All Rights Reserved, Swurv, www.swurv.com secure gateway interoperable communication multidomain traffic system APPLICATION LAYER TECHNICAL DISCUSSION.

Slides:



Advertisements
Similar presentations
WELCOME to an Introduction of the Monitoring the end-to-end Transport/Distribution Chain B2B Version V.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Netcentives Inc. 475 Brannan St. San Francisco, CA NASDAQ: NCNT Netcentives Inc. 475 Brannan St. San Francisco,
 Corporate Profile  BOSS Overview  Current Solutions  BOSS Modules  COLORS - New BOSS Web Module  BOSS Benefits  Supplier XML Services and BOSS.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Active Directory: Final Solution to Enterprise System Integration
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Chapter Two Information Technologies: Concepts and Management.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet Banking Standard and Standard-Hybrid Registration Intuit Financial Services University Internet Banking Certification Training.
11-01: Get Started with SCP Supply Chain Platform Training Presentation Updated April 2009.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Web Self Service Take Home Message Web Self Service gives CRM information access to assigned non-CRM users.
Trimble Connected Community
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Invitation to Computer Science 5th Edition
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
PostalOne! / FAST Data Exchange - Vision 02/15/05.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
How Can NRCS Clients Use the Conservation Client Gateway
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Registration Solutions for your Event Management.
Mercury. One single online platform: Mercury Highlights – USP’s Web-based platform: accessible from any computer in any location without installing any.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
PAYWARE MOBILE API – APP TO APP INTEGRATION. PAYWARE MOBILE API OVERVIEW VeriFone’s PAYware Mobile API provides iPhone developers the ability to easily.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
1 Visalia Unified School District Principal & Area Administrator Service Request Approval Processing Using The SRTS November 16, 2005 Administrative Services.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Copyright 2013 Exostar LLC.| All Rights Reserved.| Proprietary and Confidential1 Identity Proofing Service United Technologies Corporation September 26.
Ariba Punch-Out Catalog Process Flow
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
How Can NRCS Clients Use the Conservation Client Gateway
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Data and Applications Security Developments and Directions
Cryptography and Network Security
Management Application for all segments
The Internet and Electronic mail
Presentation transcript:

All Rights Reserved, Swurv, secure gateway interoperable communication multidomain traffic system APPLICATION LAYER TECHNICAL DISCUSSION PolyNet Overview Smartees: Detailed Overview Enterprise Interoperability SWURV

All Rights Reserved, Swurv, Authentication Swurv Server Nexus Client *Logos used for illustration purposes only. Trademarks are the property by their respective owners.

All Rights Reserved, Swurv, Native Applications Swurv Server Nexus Client Authentication AdministrationWebmarksData StorageAddress Book Chat/MessagingMedia StreamingScheduler Secure Gateway to the PolyNet *Logos used for illustration purposes only. Trademarks are the property by their respective owners.

All Rights Reserved, Swurv, Swurv Server Nexus Client Authentication Native Applications Interoperable Webservices Smartee Services Validate User(s): Single Signon Add, modify fields highlight, alert & flag permissions, sorting & searching User(s) status: online/offline Add, modify, access data structure(s): sharing model & tree structure(s) etc... extensible customizable standards based generic Administration Webmarks Data Storage Address Book Chat/Messaging Media Streaming Scheduler End User Services

All Rights Reserved, Swurv, Swurv Server Nexus Client Authentication Native Applications Multidomain Traffic System Smartee Services cross organizational many to many end to end Nexus Server B Swurv Domain 1 Swurv Domain 2 Swurv Domain 3 Swurv Domain 4 Swurv Domain 5 Nexus Server A Swurv Domain 6 Internet

All Rights Reserved, Swurv, SWURV SMARTEES SMART Electronic Encryption Sequence DETAILED OVERVIEW

All Rights Reserved, Swurv, SMARTEES OVERVIEW Swurv Smartees is a communication architecture which enables interoperability between 3 rd party databases, applications and transaction systems. Smartees provides peer-to-peer (server-to-server) web services for 3 rd parties. Multiple 3 rd parties may participate in a single transactional chain of requests. The Smartee API (Application Programming Interface) does not specify specific services but provides the communication infrastructure for predefined and user created functionality. Smartees use generally known and available technologies allowing integration on most platforms and development environments.

All Rights Reserved, Swurv, The ability to extend functionality with fewer integration problems. Enterprises may leverage existing IT assets. Provides seamless and secure interaction between unrelated enterprises that most likely are using dissimilar technologies. Integration of market clusters that currently use islands of best of breed, one to many processes and technologies. Non-repudiation prevents an individual or entity from denying having performed a particular action related to data. All data is transmitted securely and in private between the participants. Most communication is done out of band (server2server) minimizing security risk. MAJOR BENEFITS

All Rights Reserved, Swurv, Swurv user: A user currently logged into the Swurv Environment. Smartee: A unique item of information incorporating identification and permission exchanged between services in the Smartee protocol. Smartee Service: A particular action or request made by a 3 rd party of Swurv or of another 3 rd party application. Generic user information: User information which is stored by Swurv that is available to all 3 rd party applications. 3 rd party specific user information: Information about a user that is stored by Swurv for the 3 rd party application. This information is not available to other 3 rd party applications. KEY ASPECTS

All Rights Reserved, Swurv, TECHNOLOGIES Smartees use the following generally known and available technologies: XML-RPC for communications and data format RSA public key infrastructure for data encryption and non-repudiation By using widely available and non-proprietary technologies as its base, the Smartees API can be used on nearly every web development platform and environment.

All Rights Reserved, Swurv, PRE-DEFINED SERVICES Smartees have many predefined services which a 3 rd party application may request of Swurv. Some examples are: Verify that the current web user is using Swurv. Store and retrieve 3 rd party defined information in Swurv associated with this user. This information is only available to the particular 3 rd party application which stored it. examples are: a user ID or customer number for the user access privileges for the Webservice Request the user's name, address or street address

All Rights Reserved, Swurv, Smartees allow Swurv users to identify themselves to 3 rd party applications without any user action or intervention.This allows a 3 rd party application (examples:e-tail, informational, ERP) to request from Swurv the 3 rd party specific identity of the user attempting a connection,and once connected to request further information about the user if it is required. (Single Sign On) EXAMPLE 1: User Authentication for 3 rd Party Applications contd Fig.1 1 Home Depot Swurv PolyNet *Logos used for illustration purposes only. Trademarks are the property by their respective owners.

All Rights Reserved, Swurv, Upon visiting the 3 rd party application's Website the Website confirms that the user is using Swurv. The application asks Swurv whether the user has existing credentials for the application. These credentials may have been created by the Swurv brand administrator for the user when the user's account was created. If the credentials already exist then the application skips the login stage and authenticates the user using the credentials. If the credentials do not pre-exist, the application shows the user the login page where the user enters their User ID and password. Upon verification the application then stores with Swurv the credentials for the user which will be retrieved the next time that the user connects to the website. At no point are the user's Swurv sign-on credentials exposed to 3 rd parties. EXAMPLE 1: User Authentication... contd.

All Rights Reserved, Swurv, Swurv PolyNet Home Depot Rather than requiring the User to enter their delivery address into a web form when Swurv already knows the address, using Smartees a 3 rd party application may request Swurv to pre-fill the form. EXAMPLE 2: Get User's Delivery Address for a Product Purchase contd Fig *Logos used for illustration purposes only. Trademarks are the property by their respective owners.

All Rights Reserved, Swurv, The 3rd party application requests from Swurv an address for the user. Since a user's address is private information Swurv first verifies with the user that the application should be permitted to retrieve the information. The user picks from among their personal, home and work addresses which one to provide to the application. The application is sent the address or the request denial. Since the address request requires user involvement, the Smartee request/response process is asynchronous. The Swurv user only needs update their address in one place and the 3rd party application receives up-to-date information. EXAMPLE 2: Get User's Delivery Address … contd.

All Rights Reserved, Swurv, Swurv PolyNet Home Depot A Swurv user purchases a product from an e-tailing website. The e-tail website requires that delivery of the product to the user be scheduled. The e-tail application uses Smartees to book delivery with a shipping company. The shipping company needs to know the delivery address. EXAMPLE 3: Interoperability between Swurv and two 3 rd party apps Fig contd. UPS 7 8 *Logos used for illustration purposes only. Trademarks are the property by their respective owners.

All Rights Reserved, Swurv, EXAMPLE 3: Interoperability… contd. The shipping company's application requests from Swurv the delivery address of the Swurv user. The Swurv user approves the shippers request for their address. The shipping company's application returns to the e-tailing website confirmation of shipment. The Smartee protocol maintains the link between the user and the chain of requests made for that user.

All Rights Reserved, Swurv, Swurv PolyNet Home Depot A Swurv user signs up to a website that does not use Smartees. The user has the facility to automatically sign-on to the site the next time that they visit the site. EXAMPLE 4: Single sign-on to a 3 rd party application/web service (non-Smartees based) contd Fig.4 2 *Logos used for illustration purposes only. Trademarks are the property by their respective owners.

All Rights Reserved, Swurv, EXAMPLE 4: Single sign-on to a 3 rd party application/web service (non-Smartees based)… contd. Swurv recognizes the URL of the website and prefills the form with the user access information.

All Rights Reserved, Swurv, User Privacy : The user decides what personal information to share with which 3 rd party applications. User Data Repository : The user maintains information in one location while retaining the right to govern access permissions. User Identification : As the user moves from one computer to another their Swurv identity moves with them. If there are multiple users on the same machine they still maintain unique Swurv identities. Issues with browser cookies, users using multiple computers or shared computer usage are already dealt with by the time that a user connects to a 3 rd party website. Proprietary Information Protection : Smartees do not require the disclosure of 3 rd party application proprietary information to Swurv or other 3 rd parties. MORE BENEFITS

All Rights Reserved, Swurv, ENTERPRISE INTEROPERABILITY Internal Apps./ Webservices Partner Apps./ Webservices External Apps./ Webservices TA (Travel Agents) TA (Travel Agents) New Data New Data New Data New Data the difference *Logos used for illustration purposes only. Trademarks are the property by their respective owners. Existing app. New app. Existing app. New app.

All Rights Reserved, Swurv, Smartee integration with travel industry 3 rd parties for the benefit of travel agents and Signature Vacations. Customer information collection from travel agents via Smartees without the need for double entry. DISCUSSION POINTS