In this paper we will describe how the primitive operations provided by ECC solve real world problems in protocol and system design. We’ll talk about the use of elliptic curve-based digital signature schemes in check verification systems and in digital postage marks used in postal system. We’ll describe the use of elliptic curve-based key exchange systems in secure web servers and in small embedded control and monitoring devices. Finally, this paper will discuss how certain applications, being planned for the near and distant future, would not be possible without the proper cryptographic implementation.