MicroToken Exchange Data Security Solutions Use Case Solution: GVSC Securing Real Time Commands and Video
The Customer: The GVSC The United States Army CCDC Ground Vehicle Systems Center (GVSC), located in Warren, Michigan, is the United States Armed Forces' research and development facility for advanced technology in ground systems. It is part of the U.S. Army Combat Capabilities Development Command (CCDC), a major subordinate command of the U.S. Army Futures Command.
The Challenges and Requirements The MTE and GVSC Implementation The Use Case Process Flow The Challenges and Requirements The MTE Solution The MTE and GVSC Implementation
Leader Follower Vehicles Military Ground Vehicles The Challenges Common Software Aerial Vehicles Leader Follower Vehicles Autonomous Vehicles Military Ground Vehicles A variety of military vehicles use the same software and electronic architectures as commercial vehicles. They are potentially vulnerable to hacking. To help it defend its fleets, the GVSC and all military sectors scout for an intrusion defense system that can protect against cyber-attacks on military vehicles. Adversaries probe and exploit systems used by government, law enforcement, military, intelligence and critical infrastructure in the United States and abroad.
Secure Live Video Transmission The Requirements Secure Live Video Transmission Thwart Replay Attacks Secure Command and Control
The Solution: Eclypses MicroToken Exchange (MTE) MTE secures Data at Rest or, in this case, Data in Transit. MTE handles all the “Key Management” so that you do not have to. MTE prohibits unauthorized access. MTE thwarts “replay-attacks MicroToken Exchange MTE PCI DSS Certified MicroToken Exchange MTE
The MTE Implementation – Phase I Eclypses provided technical collaboration to determine the best scheme for deployment. The Eclypses team embedded MTE “methods” within the GVR-Bot application. This required inserting our MTE “code”, Into the “source code” of the robotic operating system. The same process was followed for the “controller”. Implementation
The MTE Implementation – Phase II Eclypses tested for vulnerabilities around the installation. The GVR-Bot was then tested by GVSC along with an independent third party. Enhancements and adjustments were made to fortify the overall architecture of the solution provided. The GVR-Bot was then re-tested by the same independent third party and the results were extraordinary. The Eclypses team met with the GVSC Penetration Test team to collaborate regarding additional enhancements that the GVSC team wanted to see. Eclypses implemented those changes and completed the POC. Implementation
Risk Management with variable parameters RESULT: The GVR Bot SECURED with MTE! Output Window Risk Management with variable parameters MicroToken Packets replaced “real commands” and were transmitted, received and interpreted by the intended endpoint Live video streams were secured a single frame at a time, secured by MTE. Security Protection Is Our Highest Priority
Technical live demonstration is scheduled for October 2019 The GVSC Implementation Technical live demonstration is scheduled for October 2019 Top Brass as well as many other interested parties will be in attendance Additional POC’s are expected after the extraordinary success that was demonstrated
Illustration of GVR Bot Remote commands Sending Device Receiving Device Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Paired Devices
Illustration of GVR Bot Remote commands with MTE Sending Device Receiving Device Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct MicroToken within a MicroToken Packet transmitted to the Receiving endpoint (6I<'nsh`9^M~>}/_) (^2L?OOU}xK'kT}Y#tO?<H9yK>kbP~h!Bzrl)3KXyQ6KNoG]EY76I<'nsh`9^M~>}/_?O3$V<^Ypa5-L-LW|LT4+4Mx3TM
Transmitted Packet Received Illustration of GVR Bot Remote commands with MTE Sending Device Receiving Device Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct Command List Move Forward Move Backward Turn left 90 Degrees Turn Right 90 Degrees Stop Fire projectile Transmit Video Self-Destruct (6I<'nsh`9^M~>}/_) Transmitted Packet Received Command Interpreted (^2L?OOU}xK'kT}Y#tO?<H9yK>kbP~h!Bzrl)3KXyQ6KNoG]EY76I<'nsh`9^M~>}/_?O3$V<^Ypa5-L-LW|LT4+4Mx3TM
Validation of Eclypses’ Third Party Penetration Tested Validation of Eclypses’ MicroToken Exchange “With the method of key generation, even if the attacker intercepts the initial key/pin, they would need to brute force their way to the discovery of the algorithm, with that being said, it would take nation state actors to even attempt to break the encryption process without having access to the source code . . . . In other words, very improbable.” – H2L Solutions (Military Penetration Testing Facility)
Contact Us Securing Data via MicroToken Exchange For more information contact: Info@Eclypses.com www.Eclypses.com (USA) +1-719 323 6680 Contact Us Ensuring that sensitive data remains unavailable to exploitation in the event of an internal or external network defense breach