SW=9000
    [32ms]
    30:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:00:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    30:82:04:e1:30:82:03:c9:a0:03:02:01:02:02:03:02:f2:07:30:0d:06:09:2a:86:48:86:f7:0d:01:01:05:05:00:30:81:97:31:0b:30:09:06:03:55:04:06:13:02:41:54:31:48:30:46:06:03:55:04:0a:0c:3f:41:2d:54:72:75:73:74:20:47:65:73:2e:20:66:2e:20:53:69:63:68:65:72:68:65:69:74:73:73:79:73:74:65:6d:65:20:69:6d:20:65:6c:65:6b:74:72:2e:20:44:61:74:65:6e:76:65:72:6b:65:68:72:20:47:6d:62:48:31:1e:30:1c:06:03:55:04:0b:0c:15:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:31:1e:30:1c:06:03:55:04:03:0c:15:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:30:1e:17:0d:30:37:30:32:31:39:31:34:30:32:35:36:5a:17:0d:31:32:30:32:31:39:31:34:30:32:35:36:5a:30:6a:31:0b:30:09:06:03:55:04:06:13:02:41:54:31:1c:30:1a:06:03:55:04:03:0c:13:57:6f:6c:66:67:61:6e:67:20:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:fe:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    48:6f:6c:7a:68:61:6d:6d:65:72:31:13:30:11:06:03:55:04:04:0c:0a:48:6f:6c:7a:68:61:6d:6d:65:72:31:11:30:0f:06:03:55:04:2a:0c:08:57:6f:6c:66:67:61:6e:67:31:15:30:13:06:03:55:04:05:13:0c:34:33:33:30:37:35:36:37:33:35:34:34:30:49:30:13:06:07:2a:86:48:ce:3d:02:01:06:08:2a:86:48:ce:3d:03:01:01:03:32:00:04:d4:0a:0f:d9:bc:df:dd:c1:4f:b8:8d:5a:e6:f7:b5:d8:b9:ab:55:9d:7d:2b:8d:c3:3c:bf:5f:da:70:3e:29:49:7b:81:e1:be:f3:da:8a:64:f7:b5:f6:b4:fe:42:51:fe:a3:82:02:3b:30:82:02:37:30:13:06:03:55:1d:23:04:0c:30:0a:80:08:4d:df:e1:ff:4b:d9:c9:df:30:27:06:08:2b:06:01:05:05:07:01:03:01:01:ff:04:18:30:16:30:08:06:06:04:00:8e:46:01:01:30:0a:06:08:2b:06:01:05:05:07:0b:01:30:7b:06:08:2b:06:01:05:05:07:01:01:04:6f:30:6d:30:42:06:08:2b:06:01:05:05:07:30:02:86:36:68:74:74:70:3a:2f:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:01:fc:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [360ms]
    2f:77:77:77:2e:61:2d:74:72:75:73:74:2e:61:74:2f:63:65:72:74:73:2f:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:61:2e:63:72:74:30:27:06:08:2b:06:01:05:05:07:30:01:86:1b:68:74:74:70:3a:2f:2f:6f:63:73:70:2e:61:2d:74:72:75:73:74:2e:61:74:2f:6f:63:73:70:30:59:06:03:55:1d:20:04:52:30:50:30:44:06:06:2a:28:00:11:01:0b:30:3a:30:38:06:08:2b:06:01:05:05:07:02:01:16:2c:68:74:74:70:3a:2f:2f:77:77:77:2e:61:2d:74:72:75:73:74:2e:61:74:2f:64:6f:63:73:2f:63:70:2f:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:30:08:06:06:04:00:8b:30:01:01:30:81:9a:06:03:55:1d:1f:04:81:92:30:81:8f:30:81:8c:a0:81:89:a0:81:86:86:81:83:6c:64:61:70:3a:2f:2f:6c:64:61:70:2e:61:2d:74:72:75:73:74:2e:61:74:2f:6f:75:3d:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:2c:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:02:fa:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    6f:3d:41:2d:54:72:75:73:74:2c:63:3d:41:54:3f:63:65:72:74:69:66:69:63:61:74:65:72:65:76:6f:63:61:74:69:6f:6e:6c:69:73:74:3f:62:61:73:65:3f:6f:62:6a:65:63:74:63:6c:61:73:73:3d:65:69:64:43:65:72:74:69:66:69:63:61:74:69:6f:6e:41:75:74:68:6f:72:69:74:79:30:11:06:03:55:1d:0e:04:0a:04:08:4d:b7:31:0d:16:c5:b0:16:30:0e:06:03:55:1d:0f:01:01:ff:04:04:03:02:06:c0:30:28:06:03:55:1d:09:04:21:30:1f:30:1d:06:08:2b:06:01:05:05:07:09:01:31:11:18:0f:31:39:38:30:30:33:31:33:30:30:30:30:30:30:5a:30:2a:06:03:55:1d:11:04:23:30:21:81:1f:77:6f:6c:66:67:61:6e:67:2e:68:6f:6c:7a:68:61:6d:6d:65:72:40:74:69:72:6f:6c:2e:67:76:2e:61:74:30:09:06:03:55:1d:13:04:02:30:00:30:0d:06:09:2a:86:48:86:f7:0d:01:01:05:05:00:03:82:01:01:00:66:3f:03:1a:95:b4:f9:27:f4:3b:1d:fc:12:88:3a:3a:b6:75:be:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=237
    00:b0:03:f8:ed
    [TRACE] AbstractSignatureCard - ResponseAPDU: 239 bytes, SW=9000
    [297ms]
    c4:d0:9e:ea:f5:2f:a7:72:c9:47:b9:87:57:7f:1f:b6:ce:99:e0:5e:8d:6c:44:08:72:00:a3:df:1c:05:46:d5:c1:99:ea:4b:8c:09:b4:9d:ad:db:58:d2:86:08:c6:1e:19:90:30:ac:27:a1:4f:bb:9b:c9:41:e8:e8:2a:79:87:26:f7:fe:42:6a:0d:29:5d:55:21:eb:18:7f:db:26:2a:01:35:80:e3:34:6d:40:37:6f:77:9a:8b:ae:1f:1d:0f:71:ed:bf:7b:b3:94:da:8a:bd:8e:af:e7:7b:59:36:33:f7:1b:78:6b:71:c3:79:cf:00:5d:bf:c8:0a:2e:b8:14:5f:5e:f3:3f:96:33:99:00:09:45:0b:4b:d6:77:5c:eb:86:49:bb:2e:39:76:98:c9:f0:cc:e5:85:73:3b:21:f1:8e:38:12:bb:f1:28:6c:55:7b:83:6c:26:2a:58:32:5f:f6:fb:ee:3e:47:88:d2:17:a4:37:14:7e:5c:90:1b:e5:32:8e:87:4e:d7:77:f0:2e:14:b5:b5:b3:fa:1e:fa:15:ba:75:85:c9:ab:48:3e:bf:ba:a1:b6:f4:1c:15:74:da:0c:fa:1f:d6:7b:cd:49:b8:78:6c:95:93:a1:90:00
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Retry #0 of 3
    [DEBUG] SmartCardIO - TerminalFactory : TerminalFactory for type PC/SC from provider SunPCSC
    [DEBUG] SmartCardIO - CardTerminals : sun.security.smartcardio.PCSCTerminals@1798928
    [INFO] SmartCardIO - Found 1 card terminal(s):
    REINER SCT cyberJack pinpad/e-com USB 52
    [TRACE] SmartCardIO - terminals.list(State.CARD_REMOVAL)
    [TRACE] SmartCardIO - terminals.list(State.CARD_INSERTION)
    [TRACE] SmartCardIO - Trying to connect to card.
    [TRACE] SmartCardIO - terminal &#39;PC/SC terminal REINER SCT cyberJack pinpad/e-com USB 52&#39; card inserted : PC/SC card in REINER SCT cyberJack pinpad/e-com USB 52, protocol T=1, state OK
    [TRACE] AbstractSignatureCard - Setting IFS (information field size) to 254
    [TRACE] SMCCHelper - Found supported card (a-sign premium) in terminal &#39;REINER SCT cyberJack pinpad/e-com USB 52&#39;, ATR = [3b:bf:11:00:81:31:fe:45:45:50:41:00:00:00:00:00:00:00:00:00:00:00:00:f1].
    [DEBUG] InfoBoxReadRequestHandler - Handling certified keypair infobox
    [DEBUG] ACOSCard - Get certificate for keybox &#39;CertifiedKeypair&#39; (AID=a0:00:00:01:18:45:4e EF=c0:01).
    [TRACE] AbstractSignatureCard - CommmandAPDU: 13 bytes, nc=7, ne=256
    00:a4:04:00:07:a0:00:00:01:18:45:4e:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 30 bytes, SW=9000
    [78ms]
    6f:1a:84:07:a0:00:00:01:18:45:4e:85:0f:50:0d:44:49:47:53:49:47:20:43:43:20:45:4e:43:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 8 bytes, nc=2, ne=256
    00:a4:00:00:02:c0:01:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 11 bytes, SW=9000
    [31ms]
    6f:07:80:02:07:d0:82:01:01:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=1
    00:b0:00:00:01
    [TRACE] AbstractSignatureCard - ResponseAPDU: 3 bytes, SW=9000
    [32ms]
    30:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:00:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [343ms]
    30:82:05:43:30:82:04:2b:a0:03:02:01:02:02:03:02:f2:08:30:0d:06:09:2a:86:48:86:f7:0d:01:01:05:05:00:30:81:97:31:0b:30:09:06:03:55:04:06:13:02:41:54:31:48:30:46:06:03:55:04:0a:0c:3f:41:2d:54:72:75:73:74:20:47:65:73:2e:20:66:2e:20:53:69:63:68:65:72:68:65:69:74:73:73:79:73:74:65:6d:65:20:69:6d:20:65:6c:65:6b:74:72:2e:20:44:61:74:65:6e:76:65:72:6b:65:68:72:20:47:6d:62:48:31:1e:30:1c:06:03:55:04:0b:0c:15:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:45:6e:63:2d:30:32:31:1e:30:1c:06:03:55:04:03:0c:15:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:45:6e:63:2d:30:32:30:1e:17:0d:30:37:30:32:31:39:31:34:30:32:35:37:5a:17:0d:31:32:30:32:31:39:31:34:30:32:35:37:5a:30:6a:31:0b:30:09:06:03:55:04:06:13:02:41:54:31:1c:30:1a:06:03:55:04:03:0c:13:57:6f:6c:66:67:61:6e:67:20:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:fe:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [360ms]
    48:6f:6c:7a:68:61:6d:6d:65:72:31:13:30:11:06:03:55:04:04:0c:0a:48:6f:6c:7a:68:61:6d:6d:65:72:31:11:30:0f:06:03:55:04:2a:0c:08:57:6f:6c:66:67:61:6e:67:31:15:30:13:06:03:55:04:05:13:0c:34:33:33:30:37:35:36:37:33:35:34:34:30:81:df:30:0d:06:09:2a:86:48:86:f7:0d:01:01:01:05:00:03:81:cd:00:30:81:c9:02:81:c1:00:b5:b1:2e:af:ed:68:f9:05:ee:8e:68:78:74:8a:0b:ec:2a:a2:fd:cf:fc:02:5c:41:84:7b:63:2f:a4:21:09:cd:fe:2d:79:5d:6b:a0:1a:bf:2b:42:44:f9:78:98:99:83:6c:43:e8:d4:50:ae:d1:26:39:b1:1f:0a:4e:cc:a5:e6:ce:05:e1:19:1c:63:68:8f:59:ab:9a:eb:9c:36:fc:95:ab:fb:96:aa:7b:b5:49:51:54:8a:69:b0:32:e3:7f:8d:bb:0a:e1:d5:f5:bb:b5:95:8e:d4:b4:0a:05:95:61:81:27:54:de:27:8b:cb:4e:fe:ed:d8:2d:f8:f5:66:70:1d:30:7d:16:24:1f:5f:d4:68:64:34:97:96:57:f8:cd:b6:37:8f:a3:34:89:55:8a:f7:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:01:fc:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    2d:8b:39:29:cf:68:aa:8f:be:c1:45:5a:03:f2:b6:ba:6e:7a:5d:16:7e:58:93:c6:6b:52:6c:19:36:bc:ae:9b:2f:f4:07:c9:b9:61:4f:8f:02:03:01:00:01:a3:82:02:06:30:82:02:02:30:13:06:03:55:1d:23:04:0c:30:0a:80:08:47:21:47:8e:97:61:e3:1e:30:7b:06:08:2b:06:01:05:05:07:01:01:04:6f:30:6d:30:42:06:08:2b:06:01:05:05:07:30:02:86:36:68:74:74:70:3a:2f:2f:77:77:77:2e:61:2d:74:72:75:73:74:2e:61:74:2f:63:65:72:74:73:2f:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:45:6e:63:2d:30:32:61:2e:63:72:74:30:27:06:08:2b:06:01:05:05:07:30:01:86:1b:68:74:74:70:3a:2f:2f:6f:63:73:70:2e:61:2d:74:72:75:73:74:2e:61:74:2f:6f:63:73:70:30:4d:06:03:55:1d:20:04:46:30:44:30:42:06:06:2a:28:00:11:01:0c:30:38:30:36:06:08:2b:06:01:05:05:07:02:01:16:2a:68:74:74:70:3a:2f:2f:77:77:77:2e:61:2d:74:72:75:73:74:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:02:fa:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [344ms]
    2e:61:74:2f:64:6f:63:73:2f:63:70:2f:61:2d:73:69:67:6e:2d:74:6f:6b:65:6e:30:81:9a:06:03:55:1d:1f:04:81:92:30:81:8f:30:81:8c:a0:81:89:a0:81:86:86:81:83:6c:64:61:70:3a:2f:2f:6c:64:61:70:2e:61:2d:74:72:75:73:74:2e:61:74:2f:6f:75:3d:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:45:6e:63:2d:30:32:2c:6f:3d:41:2d:54:72:75:73:74:2c:63:3d:41:54:3f:63:65:72:74:69:66:69:63:61:74:65:72:65:76:6f:63:61:74:69:6f:6e:6c:69:73:74:3f:62:61:73:65:3f:6f:62:6a:65:63:74:63:6c:61:73:73:3d:65:69:64:43:65:72:74:69:66:69:63:61:74:69:6f:6e:41:75:74:68:6f:72:69:74:79:30:11:06:03:55:1d:0e:04:0a:04:08:40:21:cd:21:89:bc:30:12:30:0e:06:03:55:1d:0f:01:01:ff:04:04:03:02:04:b0:30:28:06:03:55:1d:09:04:21:30:1f:30:1d:06:08:2b:06:01:05:05:07:09:01:31:11:18:0f:31:39:38:30:30:33:31:33:30:30:30:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:03:f8:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [344ms]
    30:30:30:5a:30:2a:06:03:55:1d:11:04:23:30:21:81:1f:77:6f:6c:66:67:61:6e:67:2e:68:6f:6c:7a:68:61:6d:6d:65:72:40:74:69:72:6f:6c:2e:67:76:2e:61:74:30:09:06:03:55:1d:13:04:02:30:00:30:0d:06:09:2a:86:48:86:f7:0d:01:01:05:05:00:03:82:01:01:00:59:b3:4d:29:6d:29:8c:30:ce:31:78:15:e1:42:6e:02:9d:ae:d3:40:45:dc:59:a8:b9:a9:7b:7e:77:e6:84:42:de:82:9d:08:0f:e2:fe:66:40:47:d7:94:c1:df:fa:e4:4d:13:32:6b:95:de:a4:a6:0b:c3:f4:fe:9b:ee:c5:b5:cf:ec:ec:c4:e3:9f:10:6b:65:17:a7:89:24:4a:35:b6:a7:eb:a3:7e:ff:f0:59:d5:de:5d:38:90:96:87:a1:4f:4c:df:7d:63:00:1a:83:9a:ad:ad:4b:ba:4b:5d:57:07:4a:7d:c5:39:f6:72:62:e0:a5:d5:5b:b2:30:12:41:a5:53:09:0b:77:6a:8d:53:1c:da:16:08:0b:8d:9d:a4:cc:77:d2:24:51:64:09:c1:16:7a:22:13:92:40:b1:54:7a:6f:44:ce:87:01:c6:41:9f:5f:bb:d8:b3:19:70:ec:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=81
    00:b0:04:f6:51
    [TRACE] AbstractSignatureCard - ResponseAPDU: 83 bytes, SW=9000
    [109ms]
    b7:c9:4c:02:21:19:8e:10:45:dd:a3:8f:fc:fe:d2:87:03:0c:b3:50:30:f6:09:6f:ff:21:5a:53:07:74:c0:32:df:67:8c:97:df:4f:26:af:58:1b:bb:f6:9f:42:ed:db:1d:91:06:5f:72:e8:8d:03:dd:b1:c2:e5:a6:64:d0:68:aa:f2:e1:e4:0b:6b:da:d4:02:84:d9:4f:e5:a6:e2:22:e8:90:00
    [INFO] AbstractBKUWorker - STAL responses: class at.gv.egiz.stal.InfoboxReadResponse class at.gv.egiz.stal.InfoboxReadResponse class at.gv.egiz.stal.InfoboxReadResponse
    [INFO] AbstractBKUWorker - Not finished yet (BKUWorker: at.gv.egiz.bku.online.applet.AppletBKUWorker@1ed7ac), sending responses
    [INFO] AbstractBKUWorker - Received 1 STAL requests: class at.gv.egiz.stal.InfoboxReadRequest
    [DEBUG] AbstractSMCCSTAL - Got request list containing 1 STAL requests
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.InfoboxReadRequest
    [INFO] AbstractSMCCSTAL - Retry #0 of 3
    [DEBUG] SmartCardIO - TerminalFactory : TerminalFactory for type PC/SC from provider SunPCSC
    [DEBUG] SmartCardIO - CardTerminals : sun.security.smartcardio.PCSCTerminals@79ac92
    [INFO] SmartCardIO - Found 1 card terminal(s):
    REINER SCT cyberJack pinpad/e-com USB 52
    [TRACE] SmartCardIO - terminals.list(State.CARD_REMOVAL)
    [TRACE] SmartCardIO - terminals.list(State.CARD_INSERTION)
    [TRACE] SmartCardIO - Trying to connect to card.
    [TRACE] SmartCardIO - terminal &#39;PC/SC terminal REINER SCT cyberJack pinpad/e-com USB 52&#39; card inserted : PC/SC card in REINER SCT cyberJack pinpad/e-com USB 52, protocol T=1, state OK
    [TRACE] AbstractSignatureCard - Setting IFS (information field size) to 254
    [TRACE] SMCCHelper - Found supported card (a-sign premium) in terminal &#39;REINER SCT cyberJack pinpad/e-com USB 52&#39;, ATR = [3b:bf:11:00:81:31:fe:45:45:50:41:00:00:00:00:00:00:00:00:00:00:00:00:f1].
    [DEBUG] InfoBoxReadRequestHandler - Handling secure signature keypair infobox
    [DEBUG] ACOSCard - Get certificate for keybox &#39;SecureSignatureKeypair&#39; (AID=a0:00:00:01:18:45:43 EF=c0:02).
    [TRACE] AbstractSignatureCard - CommmandAPDU: 13 bytes, nc=7, ne=256
    00:a4:04:00:07:a0:00:00:01:18:45:43:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 30 bytes, SW=9000
    [78ms]
    6f:1a:84:07:a0:00:00:01:18:45:43:85:0f:50:0d:44:49:47:53:49:47:20:43:43:20:45:43:43:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 8 bytes, nc=2, ne=256
    00:a4:00:00:02:c0:02:00
    [TRACE] AbstractSignatureCard - ResponseAPDU: 11 bytes, SW=9000
    [31ms]
    6f:07:80:02:07:d0:82:01:01:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=1
    00:b0:00:00:01
    [TRACE] AbstractSignatureCard - ResponseAPDU: 3 bytes, SW=9000
    [31ms]
    30:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:00:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [360ms]
    30:82:04:e1:30:82:03:c9:a0:03:02:01:02:02:03:02:f2:07:30:0d:06:09:2a:86:48:86:f7:0d:01:01:05:05:00:30:81:97:31:0b:30:09:06:03:55:04:06:13:02:41:54:31:48:30:46:06:03:55:04:0a:0c:3f:41:2d:54:72:75:73:74:20:47:65:73:2e:20:66:2e:20:53:69:63:68:65:72:68:65:69:74:73:73:79:73:74:65:6d:65:20:69:6d:20:65:6c:65:6b:74:72:2e:20:44:61:74:65:6e:76:65:72:6b:65:68:72:20:47:6d:62:48:31:1e:30:1c:06:03:55:04:0b:0c:15:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:31:1e:30:1c:06:03:55:04:03:0c:15:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:30:1e:17:0d:30:37:30:32:31:39:31:34:30:32:35:36:5a:17:0d:31:32:30:32:31:39:31:34:30:32:35:36:5a:30:6a:31:0b:30:09:06:03:55:04:06:13:02:41:54:31:1c:30:1a:06:03:55:04:03:0c:13:57:6f:6c:66:67:61:6e:67:20:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:00:fe:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    48:6f:6c:7a:68:61:6d:6d:65:72:31:13:30:11:06:03:55:04:04:0c:0a:48:6f:6c:7a:68:61:6d:6d:65:72:31:11:30:0f:06:03:55:04:2a:0c:08:57:6f:6c:66:67:61:6e:67:31:15:30:13:06:03:55:04:05:13:0c:34:33:33:30:37:35:36:37:33:35:34:34:30:49:30:13:06:07:2a:86:48:ce:3d:02:01:06:08:2a:86:48:ce:3d:03:01:01:03:32:00:04:d4:0a:0f:d9:bc:df:dd:c1:4f:b8:8d:5a:e6:f7:b5:d8:b9:ab:55:9d:7d:2b:8d:c3:3c:bf:5f:da:70:3e:29:49:7b:81:e1:be:f3:da:8a:64:f7:b5:f6:b4:fe:42:51:fe:a3:82:02:3b:30:82:02:37:30:13:06:03:55:1d:23:04:0c:30:0a:80:08:4d:df:e1:ff:4b:d9:c9:df:30:27:06:08:2b:06:01:05:05:07:01:03:01:01:ff:04:18:30:16:30:08:06:06:04:00:8e:46:01:01:30:0a:06:08:2b:06:01:05:05:07:0b:01:30:7b:06:08:2b:06:01:05:05:07:01:01:04:6f:30:6d:30:42:06:08:2b:06:01:05:05:07:30:02:86:36:68:74:74:70:3a:2f:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:01:fc:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [359ms]
    2f:77:77:77:2e:61:2d:74:72:75:73:74:2e:61:74:2f:63:65:72:74:73:2f:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:61:2e:63:72:74:30:27:06:08:2b:06:01:05:05:07:30:01:86:1b:68:74:74:70:3a:2f:2f:6f:63:73:70:2e:61:2d:74:72:75:73:74:2e:61:74:2f:6f:63:73:70:30:59:06:03:55:1d:20:04:52:30:50:30:44:06:06:2a:28:00:11:01:0b:30:3a:30:38:06:08:2b:06:01:05:05:07:02:01:16:2c:68:74:74:70:3a:2f:2f:77:77:77:2e:61:2d:74:72:75:73:74:2e:61:74:2f:64:6f:63:73:2f:63:70:2f:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:30:08:06:06:04:00:8b:30:01:01:30:81:9a:06:03:55:1d:1f:04:81:92:30:81:8f:30:81:8c:a0:81:89:a0:81:86:86:81:83:6c:64:61:70:3a:2f:2f:6c:64:61:70:2e:61:2d:74:72:75:73:74:2e:61:74:2f:6f:75:3d:61:2d:73:69:67:6e:2d:50:72:65:6d:69:75:6d:2d:53:69:67:2d:30:32:2c:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=254
    00:b0:02:fa:fe
    [TRACE] AbstractSignatureCard - ResponseAPDU: 256 bytes, SW=9000
    [360ms]
    6f:3d:41:2d:54:72:75:73:74:2c:63:3d:41:54:3f:63:65:72:74:69:66:69:63:61:74:65:72:65:76:6f:63:61:74:69:6f:6e:6c:69:73:74:3f:62:61:73:65:3f:6f:62:6a:65:63:74:63:6c:61:73:73:3d:65:69:64:43:65:72:74:69:66:69:63:61:74:69:6f:6e:41:75:74:68:6f:72:69:74:79:30:11:06:03:55:1d:0e:04:0a:04:08:4d:b7:31:0d:16:c5:b0:16:30:0e:06:03:55:1d:0f:01:01:ff:04:04:03:02:06:c0:30:28:06:03:55:1d:09:04:21:30:1f:30:1d:06:08:2b:06:01:05:05:07:09:01:31:11:18:0f:31:39:38:30:30:33:31:33:30:30:30:30:30:30:5a:30:2a:06:03:55:1d:11:04:23:30:21:81:1f:77:6f:6c:66:67:61:6e:67:2e:68:6f:6c:7a:68:61:6d:6d:65:72:40:74:69:72:6f:6c:2e:67:76:2e:61:74:30:09:06:03:55:1d:13:04:02:30:00:30:0d:06:09:2a:86:48:86:f7:0d:01:01:05:05:00:03:82:01:01:00:66:3f:03:1a:95:b4:f9:27:f4:3b:1d:fc:12:88:3a:3a:b6:75:be:90:00
    [TRACE] AbstractSignatureCard - CommmandAPDU: 5 bytes, nc=0, ne=237
    00:b0:03:f8:ed
    [TRACE] AbstractSignatureCard - ResponseAPDU: 239 bytes, SW=9000
    [312ms]
    c4:d0:9e:ea:f5:2f:a7:72:c9:47:b9:87:57:7f:1f:b6:ce:99:e0:5e:8d:6c:44:08:72:00:a3:df:1c:05:46:d5:c1:99:ea:4b:8c:09:b4:9d:ad:db:58:d2:86:08:c6:1e:19:90:30:ac:27:a1:4f:bb:9b:c9:41:e8:e8:2a:79:87:26:f7:fe:42:6a:0d:29:5d:55:21:eb:18:7f:db:26:2a:01:35:80:e3:34:6d:40:37:6f:77:9a:8b:ae:1f:1d:0f:71:ed:bf:7b:b3:94:da:8a:bd:8e:af:e7:7b:59:36:33:f7:1b:78:6b:71:c3:79:cf:00:5d:bf:c8:0a:2e:b8:14:5f:5e:f3:3f:96:33:99:00:09:45:0b:4b:d6:77:5c:eb:86:49:bb:2e:39:76:98:c9:f0:cc:e5:85:73:3b:21:f1:8e:38:12:bb:f1:28:6c:55:7b:83:6c:26:2a:58:32:5f:f6:fb:ee:3e:47:88:d2:17:a4:37:14:7e:5c:90:1b:e5:32:8e:87:4e:d7:77:f0:2e:14:b5:b5:b3:fa:1e:fa:15:ba:75:85:c9:ab:48:3e:bf:ba:a1:b6:f4:1c:15:74:da:0c:fa:1f:d6:7b:cd:49:b8:78:6c:95:93:a1:90:00
    [INFO] AbstractBKUWorker - STAL responses: class at.gv.egiz.stal.InfoboxReadResponse
    [INFO] AbstractBKUWorker - Not finished yet (BKUWorker: at.gv.egiz.bku.online.applet.AppletBKUWorker@1ed7ac), sending responses
    [INFO] AbstractBKUWorker - Received 1 STAL requests: class at.gv.egiz.stal.SignRequest
    [DEBUG] AbstractSMCCSTAL - Got request list containing 1 STAL requests
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.SignRequest
    [INFO] AbstractSMCCSTAL - Processing: class at.gv.egiz.stal.SignRequest
    [INFO] AbstractSMCCSTAL - Retry #0 of 3
    [DEBUG] SmartCardIO - TerminalFactory : TerminalFactory for type PC/SC from provider SunPCSC
    [DEBUG] SmartCardIO - CardTerminals : sun.security.smartcardio.PCSCTerminals@dd89f9
    [INFO] SmartCardIO - Found 1 card terminal(s):
    REINER SCT cyberJack pinpad/e-com USB 52
    [TRACE] SmartCardIO - terminals.list(State.CARD_REMOVAL)
    [TRACE] SmartCardIO - terminals.list(State.CARD_INSERTION)
    [TRACE] SmartCardIO - Trying to connect to card.
    [TRACE] SmartCardIO - terminal &#39;PC/SC terminal REINER SCT cyberJack pinpad/e-com USB 52&#39; card inserted : PC/SC card in REINER SCT cyberJack pinpad/e-com USB 52, protocol T=1, state OK
    [TRACE] AbstractSignatureCard - Setting IFS (information field size) to 254
    [TRACE] SMCCHelper - Found supported card (a-sign premium) in terminal &#39;REINER SCT cyberJack pinpad/e-com USB 52&#39;, ATR = [3b:bf:11:00:81:31:fe:45:45:50:41:00:00:00:00:00:00:00:00:00:00:00:00:f1].
    Exception in thread "Thread-17" javax.xml.parsers.FactoryConfigurationError: Provider IMW0254E <HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY bgcolor="#FFF7E7"><H1>Error 501</H1>IMW0112E The request is not valid or not recognized "INVALID-METHOD"<P><HR></BODY></HTML> not found
    at javax.xml.parsers.SAXParserFactory.newInstance(Unknown Source)
    at javax.xml.bind.helpers.AbstractUnmarshallerImpl.getXMLReader(Unknown Source)
    at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(Unknown Source)
    at javax.xml.bind.helpers.AbstractUnmarshallerImpl.unmarshal(Unknown Source)
    at at.gv.egiz.bku.smccstal.SignRequestHandler.handleRequest(SignRequestHandler.java:76)
    at at.gv.egiz.bku.smccstal.AbstractSMCCSTAL.getRespone(AbstractSMCCSTAL.java:82)
    at at.gv.egiz.bku.smccstal.AbstractSMCCSTAL.handleRequest(AbstractSMCCSTAL.java:136)
    at at.gv.egiz.bku.online.applet.AppletBKUWorker.run(AppletBKUWorker.java:125)
    at java.lang.Thread.run(Unknown Source)