1 / 21

Some names to Remember !

Some names to Remember !. Herbert Street Technologies Ltd www.Quiknets.com www.GroupFactor.com www.Telecryption.com. Our Objective. Secure Social networking = Networking for professionals/ corporates = Achieving the Internet’s potential, while avoiding loss of data.

rupert
Download Presentation

Some names to Remember !

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Some names to Remember ! • Herbert Street Technologies Ltd • www.Quiknets.com • www.GroupFactor.com • www.Telecryption.com

  2. Our Objective • Secure Social networking • = • Networking for professionals/ corporates • = • Achieving the Internet’s potential, while avoiding loss of data.

  3. Position determines Encryption

  4. Local client - encryption engine - password DB (KeyBox) file transfer engine Some offline management also Browser (IE) manage from Internet set exchange psws backup KeyBox Drag/drop files, folders Components of Telecryption

  5. Each user has a Master Password • It encrypts his KeyBox • The only password he must ever remember • His Admin. might know it (OV version) • Other passwords can be very complex

  6. Enter Master, once per computing session

  7. www.Telecryption.com

  8. www.Telecryption.com

  9. Setting passwords with Correspondents • Options • (Meet on the bus, etc) • (Trusted Third Party exchange) • Online Exchange procedure

  10. Online Exchange Procedure (OXP) • Bob and Alice- online concurrently • Bob clicks, invites Alice to Start OXP • Alice clicks, invites Bob to Start OXP • Exchange password is created and entered into local KeyBoxes • Optional test to check if attacker was present

  11. OXP, background • Shamir- Omura “Three Pass” protocol - modified - special procedure (partial psws) - special test of new key against MITM (MITM attack almost impossible.)

  12. Applications • Member-based networks…intranets/ extranets • Social Networks, MySpace • Web Mail (Yahoo, gMail !) • E-mail (Outlook) • Secure RSS • (Web 2.0) • Visit : www.Telecryption.com

More Related