Presentation is loading. Please wait.

Presentation is loading. Please wait.

MicroToken Exchange Data Security Solutions

Similar presentations


Presentation on theme: "MicroToken Exchange Data Security Solutions"— Presentation transcript:

1 MicroToken Exchange Data Security Solutions
Use Case Solution: GVSC Securing Real Time Commands and Video

2 The Customer: The GVSC The United States Army CCDC Ground Vehicle Systems Center (GVSC), located in Warren, Michigan, is the United States Armed Forces' research and development facility for advanced technology in ground systems. It is part of the U.S. Army Combat Capabilities Development Command (CCDC), a major subordinate command of the U.S. Army Futures Command.

3 The Challenges and Requirements The MTE and GVSC Implementation
The Use Case Process Flow The Challenges and Requirements The MTE Solution The MTE and GVSC Implementation

4 Leader Follower Vehicles Military Ground Vehicles
The Challenges Common Software Aerial Vehicles Leader Follower Vehicles Autonomous Vehicles Military Ground Vehicles A variety of military vehicles use the same software and electronic architectures as commercial vehicles. They are potentially vulnerable to hacking. To help it defend its fleets, the GVSC and all military sectors scout for an intrusion defense system that can protect against cyber-attacks on military vehicles. Adversaries probe and exploit systems used by government, law enforcement, military, intelligence and critical infrastructure in the United States and abroad.

5 Secure Live Video Transmission
The Requirements Secure Live Video Transmission Thwart Replay Attacks Secure Command and Control

6 The Solution: Eclypses MicroToken Exchange (MTE)
MTE secures Data at Rest or, in this case, Data in Transit. MTE handles all the “Key Management” so that you do not have to. MTE prohibits unauthorized access. MTE thwarts “replay-attacks MicroToken Exchange MTE PCI DSS Certified MicroToken Exchange MTE

7 The MTE Implementation – Phase I
Eclypses provided technical collaboration to determine the best scheme for deployment. The Eclypses team embedded MTE “methods” within the GVR-Bot application. This required inserting our MTE “code”, Into the “source code” of the robotic operating system. The same process was followed for the “controller”. Implementation

8 The MTE Implementation – Phase II
Eclypses tested for vulnerabilities around the installation. The GVR-Bot was then tested by GVSC along with an independent third party. Enhancements and adjustments were made to fortify the overall architecture of the solution provided. The GVR-Bot was then re-tested by the same independent third party and the results were extraordinary. The Eclypses team met with the GVSC Penetration Test team to collaborate regarding additional enhancements that the GVSC team wanted to see. Eclypses implemented those changes and completed the POC. Implementation

9 Risk Management with variable parameters
RESULT: The GVR Bot SECURED with MTE! Output Window Risk Management with variable parameters MicroToken Packets replaced “real commands” and were transmitted, received and interpreted by the intended endpoint Live video streams were secured a single frame at a time, secured by MTE. Security Protection Is Our Highest Priority

10 Technical live demonstration is scheduled for October 2019
The GVSC Implementation Technical live demonstration is scheduled for October 2019 Top Brass as well as many other interested parties will be in attendance Additional POC’s are expected after the extraordinary success that was demonstrated

11 Illustration of GVR Bot Remote commands
Sending Device Receiving Device Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Paired Devices

12 Illustration of GVR Bot Remote commands with MTE
Sending Device Receiving Device Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct MicroToken within a MicroToken Packet transmitted to the Receiving endpoint (6I<'nsh`9^M~>}/_) (^2L?OOU}xK'kT}Y#tO?<H9yK>kbP~h!Bzrl)3KXyQ6KNoG]EY76I<'nsh`9^M~>}/_?O3$V<^Ypa5-L-LW|LT4+4Mx3TM

13 Transmitted Packet Received
Illustration of GVR Bot Remote commands with MTE Sending Device Receiving Device Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct (6I<'nsh`9^M~>}/_) Transmitted Packet Received Command Interpreted (^2L?OOU}xK'kT}Y#tO?<H9yK>kbP~h!Bzrl)3KXyQ6KNoG]EY76I<'nsh`9^M~>}/_?O3$V<^Ypa5-L-LW|LT4+4Mx3TM

14 Validation of Eclypses’
Third Party Penetration Tested Validation of Eclypses’ MicroToken Exchange “With the method of key generation, even if the attacker intercepts the initial key/pin, they would need to brute force their way to the discovery of the algorithm, with that being said, it would take nation state actors to even attempt to break the encryption process without having access to the source code In other words, very improbable.” – H2L Solutions (Military Penetration Testing Facility)

15 Contact Us Securing Data via MicroToken Exchange
For more information contact: (USA) Contact Us Ensuring that sensitive data remains unavailable to exploitation in the event of an internal or external network defense breach


Download ppt "MicroToken Exchange Data Security Solutions"

Similar presentations


Ads by Google