Secure Communications Secured by TrustChip® Encryption Engine

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
Mobile Devices in the DoD
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Everyone is going Wireless - VoIP is no exception Sanjit Chatterjee Director – Global Marketing
Network Systems Sales LLC
McAfee One Time Password
Mobile Technology and Software Engineering Travis James, CTO, CloudMetal Software.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Amdocs Unified Communications solution.
XProtect® Expert 2013 Product presentation
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
KoolSpan Comparison to CellCrypt
Dongyan Wang GlobalPlatform Technical Program Manager
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
General Presentation August Based out of the Netherlands 8 years of development Launched in May Sales offices in Los Angeles, Amsterdam, Hong.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
Real Security InterSwyft Technical information's.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Wireless and Security CSCI 5857: Encoding and Encryption.
PKI interoperability and policy in the wireless world.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
CHIEF EXECUTIVE OFFICER KoolSpan, The Trust Company.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
·
Name Company A Day in the Life… A Demonstration of Application Delivery.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Android Security Auditing Slides and projects at samsclass.info.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Wireless and Mobile Security
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
IPS Infrastructure Technological Overview of Work Done.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Nextiva UCaaS. 2 Nextiva Proprietary and Confidential, do not copy, duplicate or distribute. Nextiva.com Transition to Emerging Technologies Today Many.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
1 1 Social Security Platform James Wu We Simplify Security.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1 © 2016 Samsung Electronics America - Confidential Introducing MagicInfo Lite I 4.0.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
CLOUDENTIFY.
UNIFED COMMUNICATIONS MANAGEMENT
Introducing MagicInfo Lite I 4.1
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Secrets Between Just You and Me
Public Key Infrastructure from the Most Trusted Name in e-Security
Enabling the hybrid cloud with remote access appliances
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Presentation transcript:

Secure Communications Secured by TrustChip® Encryption Engine KoolSpan – Samsung S-1 Corp. (SafeTalk)

KoolSpan – SafeTalk Como estan protegiendo sus comunicaciones mas sensibles? Viajes al exterior (Monitoreo por parte de Gobiernos de cada pais) Movimiento Ejecutivo/Proteccion Despliegue de personal / Activos Postura de Seguridad Física Proteccion de data confidencial Cumplimientos Regulatorios Cumplimiento (HIPAA, SOX, FISMA, GLBA, Dodd-Frank Act) Politicas de Comunica Internas Informacion Clasificada

Many Attack Vectors Operator A Operator B Access at Network Facility Tower Spoofing Illegal Monitoring Unwanted Surveillance by a Foreign Government Hacker Exploit of Lawful Call Monitoring Taps 3rd Party Application Exploits

Suite de Productos WiFi TrustCall – Secure Voice TrustText – Secure SMS Trusted Platform WiFi Trust Satellite xI843tT 2Wz 8+/p #@RBvc Trusted Apps – Chat, Video (TDK) etc. Secure Data (TrustBox)

S-1 trabaja con Koolspan para proveer cifrado extremo a extremo de Voz, Texto y Data Encriptado movil de voz, texto y transferencia de data (archivos) de extremo a extremo utilizando smartphones via GSM y Wi-Fi para BlackBerry, Android y iPhone TrustChip® siendo la columna vertebral a traves de proteccion de hardware micro-SD Voz Segura, Texto y data a estandares FIPS 140-2 Trabaja con 2G, 3G, 4G and LTE Funciona entre diferentes Carriers (GSM or CDMA) Alcance Global: En mas de 150 paises TrustSuite = TrustCall, TrustText, TrustBox (data) Llamada se convierte en VOIP (data) = Ahorros Significantes ***

TrustCall Ecosystem TrustCall PC

KoolSpan Background - Oficinas Corporativas en Area de Washington, DC - Fundada in 2003 16 Patentes, 32 Pendientes NIST / FIPS 140-2 Solution Set Clientes de Gobierno y Comercial Clientes en mas de 60 Countries Soluciones Robustas y con varios Premios de Industria Mencionado en libros de espionaje y accion

Data Storage NAND Flash Componentes TrustChip® Hardened, self- contained security No puede ser reprogramado Todo en uno - autenticacion, adminsisttracion de claves y encriptado Soporte Multi- applicativo Puede ser Administrado Remotamente Compatibilidad amplia, microSD (USB con adaptador) Claves invulnerables al “rooting” del telefono Data Storage NAND Flash CPU Memory SD Interface Crypto Engine KoolSpan Firmware Hardened 32-bit Processor Secure Key Storage microSD “Mobile Encryption Engine”

Management Notification & Communications TrustCall Call Set Up Call Notification Management Notification & Communications Call Communications Call Set Up Device Discovery Carrier Network or WiFi Initiation 9 9

Core TrustChip functions: Remote Key Management/Enterprise Management: TrustCenter™ Enterprise or MSS Server Encrypted, Remote, OTA Management Manages keys, users and application config Each transaction uniquely encrypted/sequenced to specific TrustChip – Replay Attack protection All transactions have complete feedback loop MSS = Managed Security Services – typically provided by MSSP – MSS Provider Administrator portal access Automates adds, moves and changes Visibility into security status at endpoint Centralized control, distributed trust WinServer 2003 Core TrustChip functions: Add TrustGroup Installs new TrustGroup into a TrustChip Remove TrustGroup Deletes TrustGroup from a TrustChip Password Reset a user’s TrustChip password/PIN Stun Temporarily disable a TrustChip Destroy Keymatter “zeroized”, TrustChip inoperable

Caracteristicas de Administracion de Seguridad : TrustChip™ Two Factor Authentication Algo que tiene: El TrustChip Algo que sabe: PIN/Password hasta 120 Caracteres TrustChip puede ser bloqueado TrustChip <-> SIM TrustChip <-> Dispositivo TrustChip puede ser Inactivado/Destruido Remotamente

Remote Key Management/Enterprise Management: TrustGroups® Fireteam 2 TrustGroups® enable Communities of Interest (COI) to communicate securely KoolSpan All Proposal Team Senior Staff Sales Project X IT DoD-FBI FBI-NYPD TrustGroups® are… Collections of 1,024 256-bit Symmetric Keys Shared by all TrustGroup members Used for authentication Securely loaded OTA by TrustCenter Never exposed outside TrustChip during use Each TrustChip can support 45 TrustGroups There is no implied trust between groups Encrypted Key Storage

Use of Multiple TrustGroups® for Secure Voice Universal TrustGroup Operations Executive Alice Sr. VP Universal TrustGroup Information Systems Executive Dave VP Bob Director Operations Universal TrustGroup Carlos Partner Universal TrustGroup When Alice talks with Bob, the Universal TrustGroup is used, as it is the only TrustGroup they have in common. When Alice talks with Carlos, the Euro Bank TrustGroup is used, as it is a higher priority group. When Alice talks with another Euro Bank Executive, that TG will be used.

TrustCall Secure Voice IP-based (Carrier Networks, Wi-Fi, SATCOM (IP) Carrier-Grade: Official Secure Voice for AT&T (Encrypted Mobile Voice) Cross-Carrier: GSM (AT&T, T-Mobile, INTNL), CDMA (VZW, Sprint) Cross-Platform: Blackberry, Android (Various), iPhone (Q3/4) Hardware-Anchor: Defendable TrustChip Engine Low Profile: Standard Devices, Simple App, Discreet Chip Easy Management: Remote OTA (TrustCenter) Scalable/Flexible/COI Focus: (TrustGroups) Rapid Deployment: Relay Server SBU-Grade: AES-256 Encryption (FIPS 140-2) Peer-to-Peer: Seamless Encryption

TrustCall Secure Voice Low bandwidth consumption Approximately 16Kbps, full duplex 100 minutes of calling uses about 23.4MB of data Designed to support GSM Edge network bandwidth capabilities Low power consumption Only connects to relay server during calls Proprietary VoIP Gateway/relay server Very low overhead SMS/KNS used for call setup/peer call request Relay server provides rendezvous for users, but is not involved in peer to peer authentication/encryption Formerly known as One Vault Voice or OVV Discuss “encrytped” vs “Encrypted”

Enable Secure Mobile to Desktop conversations PBX Integration TrustBridge Enable Secure Mobile to Desktop conversations PBX Integration Cellular Operator Network/Internet Secure Voice <<UDP>> PBX Internal Enterprise Network SIP/RTP Secure VoIP Bridge Call Set up Notification Service

TrustChip Encrypted File Transfer Universal TrustGroup Mobile TrustGroup TrustGroups are granted and revoked

TrustChip Roadmap Where We’re at…Where We’re Going iPhone 4/4s and 5/5s: Jan 2013 - Launched Protective sleeve with an SD Card slot TrustBridge: Mar 2013 - Launched Enable secure Mobile to Enterprise conversations TrustText for iPhone: Q1 2014 – End of February Compatible with Blackberry and Android TrustBox: Q1 2014 – Beta now, End of February Launch Sending of encrypted attachments (file transfer and DAR) TrustCall PC: End of Q1 2014 Laptops, tablets, PC and desktop phone PKI Integration (Soft Certificates/HSPD-12): Q1 2014 TrustChip App Validation/Root of Trust: Q1/2 2014

TrustChip PKI Evolution Eliminate Smart Card Readers: PKI functionality organic to the TrustChip Low Profile: No sleds, sleeves or smart cards exposed from the device Hybrid Key Usage: PKI for authentication, TrustGroups for encryption Standards Based PKI: Hardware protected derived credentials Certificate Security: Certificates invulnerable to jailbreaking or phone rooting Remote Management: Add or remove PKI certificates via the TrustCenter Compatibility: Ability to perform PKCS#11 and PKCS#7 operations TrustAPI: Exposes PKCS#7, PKCS#12 and PKCS#15 drivers PKI Middleware: Open SSL standards-based crypto, standard crypto libraries Next Step: TrustChip w/Smartcard integrated circuit – Local loading of certs

Root of Trust – Application Security Hardware Anchor for Mobile Applications App Challenge and Response: Mutual authentication between TrustChip and apps to verify and validate that the TrustChip is present and is the correct device, and that individual apps are intact and have not been modified or tampered. Application Code Signing: TrustChip will serve as an anchor and secure repository for code/application signatures, allowing for the applications to self-validate or for management applications to invoke validation via application signature. Trusted Application Installation: Application installation system in which application packages are encrypted and wrapped with a special installation package that will only allow the application to be installed if the device has a TrustChip with the appropriate TrustGroup.

“Crypto-Enabling” Apps TrustAPI - TrustChip® Developer Kit (TDK) Simple set of API's and samples that allow for rapid TrustChip application development Integrated with application as “application layer device driver” Bilateral Protocol – Encrypted live sessions for two TrustChips Unilateral Protocol – Encrypted data streaming (such as multicast) or file storage Binaries licensed for redistribution Provides FIPS crypto for: Android J2SE+Native BlackBerry OS Win32/J2SE+Native Linux MAC OS Windows Mobile/Phone

TrustChip PKI Evolution - Roadmap Today – FIPS 140-2 Level 1 Suite B Algorithms added to TrustAPI TrustChip PKI Support using soft certificates deployed OTA from TrustCenter Suite B Suite B FIPS 140-2 Level 3 of current TrustChip Next Generation TrustChip with integrated smartcard Suite B “Derived credential” – NIST FIPS 800-157 Suite B Suite B FIPS+EAL TrustChip 2013-Q2 2013-Q3 Q4 2014-Q1 Q2 Q3 Q4

TrustChip Dispositivos Samsung Aprobados Galaxy S2 (I9100) Galaxy S2 (I777) Note (N7000) Galaxy S3 (I747) Galaxy S3 (I9300) Galaxy S4 Y demas dispositivos Samsung con MicroSD slot

Android Secure Voice Select Contact Choose “Secure” Or “Normal” Call Connected! Incoming Call Authenticating

Android TrustText – Secure SMS Launch TrustText App Reply Received Choose Contact Type Message Message Sent