1 1 Social Security Platform James Wu www.jrsys.com.tw We Simplify Security.

Slides:



Advertisements
Similar presentations
1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011.
Advertisements

Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Pengenalan kepada Prasarana Kekunci Awam (PKI) dan Konsep Mobile PKI
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
eToken PKI Client Overview
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Multi-PC, Networked, Broadband Households US: 19.2 M, Globally: 40+ M and growing Source: Microsoft Primary Research CountryHouseholds (millions) Broadband.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Chapter 11 Basic Windows and Windows Commands. Overview of what an Operating System does To identify and use common desktop and home screen icons To manipulate.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Norman Online Backup All your files Always available.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Certificate and Key Storage Tokens and Software
SIM318. Protect Sensitive Information Reduce risk associated with information leaks Improve regulatory compliance Centrally manage information protection.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Page Copyright Giritech A/S an – Excitor company.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Cross Platform Mobile Backend with Mobile Services James
Your storage on the ground; Your files in the cloud.
Week #7 Objectives: Secure Windows 7 Desktop
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
Copyright ONE-O-ONE iSOLUTIONS Inc Smart Card Technology for the Macintosh Chris Goeltner January 30, 2001.
Introduction to Windows7
DAS/BEST ITSecurity Division. RSA SecurID Software Tokens: Make strong authentication a convenient part of doing business. Deploy RSA software tokens.
Chapter 5 Organizing Files and Folders. 2Practical PC 5 th Edition Chapter 5 Getting Started In this Chapter, you will learn: − How to get a list of your.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Store your files in the sky Intro to Cloud file storage.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Windows 8 A touch screen computer on a desktop. Windows Metro.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
1 1 Patented QR code solutions James Wu We Simplify Security.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
1 1 Patented QR code solutions James Wu We Simplify Security.
PQI Confidential & Property Date: June 2015 PQI Confidential & Property 1.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Introduction The State of Security Laptops Flash Drives Data Storage Smart Cards Internet Login Wifi and Internet.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Sharing and Synching files
Jenny Pange University of Ioannina
Product Manager, Keon PKI
New Technology Group Meeting
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
Meganet Corporation VME Mail 2004
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Windows 8 Microsoft Windows is the dominant operating system on personal computers around the world. The operating system is the most important software.
Sales Presenter Store ‘n’ Go Lightning / USB 3.0 Drive
Backup your Data © EIT, Author Gay Robertson, 2017.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Secrets Between Just You and Me
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Public Key Infrastructure from the Most Trusted Name in e-Security
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Install AD Certificate Services
Digital Literacy 1.00 Computer Basics
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

1 1 Social Security Platform James Wu We Simplify Security

2 2 Social Security Service Platform Grand launch ! 31Platform Authentication & Encryption

3 3 1 Digital Card Digital Social Security Card

4 4 1 Safe Key World’s first Apple Mfi certified iOS/PC secure 8 GB memory token. Built in the most secure FIPS Level 3 and CC EAL 5+ certified crypto chip. Provides Digital Signatures/Encrypt/ Decrypt applications for iOS and Windows.

5 5 System Requirements Operating System: Microsoft Windows XP Microsoft Windows Vista Microsoft Window 7 Microsoft Windows 8 Microsoft Windows 10 Mac OSX 10.x Hardware Connector: iOS lightning connector and iOS USB Type A

6 6 Features External secure memory expansion for iPhone/iPad/iPod touch. Hardware accessory with built-in secure element. (certified with FIPS Level3 &Common Criteria EAL 5+) Hardware RSA 1024/2048 bits and AES 256 bits for digital signature and encryption / decryption. Hardware encryption key access control by PIN code verification. PKI (Pubic Key Infrastructure) mechanism, X. 509 Certificate features supported. Can be integrate with Microsoft Active Directory & CA/RA Provide Desktop/iOS/Android SDK for developers

7 7 Secure Cloud Storage iOS, PC and Android Secures all your storage Secure File Sharing

8 8 App Settings TOTOSAF ONE SAFE KEY CLOUD DRIVES Social Security CARDS – My Card – Exchange Social Security Cards (certificate ) CONTACTS – Contacts authorization, management BACKUP – App backup, restore HELP ABOUT APP INFO App Functions Basic Operations Select Storage, Create Folder, Add File File Operations Open, Copy, Move, Delete, Encrypt, Mail, Share Link (DropBox)

9 9 HOW TO USED Settings Battery Level Current Path Add file from “Photo Library” of iOS device. Create folder in current directory Protected file Back to parent folder Folder type icon File type icon Quick Functions

10 Encrypt Open, Copy, Move, Delete, Encrypt, Mail, Share Link Press and hold one the file to trigger the file function menu coming out.

11 Decrypt

12 1Platform 12 Cloud Authentication Servers

13 1Platform Internet of Things

14 Crypto As A Service

15 Applications need Security Unfortunately … The reality is APP is hard to be security-enabled !!! APP may takes 3-6 months to be security-enabled Languages Environments Devices

16 Cross Platform APP Security-enabled in 3 Days Not 3 Months

17 Security-Enabled SDK Eliminate Huge Hidden Cost  Quickly Security-enabled in one week  Support Multiple CAs' Certificates  Support Java,.Net, ASP, JSP, PHP, Delphi, Power Builder, …

18 Protect PC jrsys PC Security Suite PC Tokens Software Applications Web Authentication with SE 2014 ITM Best product Winner Award Software PFXSmart CardUSB Token 1SafeKey

19 Protect Mobile Mobile Tokens Mobile Applications Mobile Authentication with SE jrsys Mobile Security Suite Software PFX HCE Secure MicroSD Smart Cards Bluetooth reader 2014 ITM Best product Winner Award 1SafeKey

ASIA PKI Innovation Award 2012 Mobile Money Innovation Award APICTA Award 2013 Security Winner One of the 7 innovative ideas to provide greater access to financial services from 98 best ideas of 26 countries BY: MIF, IDB, CAF and GSMA 2014 and 2015 Taiwan ITM Best 100 products Winner Award Worldwide Awards

21 Global Partner WebTrust ® CA Secure MicroSD iOS/PC /Android Token Bluetooth Reader Jrsys Secure Mobile/PC Tokens Software PFX HCE Smart Cards USB PC/SC reader USB PKI Token

22 Global Partner 415 Millions PDF users use jrsys Security Suite

23 jrsys Secure your Mobile Life !