OIV Technology & RIGHTS TO TRANSACTION OIV: Origin/Owner Instant Verification.

Slides:



Advertisements
Similar presentations
Introduction to Web Bill of Lading Q Proprietary and Confidential Copyright © 2005 INTTRA Inc. 2 Agenda Industry Challenges INTTRA Solution Value.
Advertisements

Chapter 8 Payment Systems: Getting the Money
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Chapter 15 Legal & Ethical Issues
Slide 1 Insert your own content. Slide 2 Insert your own content.
Healthcare Payment & Remittance Medical Banking - Best Practices
Public Key Infrastructure and Applications
Enabling New RFID Communication Opportunities with EPC Network Services Tony Rutkowski Vice President VeriSign Communication Services tel:
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
0 - 0.
© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.
The Welsh Procurement Card at Aberystwyth University
Eligibility, Benefits, and Pre-certifications
Freedom – MuniciPAY Credit Card Interface 1Freedom Systems – MuniciPAY Credit Card Interface Webinar WELCOME TO THE FREEDOM – MUNICIPAY CREDIT CARD INTERFACE.
Vision: A strong and capable civil society, cooperating and responsive to Cambodias development challenges 1.
IT CONTRACT LAW FOR PROJECT MANAGERS Rachel Burnett, Solicitor BCS Vice President Forums January 2004.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
COMOS Mobile Solutions 1.0 Simplified global collaboration
Archit Patel Hitesh Chaurasia Lucina Roy Morten Pereira Roopali Navani
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Primary and secondary use of EHR: Enhancing clinical research Pharmaceutical Industry Perspectives Dr. Karin Heidenreich Senior Public Affairs Manager/Novartis.
Copyright ©2004 Pearson Education, Inc. All rights reserved. Chapter 1 Overview of a Financial Plan.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Copyright © 2006 Pearson Addison-Wesley. All rights reserved. Chapter 16 Finance and Fiscal Policy for Development.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Off-the-Record Communication, or, Why Not To Use PGP
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Business Plug-In B7 Ethics.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Personal Finance Risk Management. Net Worth The amount by which assets exceed liabilities. One of the most important calculations one can make. Look for.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Cryptography, Authentication and Digital Signatures
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Dimensions of E – Commerce Security
DEMATERIALIZED PROMISSORY NOTES. Main Statistics 2014 Participants: – 347 Issuers and 198 Depositors. Assets Under Custody – Value on deposit at December,
CIS E-Commerce 1 Electronic Commerce. CIS E-Commerce 2 Introduction What is “E-Commerce” Happy Puppy - A New Internet Company: –
Trends in Banking. Product Innovation Investment products Gold / silver coins Marketing of insurance product Credit cards and debit cards Innovative services.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
DIGITAL SIGNATURE.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
CHAPTER 1 RESOURCES OF ELECTRONIC MARKETING. On-Line Age Narrowcasting Specific product for specific market Listservs On-line messages Electronic funds.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Raj Bank Universal Core Banking System FCBS FINCBS INC Banking Systems & Consulting
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Applied Uses of Blockchain:
Preventative Measures
Amity School of Business BBA, Semester - II E - Commerce Arpan Sinha
Security
Consider cards over cash
Chapter 5 Electronic Commerce | Security
Digital Signature.
Cyber Issues Facing Medical Practice Managers
Consider cards over cash
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Chapter 5 Electronic Commerce | Security
Presentation transcript:

OIV Technology & RIGHTS TO TRANSACTION OIV: Origin/Owner Instant Verification

For Voluntary Transaction All parties must accept proffered messages - which often contain messages from 3 rd party away from the transaction point CommercialGovernmentalPersonal 2

Attributes of Transaction Message Message Origin Message Content Message Intended Recipient Message Time 3

Vulnerabilities of Unverified Message Counterfeit of fraudulent origin Repudiation by origin Fraudulent modification of content False statement in content Fraudulent use of content Unauthorized use of content Breach of confidentiality or privacy Unintentional human or machine error 4

Rights to Transaction Message Rights of origin: message authenticity, integrity of message content, message confidentiality Rights of intended recipient: rightful use of message content, non-repudiation of message by origin, integrity of message content 5

Compromised Transaction Messages are costly in hindsight Monetary cost to stakeholders Time & emotion cost to stakeholders Collateral cost to the society –Cost for enforcement –Cost for adjudication –Cost for management and maintenance 6

Billion Transactions Daily Different People with Different Things at Different Places 7

A Longstanding Problem Seemingly Impossible Task The Significant Effort, Cost and Risk Involved for an Effective Solution 8 Since the barter days

The Challenge & the New Paradigm Verifying the origin, integrity and intended recipient of transaction-messages in open environment BEFORE a transaction is taking place Efficiently and Effectively 5+3 = 8 Insignificant costNow anytime & anywhere Objective 9

OIV Technology Daring into Uncharted Information Territory Presents The Distributed System for Origin Instant Verification 10

The Underline Principle OIV Transaction Code Uniqueness of Asset Transaction Pedigree Probability and Cryptography Supported by Proven Technologies –Compression –Distributed computing –Web-services and for remote transaction –Cell phone and Blue-tooth for ubiquity – Location Based Service (LBS) *LBS: Location Based Services 11

Elements of OIV Technology The Unique Symbiotic Pair –Physical-asset and Information-asset Distributed Asset-centric Database Distributed OIV Public Tool Distributed Origin Public Finger-print OIV Transaction Code (the Transaction Pedigree Code) –Synchronized delivery for LBS –Asynchronized delivery for remote services 12

Applications Commerce –Banking, Financial and Insurance Services – Micro-financing –Pharmaceutical and Health Care –Manufacturing –Arts and Culture Objects –Retail POS Transaction –Internet Commerce Government –Legal Identity and Entitlement Benefits Program –Monetary Instrument –Military Supplies and Law Enforcement –E-Governing Organizations & Individuals –Asset and Rights Management 13

Features Origin Instant Verification Asset-centric Security Point to Point Distribution Transparency Choice of Online or Offline Simplicity & Scalability 14

Value Propositions Increasing Revenue Decreasing Cost Saving on Investment Saving on Social Cost Enhancing Transaction Value Our Measure of Security The cost of breaking security exceeds the benefit of breaking the security *Measure of cost or benefit by: money or time 15

OIV Technology… Its all about RIGHTS TO TRANSACTION (Rights of Origin Rights of Intended Recipient / Owner ) Knowing is not enough; we must apply. Willing is not enough; we must do. - von Goethe Copyright © 2005 Michael Hu. All rights reserved worldwide. 16