Real Security InterSwyft Technical information's.

Slides:



Advertisements
Similar presentations
Online Electronic Payment System Using PREDICT II Protocol Mid Term Project Presentation 6 th September, 2001 By Nishanth Menon 98m11, S 6 MCA.
Advertisements

Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
ADMS Automatic Data Master Server
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Web Server Administration
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
Take advantage of the SMS technology in your organization today!
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
General Packet Radio Service
X one. Mobile development platform We mobilize your process IP. ALARMS AUTOMOTION.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
ACM 511 Introduction to Computer Networks. Computer Networks.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Transferring Data Around. Networks Is a series of computer systems that are linked together so that they are able to share computer power or storage facilities.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
CISC 849 : Applications in Fintech Cybersecurity in Banking.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Configuration of a support- plateform for data collection using Mobile technologies African Regional Conference on the use of mobile technology for statistical.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Network Security: Lab#2 J. H. Wang Oct. 9, Objectives To learn to use message digests –MD5 To learn to use secure hash functions –SHA-1, SHA-2 To.
Vending machine monitoring system Industry&Business &Government IT transformation.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Information Systems Design and Development Security Precautions Computing Science.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Network Security.
e-Health Platform End 2 End encryption
Security and Encryption
Web Services Security.
CS447 - Networks and Data Communications
BY GAWARE S.R. DEPT.OF COMP.SCI
E-Commerce Security.
Mobile Payment Protocol 3D by Using Cloud Messaging
Services Provided by Network Operating Systems
Telnet/SSH Connecting to Hosts Internet Technology.
HW and SW Solution for Black-box attacks
csci5233 computer security & integrity (Chap. 4)
Data Communication.
Protocols 2 Key Revision Points.
Electronic Payment Security Technologies
EDAMIS - current status / further development
Web Servers (IIS and Apache)
Security in Wide Area Networks
Presentation transcript:

Real Security InterSwyft Technical information's

Technology

Encryption What encryption is used by InterSwyft? The technology uses TripleDES encryption used also in bank payment terminals Password with unlimited size The possibility of implementation of another algorithm, such as e.g. AES

Integrity How is assured integrity of transmitted information? Using the SHA HASH algorithm Change of transmitted information is immediately detected and evaluated as an attack The possibility of integration of another HASH algorithms

Digital signature Digital signature for sender authentication It is an inherent part of security for payment transactions

Message transmission The possibility to transmit up to 1800 characters via a single SMS message Faster system response as a result of larger data transfer Cost savings for the transmission of information InterSwyft technology is compatible with existing GSM hardware and software without necessity to do modifications

Streaming The possibility of data streaming via SMS messages Possibility to use up to 16 SMS messages as one big SMS message (1800 x 16 characters) Support for duplex streaming Automatic detection of incomplete or damaged data streams

How it works

InterSwyft technology of SMS messages modifies before sending to the transmitter: and after receipt from the transmitter: Original SMS InterSwyftSMS processing of SMS Sending through the GSM network Receipt through the GSM network InterSwyftSMS processing of SMS Original SMS message

How it works Implementation of SMS message processing with InterSwyft technology is possible in two ways: I. SMS messages are processed remotely by calling the services via secured HTTP protocol or secured Microsoft WCF access. This method is used on the server side processing incoming messages II. By direct integration of technology to devices: SMS messages are processed directly at device - payment terminal, industrial equipment, GSM transmitter, telephone, GSM gateway, etc.

Integration in form of the service The encrypting and decoding of SMS messages is available on the server side connected to the customer’s network as a network service. Oracle database can be replaced by any database or data source

Direct integration Direct integration of the technology into existing and new services or products is possible using the DLL or LIB files Supported programming languages: C, C++, C # including ASP.NET, Perl, PHP, Visual Basic and other supported by call of DLL libraries Supported platforms: Windows, Windows Mobile, Linux, Mobile Linux, MacOS, Symbian and other propietary 32-bit operating systems of mobile devices