Secrets Between Just You and Me

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
KoolSpan Comparison to CellCrypt
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Information Security for Managers (Master MIS)
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Secure MCU REA FAE Training – June A Rev
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
CHIEF EXECUTIVE OFFICER KoolSpan, The Trust Company.
George L. Heron Technology Officer, SafeNet, Inc..
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
BY ANTHONY HARRIS. What is Skype Link below is video Communication software Enables live conversation video chat Live conversation via webcam IM communication.
Innovation is Our Passion Online Banking Past, Present and Future.
1 1 Social Security Platform James Wu We Simplify Security.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Web Site: Secure GSM Ltd. Manager: Dipl. Eng. Ventsislav Dyakov Phone:
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Computer and Network Security
iTWIN The Limitless - Pen drive
2 Factor & Multi Factor Authentication
Key management issues in PGP
Web Applications Security Cryptography 1
DATA SECURITY FOR MEDICAL RESEARCH
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Trusted Computing and the Trusted Platform Module
Instructor Materials Chapter 5 Providing Network Services
Virtual Private Networks
Tim Carter Sales Director Sybase Confidential Propriety.
Hardware Cryptographic Coprocessor
Presented by, K.K.Radhika.
Security Pretty Good Privacy (PGP)
Chapter 8 Network Security.
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
BINF 711 Amr El Mougy Sherif Ismail
BY GAWARE S.R. DEPT.OF COMP.SCI
Tim Carter Sales Director Sybase Confidential Propriety.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Services Provided by Network Operating Systems
Content Management lifecycle
Tablet and eBook Orientation
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Progress leisure OCR GCSE ICT.
22/10/17.
Chapter 8 Network Security.
Tablet and eBook Orientation
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Data Communication and Networks
Public Key Infrastructure from the Most Trusted Name in e-Security
Data Communication and Networks
RKL Remote key loading.
Lecture 4 - Cryptography
Introduction to Networks
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Data Communication and Networks
Data Communication and Networks
Public-Key, Digital Signatures, Management, Security
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
Data Communication and Networks
Unit 8 Network Security.
Advanced Computer Networks
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Secrets Between Just You and Me 1

The Constitution tells us we have the right to protect our privacy. Do You Want to Protect Your Privacy from Trojans? Do You Want to Stop Your Important Conversations from being Illegally Tapped? Do You Want to Keep Your Business Quotations Secure from Your Competitors? The Constitution tells us we have the right to protect our privacy. 2

The only FIPS certified, military strength hardware encryption solution for Android Smart Phones that keeps all your communication and privacy totally secure VoIP relay; only for the delivery of encrypted voice packets Account Management NO key generation or storage 3

The GO-Trust Sycret Voice System encrypts your Voice, your SMS (text) and all your Shared Files. Your Pictures and other Confidential Files are also encrypted and safely stored on your microSD or using Cloud Storage. Only YOU can retrieve them and all communication is 100% peer to peer encryption. There is no central generation or storage of keys. 4

How does Sycret Work? 5

Security Features All encryption and decryption takes place inside the microSD (SDencrypter); Nothing is ever in the open or visible to the Android operating system. Even a Trojan would find nothing. A unique RSA-2048 key pair are generated at first-time login. These private keys are securely protected inside the Sdencrypter. A voice encryption key (AES-256) is randomly generated and is different for each secure call session. Generation takes place inside the SDencrypter. All session keys are encrypted and exchanged peer to peer; the Sycret server never sees them. APP Authentication: A User PIN (numeric password) of 4 to 16 digits is used for authentication to get access to Sycret APP. The SDencrypter will lock after 5 wrong PIN attempts. Your security is portable when you move from to a new device. Time-out protection enforces an automatic logout after a set period of inactivity. Sycret voice microSD (SDencrypter) is FIPS 140-2 Level 3 certified. 6

SD encrypter Specification • 32-bit ARM processor. • Hardware security module (HSM) embedded inside the microSD. • GO-Trust high speed COS. • In-Chip Crypto operations: RSA 2048, 3DES, SHA-256, HMAC, AES-128/256, Diffie-Hellman and Random Number Generation. Fully in-chip hardware based authentication and encryption/decryption provides the highest security for data protection. • Enabled secure channel communication between COS and middleware. • All crypto algorithms are certified by NIST, USA. • Private keys are never exposed. • Security IC is CC EAL 5+ Certified. • SDencrypter is FIPS 140-2 Level 3 Certified. • Certificate number 2084. • 7

Features of Sycret APPs APP Feature Functionality Sycret Voice (Voice, SMS and Chat) Secure Voice The secure voice call is transmitted through mobile network such as 3G/4G or Wi-Fi. ● MIC mute Sycret Voice APP also provides MIC mute function for wiretapping protection, which allows user to turn MIC on/off. If other APP is running in background for audio recording before mute function is enabled, the MIC button will appear yellow colored to remind the user the recording application and access to microphone are occupied by another APP. Secure Chat Sycret APP offers the encrypted chat message transmission and online chat room services over the internet (3G/4G or Wi-Fi). Secure SMS The secure SMS functionality allows the exchange of the encrypted text messages over telephone SMS network. Sycret Voice supports all Android phones and tablets even those with only a USB plug. The number of users and Sycret servers are scalable; there is no user limitation.

Business Models GO-Trust sells complete Sycret Voice system including Sycret Server to Enterprise Clients. GO-Trust manages Sycret server and offers Sycret voice cards to clients. Users just inserts SDencrypter into Android phones and downloads Sycret Voice or Sycret Chat APP to start protecting privacy. 9

Recommended Server Structure for Secure Voice, IM and File Sharing Model 1 Fortigate firewall (transparent mode) Static IP DB server storing the authenticated SIP and IM accounts main server (active mode) Running SIP and IM push service Secondary server (active mode) Running SIP and IM push service NAS(1) Storing the uploaded data (file-sharing) Total Device: Main Server 1ea Backup Server 1ea DB 1ea Firewall 1ea Switch 1ea Static IP Static IP Static IP HA L2 switch 10

Reference Innovator of Secure microSD Products sold in over 30 countries Multi-million people are using our products No 1. market share of secure microSD business Banks: Brand name companies Government

About us Awards Certifications Patents Sesames (the worlds most prestigious digital security awards), Paris 2008 – Winner : IT Security Application Network Products Guide, USA 2008 – Product Innovation Sesames, Paris 2011 - Mobility Award Finalist Asian Sesames, Hong Kong 2012 - Finalist Top 100 MVP Managers in Taiwan, 2012 – CEO, Darren Lee American Sesames, Las Vegas 2014 – Identification Finalist Certifications FIPS 140-2 Level 3 certification of SDencrypter MasterCard PayPass for SWP microSD UnionPay FIDO Ready Patents 14 granted 6 pending 12

83-243 Szlachta, ul. Przemysłowa 11 Tel: +48 732 269 530 Autorization Partner PPHU TTS 83-243 Szlachta, ul. Przemysłowa 11 Tel: +48 732 269 530 e-mail: tts@audiojammer.center www.audiojammer.center