Presentation is loading. Please wait.

Presentation is loading. Please wait.

Our Mission: to secure these applications Against…  Direct observation of the login process  Network snoopers  Tailgating proxy  Keystroke logging.

Similar presentations


Presentation on theme: "Our Mission: to secure these applications Against…  Direct observation of the login process  Network snoopers  Tailgating proxy  Keystroke logging."— Presentation transcript:

1

2

3 Our Mission: to secure these applications

4 Against…  Direct observation of the login process  Network snoopers  Tailgating proxy  Keystroke logging malware  Man-in-the-middle attacks  Frame buffer readers  The Enemy Within

5

6 Caused By…

7 and…

8 The Solution

9 The means The user enters the digits corresponding to a secret Keyword. If the Keyword is ‘Fred’ the user enters ‘1101’. Each login features a different set of random numbers, so the matrix solution is different each time.

10 The Products  1. Forticode Enterprise  2. Forticode Authentication Engine with Diffie- Hellman Public Key Encryption  3. Forticode Bulletproof Authentication Engine with D-H Public Key Exchange and in-memory Database  4. Forticode Machine-to-Machine Authentication Engine with Diffie-Hellman Public Key Encryption * Products 2, 3 and 4 require the client to write an interface, for which Forticode supplies a template. * Product 1 is self-contained, with an Oracle/Informix database, needs no interface, and is installed for trial at www.designsim.com.au

11 Forticode Enterprise  Web-based CGI with dynamic HTML pages  Integrated AES256 Encrypted Oracle, DB2 or Informix Database  Suitable for up to 20 million users, possibly unsuitable for credit card applications, because migration or sync would be needed with client’s DB  70 integrated graphical account administration pages, CSS programmable  Optional XML account administration interface  Composite bitmap matrix display, proof against screen scrapers or key loggers  Optional QR matrix display  Optional selectable image sets for matrix  SHA256 matrix solution submission

12 The Enterprise admin functions

13 Forticode Authentication Engine with Public Key Encryption  Unix TCP/IP daemon with fork-on-connect  Uncrackable Diffie-Hellman public key exchange  New public key with each connection  Extremely fast authentication  Unlimited number of users  Specifically designed for credit card applications  No database for hackers to steal  No graphics. All communication is in XML framework  AES256 private key encrypted credentials  AES256 private key encrypted matrix and matrix solution

14 Forticode Bulletproof Authentication Engine With In-memory Database  Unix TCP/IP daemon with fork-on-connect  Uncrackable Diffie-Hellman public key exchange  New public key with each connection  Fast authentication  Number of users limited to ~5 million, therefore unsuitable for credit card applications  In-memory database only contains uncrackable SHA256 hashes of credentials. The Enemy Within has nothing to steal  No graphics. All communication is in XML framework  AES256 private key encrypted matrix and matrix solution

15 Forticode Machine-to-Machine Authentication Engine  Unix TCP/IP daemon with fork-on-connect  Uncrackable Diffie-Hellman public key exchange  New public key with each connection  Extremely fast authentication  Unlimited number of client machines  No database for hackers to steal  No graphics. All communication is in XML framework  AES256 private key encrypted credentials  AES256 private key encrypted matrix and matrix solution

16 Templates for Interfaces  Forticode Enterprise Not required, unless XML communication is selected  Authentication Engine with Public Key Encryption Implements Diffie-Hellman public key exchange, AES256 encryption, and XML communications  Bulletproof Auth Engine with Public Key Encryption and in-Memory Database Implements Diffie-Hellman public key exchange, AES 256 encryption, SHA256 hash for credentials in database and XML communications.


Download ppt "Our Mission: to secure these applications Against…  Direct observation of the login process  Network snoopers  Tailgating proxy  Keystroke logging."

Similar presentations


Ads by Google