Commercial-in-Confidence The ATLAS Project: Delivering Authenticated Location within Commercial LBS William Roberts, NSL Galileo Applications Days 5 March.

Slides:



Advertisements
Similar presentations
Edgar Thielmann Applications of the European GNSS INFO DAY GALILEO FP7 Bruxelles 27 January 2009 EUROPEAN COMMISSION.
Advertisements

GALILEO and EGNOS Fotis Karamitsos, European Commission
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
BSNAVC All rights reserved, 2008, Thales Alenia Space Template reference : S-EN COMMERCIAL IN CONFIDENCE 6 th June 2012 Location GE webinar 6.
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Document Exchange Product Overview Secure Transmission for Transaction-based Documents.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
You Sale Distribution & Monitoring Product. It’s Only One Step … Take it Agenda  Introduction to Mass Distribution Environment  System Overview  System.
Building and Deploying the world’s first commercial application to address product authentication, brand protection and anti-counterfeiting Alpharetta.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
SECAM Systems Product Presentation SECAM Systems © 2010.
A tour of new discovery introducing XpertCapture Your ultimate data capturing solution.
A Product of HR Applicant Tracking System Online HR Solutions for seamless recruiting process management Copyright © ANGLER.
UPnP Device Management Andre Bottaro France Telecom Group UPnP DM co-chairman End User Device Management panel Sunday, January 11th, 2009 CCNC'09.
Galileo’s Commercial Potential Peter Lambert-Cole.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
PROFITABLE INVENTORY CONTROL SYSTEMS Your Complete Software System Integrator ProcessTrakker – Visually Tracking your Manufacturing Process.
© Copyright High Performance Concepts, Inc. 12 Criteria for Software Vendor Selection July 14, 2014 prepared by: Brian Savoie Vice President HIGH.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
© VESP International Pty Limited To Contents Slide CLICK to advance slides/ bullet points within slides Integrated Master Planner An Overview.
Nurjana Technologies Company Presentation. Nurjana Technologies (NT) is a small business enterprise founded in 2012 and operating in Aerospace and Defence.
MCS Business Profile Yr Copyright (C) MCS 2013, All rights reserved. 2 MCS Business Focus MCS Business Profile MCS has a business.
Fault and Intrusion Tolerant (FIT) Event Broker & BFT-SMaRt A. Casimiro, D. Kreutz, A. Bessani, J. Sousa, I. Antunes, P. Veríssimo University of Lisboa,
9/18/2015www.protocolnet.com1 PROTOCOL ONLINE SERVICES Pvt. Ltd., “To become a leader in Information Technology by providing entire spectrum of hardware,
Galileo: programme status and research activities
GNSS Receiver - Software Radio Concept František Vejražka Czech Technical University in Prague Faculty of Electrical Engineering.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
© 2012 Anwendungszentrum GmbH Oberpfaffenhofen25/26 September 2012 | 1.
X-Road – Estonian Interoperability Platform
© GMV, 2010 Propiedad de GMV Todos los derechos reservados EUROPEAN GNSS EGNOS AND GALILEO. CHARACTERISTICS AND ADVANTAGES OF BRUSSELS. OCTOBER 1 st, 2010.
GALILEO OPPORTUNITIES Viktoras Mongirdas Mokslo, inovacijų ir technologijų agentūra ESNC Lithuania kick-off Vilnius,
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Access to Enterprise data from any device Grapevine Software Access to enterprise data from any device… University of Washington 2001 Business Plan Competition.
Company LOGO Permit Tracking System. CTPermits  Our Mission Statement: To offer the most cost-effective, intelligent, and achievable Data Technology.
University of Palestine software engineering department Testing of Software Systems Testing throughout the software life cycle instructor: Tasneem.
Dan Grady The search for the killer productivity application is over… Copyright 2009, Information Builders. Slide 1.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
INDRIYA TECHNOLOGIES PRIVATE LIMITED BELEIVING IN A SMARTER AND GREENER WORLD.
DIGITAL SIGNATURE.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
Skills and products portfolio an overview Lorenzo Martinelli – Business Development Contact:
Overview + Digital Strategy + Interactive Engineering + Experience Design + Product Incubation + Data Visualization and Discovery + Data Management.
APPLICATIONS IN SATELLITE NAVIGATION: GALILEO – 2017 CALL IS PUBLISHED 10 March 2016.
Computer Analysts and Recovery Experts – Care.net.sg CARE understands that today’s IT in the business world is fluid hence the need to customize Server.
Chapter 4 HRIS Needs Analysis.
Opinionmeter International, Ltd OPMETER Real-time Customer Feedback Tools for achieving Quality Improvement and Service Excellence.
Cloud Faxing for Law Firms
PLM, Document and Workflow Management
Advancements in Availability and Reliability computation Introduction and current status of the Comp Reports mini project C. Kanellopoulos GRNET.
Cloud Computing By P.Mahesh
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
BU IS GIG Chemical, Oil & Gas
Galileo & EGNOS for regulated markets from a Service Provider perspective “Galileo & EGNOS for public interest services” MENTORE event, Brussels.
Enhancing Web Application Security with Secure Hardware Tokens
INDRIYA TECHNOLOGIES PRIVATE LIMITED
Integrated Policy Sales and Medical Screening Solution 2016
INDRIYA TECHNOLOGIES PRIVATE LIMITED
PROFITABLE INVENTORY CONTROL SYSTEMS
Delivery Management Systems Brilliant Info System Pvt.Ltd Supply Chain Management.
Simplify the way you collect, integrate and share field data.
[Application name] [Team Name] Pitch Deck.
Red Sky Update “Watching the horizon for emerging health threats”
Instructor Materials Chapter 5: Ensuring Integrity
Two Powerful Systems, One Solution Integrating your LIMS and QMS
System Design and Acquisition
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Commercial-in-Confidence The ATLAS Project: Delivering Authenticated Location within Commercial LBS William Roberts, NSL Galileo Applications Days 5 March 2010 Brussels

The Commercial LBS: Shoot & Proof Shoot & Proof is a mobile software which captures Certified Digital pictures Picture captures are Geotagged, time-stamped, watermarked and encrypted at capture The value chain allows for total integrity control from capture to storage Legal value of the process has been tested and validated Worldwide patent on the technology ISO certified processes But it remains a very simple 2 click mobile pic capture software Legal Value of pics Legal Value of pics Photos only Photos & Form API

Slide 3 Shoot&Proof from a User’s Perspective

User Interfaces Apple IphoneJava - J2MERIM - BlackberryWindows Mobile Android G1 * : Q2 09 Capture Storage and retrieval

Customers Some of the clients Some of the Partners

Slide 6 Analysis of the Shoot & Proof Features  Images, documents and forms are:  Watermarked  Advanced digital watermarking  Encrypted  Advanced cryptography  Timestamping  Certified from an external time server  Geotagging  From the internal positioning engine  GPS, Cell-ID, etc

Slide 7 What about Location?  Most existing Shoot & Proof Clients are unaware that the location is less robust  Happy with S&P service and use it on a regular basis But...  Some Clients have requested  Improved accuracy  “Authenticated” positioning S&PS&P Law enforce ment Real Estate Retails Adverti sing Cleanin g Deliver y / moving Mainten ance Engine ering Constru ction Insuran ce Securit y

Slide 8 The ATLAS Project  Authenticating Time and Location within Liability- critical Applications and Services  Successful bid into the latest FP7 GSA call, Use of EGNOS Services for Mass Market: Innovative Applications targeted to SMEs  18 month project, kicked off on 1 st February 2010  3 Project Partners

Slide 9 Project Goals  Address the needs for authenticated GNSS positioning (& GNSS time) via  GNSS Evidential Support Service  Authenticated GNSS Service  Implement and validate these added services within the existing commercial Shoot & Proof system using a subset of the existing customers who are requesting the features  The solutions must fit within the existing architectures, in terms of handset and the data certification chain  Ambitious project goals and timescale but achievable through the modification of existing assets

Slide 10 GNSS Evidential Support Service  Provision of a Web-based Service delivering the nominal performance of GNSS (including EDAS)  Modification of existing tools  

Slide 11 Authenticated GNSS Service  Ensuring that the location information is of adequate quality and has not been compromised. This will be carried out via  Differential GNSS  Improving accuracy using an EDAS based server-side service  GNSS Data Sanity Checks  PVT, SV info (az, el, snr) consistency and expectancy checks  GNSS Quality Measures  RAIM Integrity algorithms  GNSS Receiver Diagnostics  GNSS Acquisition and tracking analysis/routines

Slide 12 Handset Compatibility IphoneJavaBlackberryWin MobAndroid  Differential GNSS  Sanity Checks  Quality Measures & Receiver Diagnostics Therefore, advanced services will require additional hardware  ( ) 

Slide 13 Authenticated GNSS Service: Existing Assets  Server side  EDAS monitoring service to provide position domain correction  Existing Handset based Features  Geographical and time based encryption  Integrity algorithms originating from aviation  Additional hardware  Based on NSL’s SDR GNSS

Slide 14 Timescales  GNSS Evidential Support Service by end of 2010  Authenticated GNSS Service within one year Certified KO Meeting

Thank You