Securing the World’s Information Andre Brisson – Stephen Boren Whitenoise Laboratories Inc. Dynamic Identity Verification & Authorization.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Securing the Worlds Information Secure Dynamic Credit and Debit Cards Stop Credit Card and Identity Theft Andre Brisson Stephen Boren Co founders/ Co.
Secure File Interchange (SFI) A Managed Security Solution Whitenoise Laboratories Inc. November 24, 2006 For use in your enterprise A service offering.
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
No - No - No - Nokia Whitenoise Laboratories Canada Inc. André Brisson - Founder July 2, 2014 Total Telco Security for Cloud Colossal Data - Secure data.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Confidentiality and Privacy Controls
Lecture 23 Internet Authentication Applications
Secure File Interchange 2 Whitenoise Laboratories Inc. Quick User Guide.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Whitenoise Data Encryption & Identity Management.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
File Transfer and Use of Clear Text Passwords Update NERSC Users Group Meeting Stephen Lau NERSC June 21, 2015.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Securing the World’s Information Encryption: Prevents any non-authorized party from reading or changing data. BCTIA Technology Award 2005.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Chapter 10: Authentication Guide to Computer Network Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 5 – Configure Site-to-Site VPNs Using Digital Certificates.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 3: Authentication, Authorization, and Accounting
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
IEEE CyberTrust workshop
Confidentiality and Privacy Controls
CLIENT/SERVER COMPUTING ENVIRONMENT
Chinese wall model in the internet Environment
Presentation transcript:

Securing the World’s Information Andre Brisson – Stephen Boren Whitenoise Laboratories Inc. Dynamic Identity Verification & Authorization (DIVA)™ Identity Theft prevention, detection and immediate revocation for PKI and DDKI security contexts

What is DIVA™?  The patent pending Whitenoise algorithm employs mathematical identity keys of extreme length.  Use of offset enables controlled movement throughout key

Whitenoise Encryption Key Offset etc etc. Last Session Ended Here (‘X’) +’n’ DIVA is instructed to begin her song at X + n DIVA remembers end point of session

What is DIVA™?  Unique keys assigned to individuals or network points  Provide very strong identifier  Possession of the key + strong password structure to activate it establishes user identity  DIVA™ uses these attributes to: –initially ensure that the individual accessing the network is who they say they are (references last point in key reached during last session) –verify their identity throughout the session –ensure that a duplicate key (intruder) is not in existence –defend the network if intruder detected (deny access to both)

How does DIVA™ work? Super-length Whitenoise Key = Lyrics of a user-specific song Only SFI Server & User key know lyrics of each user’s unique song Access = Sing next ‘n’ lyrics of song from unique start point given by server for each session (last point + ‘x’- encrypted) Additional operations = Sing next ‘n’ lyrics of song from last point 2 nd DIVA appears Reported Loss or theft of key = instant denial of access Operations of 2 DIVA = Loss of Sync for one, denial of access to both SFI

Whitenoise Laboratories Inc.  Vancouver Based  IP –Whitenoise Encryption & Identity Algorithm US/International Patents Pending IPEA advisory all 23 claims allowed (May 2005)  Fully compliant Cdn Federal Gov’t regulations