InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.

Slides:



Advertisements
Similar presentations
Mobile phone based real time solution to track completed / in progress work The programme officer initiates the work by capturing the site image, GPS.
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Excalibur Communications Paul Crow Corporate Sales Manager.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Secure Communication Architectures.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
© GPRShelp 2004 An Introduction To GPRS. © GPRShelp 2004 Contents What is GPRS? GPRS Applications GPRS Myths GPRS Services – the killer application.
E-business Infrastructure
Technical Brief v1.0. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats Easy.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
A Guide to major network components
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
What is Influx InfoTech ?. About Influx InfoTech IT products & services company Delivering technology driven business solutions Hi-end infrastructure,
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Real Security InterSwyft Technical information's.
1 «INTERNET-BANKING FOR CORPORATE CLIENTS» SYSTEM HALYK BANK OF KAZAKHSTAN Best Bank in Kazakhstan 2010, Global Finance, March, 2010 Best Bank in Kazakhstan,
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
LU Chenglong ( ) DIAO Wenrui ( )
M2M Cloud-based Platform M2M Market The total M2M connections will grow from 62 million in 2010 to 2.1 billion in 2020, with an annual rate of 36%. M2M.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Tools and enablers for building applications for EADS TETRA
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
ACM 511 Introduction to Computer Networks. Computer Networks.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Bus Detection Device For The Passenger Using GPS And Gsm Application Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
GPS & GSM BASED CAR SECURITY SYSTEM. Student’s Name with USN No.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Vending machine monitoring system Industry&Business &Government IT transformation.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
PYRESCOM - Mas des Tilleuls Canohès -FRANCE Tél. : +33 (0)4. 68
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
 Problematic: Transfer of messages from one server to another. A user is never in direct contact with this server must use an client which.
Electronic Banking & Security Electronic Banking & Security.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Best SMS Gateway Software Provider Company in India By Aruhat Technologies.
1 Example security systems n Kerberos n Secure shell.
Raj Bank Universal Core Banking System FCBS FINCBS INC Banking Systems & Consulting
Sofortüberweisung: An Introduction
BY GAWARE S.R. DEPT.OF COMP.SCI
Secure Electronic Transactions (SET)
Designing IIS Security (IIS – Internet Information Service)
Sending data to EUROSTAT using STATEL and STADIUM web client
Presentation transcript:

InterSwyft Technology presentation

Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such as automobiles, payment terminals, collection devices, automated machines, or access solutions with integrated GSM module. The technology allows implementation of secured payment transactions, authorizations and exchange of sensitive information such as private certificates, passwords, credit card numbers, etc.

Mission 1. Providing a secured information exchange using the SMS messages and allowing for easy integration into the customer products and services - InterSwyft supplies the technology, and the implementation itself is carried out by the customer.. 2. Providing a complete solution of secured information exchange using SMS messages along with the service or product for the customer - the customer's solution delivered on a turnkey.

Customer’s Benefits Secured transmission of the SMS messages bypasses the Internet, and eliminates the possibility of all Internet attacks. Technology is also available at the Internet outage, or its unavailability on the given location. Technology is also available at ultra-small devices for the external environment, where implementation of the Internet is technically impossible. Security of transmitted information reaches higher level as at payment terminals, what makes the technology suitable for the payment transactions and transfer of sensitive information. The technology is compatible with any GSM network of mobile operator, including the roaming. Support for the ARM devices with an operating temperature from -40 to +80 degrees allows use in extremely difficult conditions. It enables transmission and processing of sensitive information such as credit cards. The customer gets the opportunity to charge his clients for the use of services and devices. Possibility to create a mechanism for charging of credits of remote services and devices. Easy integration with the GPS navigation module enables extension of products and services by monitoring functionality..

Components The solution consists of two main parts 1. Client part integrated in devices is responsible for sending and receiving SMS messages, collection of information with subsequent evaluation and communication with parts of equipment or functionality of the operated service. 2. Server side has the task to receive and send SMS messages, to communicate with the central database, to carry out communication activities such as sending s, generating statistics, eventually display information on the map. Full functionality of the client and the server part is defined by the customer‘s needs and requirements.

Compatibility The technology is compatible with each GSM network supported by SMS It is not necessary to modify the mobile operator’s equipment in any form, or to modify properties of the GSM network messages Any GSM device - mobile phone, SMS gateway, car, proprietary device or mobile operator’s transmitter can be a receiver and transmitter of the InterSwyft SMS. There is assured full support for roaming Support for transmission of binary messages - pictures, sound, spectral specimens, thus opening more opportunities for innovative services

InterSwyft’s portfolio 2010

SMSDoor It assures access to the systems, information, facilities or services on the basis of a secured authentication using SMS GSM network. Encrypted credit card number or an identification key that makes it possible to automatically charge the access can be a part of the transmitted data. The program can utilise customer’s existing system and payment infrastructure. Examples of use: Payments for the waste collection in robotic collection devices, remote actuation of the device or process, automation of payments for services in the exterior on the base of mobile number, allowing access on the base of the phone number, etc.

SMSDoor scheme 1

SMSDoor scheme 2

SafeStream Transfers Technology ensuring bi-directional - duplex transmission of information between two GSM points via SMS messages with 100% authentication of data sender. On the figure there is illustrated communication of two types of clients (workstation with a GSM gateway and payment terminal with integrated GSM module) with a central server.

EsCAPE (Secure Key Exchange Platform) The platform ensuring fast exchange of passwords, keys, certificates and other identification data in a secure non-Internet environment with a GSM gateway, respectively mobile device (mobile PC, Symbian, etc.)

Security Communications Transmission of duplex communication between two or more devices with security proprietary protocol designed for real- time communication involved in connection Client - Client or Client - Server. Platform designed for secured communications of military and police in the range of 2,000,000 participants.

SMS Payment System Payment operations with fully secured bank transfers with the possibility to support of transaction ROLLBACK execution at any stage of the process.

SMS Secure Order Technology ensuring the mobile ordering system with guaranteed customer identification and order according to the IMEI or the phone number.

InterSwyft VOIPCredit The technology for support of services requiring the credit billing in the operator’s VOIP network. The possibility of using for commercial ordering and proprietary service in the operator’s VOIP telephony.

Support InterSwyft Ltd. assures complete design, development, implementation, testing, training and documentation for each solution There are available several forms of support from the basic up to guaranteed 24 hour’s support with the direct intervention at the customer