Identity Processor Secures IoT Systems CPU Sensors & Actuators Identity-based Access Unencumbered by Passwords Unassailable Data Transactions Cryptochain Technology Identity Processor (IPU)
Transactions Today: Vulnerabilities Bob Foob Router ٠٠٠ Local Data Password Cracking Man-in-the- Middle Limited SSL Lifetime Replay Attack Counterfeit Site Data Theft Transaction Repudiation Imposter ID Theft Malware No Certificate Unknown Revocation Weak Authority Online Cashier Card Scanner Skimming Misappropriation Point-of-Sale
Root Vulnerabilities Passwords Anonymous parties Protocol weaknesses Physical credentials Databases of sensitive information Gray certification authorities Anonymous systems Primitive root-of-trust
Cryptochain: Point-of-Sale Transaction Bob ٠٠٠ [1] Bob scans items for purchase at Foob Outlet’s Terminal 2 Foob Outlet Server [2] Bob’s smart-phone client scans Terminal 2’s label and sends an encrypted message to Foob Outlet through the cloud Router [3] The Foob Outlet server sends the encrypted message through the Cryptochain for decryption at Bob’s LTD server Foob 95030 PoS Terminal 1 Foob 95030 PoS Terminal 2 Foob 95030 PoS Terminal n
Cryptochain: Point-of-Sale Transaction Bob Foob Outlet LTDa1a LTDx8x ٠٠٠ Federated Apex LTDa2a LTDx7x [6] Foob Outlet server can now decrypt the message and authorize the transaction [4] Bob’s LTD server sends the decrypted message to Foob, absolutely authenticating both parties [5] The Federated Apex audits any federated credentials in the decrypted message for ownership and authorization
Today’s IoT System Password-based Security Connection-based Security Isolation-based Security Today’s IoT System
IoT System with Cryptochain Cryptographic Security Password-based Security Isolation-based Security Gateway IoT System with Cryptochain
IoT System With Cryptochain Root Vulnerabilities Passwords Anonymous parties Protocol weaknesses Physical credentials Databases of sensitive information Gray certification authorities Anonymous systems Primitive root-of-trust Eliminated Bypassed Obsolete
Jonetix Identity Processor (IPU) Transient Identity Generator (TIG) Pseudo-Random Number (PRNG) Attestation Value Key Seeds Secure Zone Embedded in an AMD microprocessor (adds <1% to chip area) Key Derivation Function (KDF) Cryptographic Services Module (CSM) Control Unit (CU) Command Bus Addr/Data Bus
Identity Processor Features Chip-unique identity Chip-unique, high-entropy random numbers Cryptographic services Autonomous key management Hardware feature options enablement Secure backup in insecure storage Secure data sharing and backup for individual across devices Chip-unique identity Public, private, and secret identity keys Chip-level root-of-trust Cloning eliminated Chip-unique, high-entropy random numbers Cryptographic services Session key generation Encryption Decryption Attestation Hash functions Autonomous key management Eliminates external key initialization services and key management services Secure backup in insecure storage Secure data sharing and backup for individual across devices
IoT System with IPU Gateway Cryptographic Security IPU Gateway
IoT System With Cryptochain & IPU Root Vulnerabilities Passwords Anonymous parties Protocol weaknesses Physical credentials Databases of sensitive information Gray certification authorities Anonymous systems Primitive root-of-trust Eliminated Bypassed Obsolete Chip-level
Jonetix Company Status Eleven provisional patent applications filed Two full patent applications filed One patent issued Working prototype hardware and software Server and client app transaction modules Encryption, decryption, and authentication modules Principal invitation and registration to trust domains Web one-click sign-on and one-click transactions RTL for Identity Processor components Several working demos Cryptochain: video surveillance, climate control, garage door control Identity Processor: TIG, PRNG, KDF, and CSM in FPGA development boards