B-CERB complete protection against phishing copyright 2008 by Wheel.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Lecture 2 - Revenue Models
© Copyright 2006 FPT Software 1 © FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 How to work in Fsoft project Authors: KienNT.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Four ways to give electronically 1. Making it easy for givers to give! 2.
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Customer Relationship Management
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Achieving online trust through Mutual Authentication.
Copyright 2004: Cybergen Technologies Inc. Slide #1 end-to-end recharge & e-commerce transaction flow scenarios Telco/MSO Billing & Payment System (BPS)
By Rick Clements Software Testing 101 By Rick Clements
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
E-Child Care Time and Attendance Tracking System December 17, 2010 Department of Human Services, Division of Family Development 1.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
1 SLIDE Insurance Company Regulation Division Insurance Market Regulation Division Medical Professional Liability Insurance Claim Reports Online Claim.
Tax Refund Prepaid Card Solution For: Fast. Reliable. Worldwide.
Surgery OR Procedure Card Database David L. Odom 1. Secure Password into Database:
Welcome to Access Online for State of Iowa Cardholders.
Copyright 2008, Information Builders. Slide 1 Build Real-Time BI Dashboards With Flex and WebFOCUS Web Services Paulo Tavares Sr. Systems Engineer June,
McAfee One Time Password
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Discover the future of security on Stallion Spring Seminar 2009 Your mobile phone: the ultimate authentication tool.
© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.
1 Confidential Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management MobileIron - Confidential1.
Win the Cyberwar on Mobile Banking and Payments
1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs.
My ELAS December 2012.
© S Haughton more than 3?
Twenty Questions Subject: Twenty Questions
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
1 Welcome to JCCAA Data base presentation Click box to see the DEMO 1.JCCAA Web Site 2. Member Login 3. My Acount 4. School DBA The end.
Citizen Portal
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Week 1.
We will resume in: 25 Minutes.
1 Unit 1 Kinematics Chapter 1 Day
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
How Cells Obtain Energy from Food
USPS 2012 Mobile Commerce & Personalization Promotion 1 IMb ® A Smart Alternative to QR Codes Intelligent Mail and IMb are trademarks of the United States.
Copyright © Cengage Learning. All rights reserved.
31th of March 2008 – Warsaw – Torsten Grunwald Starting a limited liability company in Denmark.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
CERB authentication system ideal (not only) for crisis times! copyright 2009 by Wheel.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
COEN 351 Authentication.
Presentation transcript:

B-CERB complete protection against phishing copyright 2008 by Wheel

B-CERB complete protection against phishing copyright 2009 by Wheel 2 Various methods of authentication available on the market

B-CERB complete protection against phishing copyright 2009 by Wheel 3 According to Accenture research

B-CERB complete protection against phishing copyright 2009 by Wheel 4 We notice an increasing popularity of token-based solutions which are relying on mobile phones, and we anticipate that 50 per cent of the future market of two- component authentication will be using this form of protection. Dr. Allan, market research vice-president, Gartner 4 Information from the market

B-CERB complete protection against phishing copyright 2009 by Wheel 5 Wheels answer! B-CERB, authentication and authorization system using mobile phone as one of the methods for login and confirmation of transactions Only as effective protection against phishing!

B-CERB complete protection against phishing copyright 2009 by Wheel 6 CERBToken, functionality Login to the bank (one time passwords) Verification of the identity (challenge - response) Confirmation of transactions (challenge - response)

B-CERB complete protection against phishing copyright 2009 by Wheel 7 Download, installation, activation CERBToken Activation code BANK

B-CERB complete protection against phishing copyright 2009 by Wheel 8 Login Login to your account User name Password John Kowalsky login

B-CERB complete protection against phishing copyright 2009 by Wheel 9 Transfer confirmation Data transfer Recipient name Address Account number Amount confirm Transfer confirmation confirm Operation code: Confirmation code: Your transfer has been accepted! John Kowalsky Akacjowa Street Warsaw ,

B-CERB complete protection against phishing copyright 2009 by Wheel Verification of the banks customer identity Bank calls the customer and ask for generation of verification codes BANK

copyright 2009 by Wheel B-CERB kompletne zabezpieczenie przed phishingiem 11 CERBToken for BlackBerry CERBToken for Windows Mobile CERBToken for Java Mobile CERBToken – an ultimate method of authentication in CERB CERBToken for iPhone now in AppStore !

B-CERB kompletne zabezpieczenie przed phishingiem copyright 2008 by Wheel 12 CERB is not only the CERBToken! We offer also other modules of authentication: SMSToken scratch off cards, , other equipment tokens of third parties

B-CERB kompletne zabezpieczenie przed phishingiem copyright 2008 by Wheel 13 BANK office IVR web call center other product I product II product III JavaToken passwor d... The same customer – multiple channels of access to products

B-CERB kompletne zabezpieczenie przed phishingiem copyright 2008 by Wheel 14 One customer Different authentication methods Different channels of access Access to different products The same customer – multiple channels of access to products

B-CERB kompletne zabezpieczenie przed phishingiem copyright 2008 by Wheel 15 Bank system e-Banking m- Banking Database CERB office Call center IVR CERBToken generation server CERBAPI CERBToken distribution server WEB GUI INTERNET / GSM broker GSM JAAPI System infrastructure – complete system

B-CERB kompletne zabezpieczenie przed phishingiem copyright 2008 by Wheel 16 Bank system e-Banking m- Banking Database office Call center IVR CERBToken generation server CERB engine CERBToken distibution server WEB GUI INTERNET / GSM broker GSM JAAPI System infrastructure – engine

B-CERB complete protection against phishing copyright 2009 by Wheel 17 Security. Application. secure installation (activation code) protection against brute force attack (non-verifable PIN) protection against copy application to another phone protection against overwriting of application possibility of passwords configuration challenge – response personalization

B-CERB complete protection against phishing copyright 2009 by Wheel 18 Security. System. protection against theft of logins, static password and hidden passwords (one time passwords) protections against theft of password to digital signature (challenge - response) protection against interference in work of OS (challenge – response) protection against phishing protection against man in the middle attack protection against trojans

B-CERB complete protection against phishing copyright 2009 by Wheel 19 Furthermore… very competitive price no logistics cost (no hardware tokens, no TAN cards, etc) price in polish zloty high usability great marketing argument: only as effective protection against phishing another argument: very innovate solution Wheel is polish company (we can modify system according to your expectations).

B-CERB complete protection against phishing copyright 2009 by Wheel 20 CERB system, total cost of using CERB system maintenance costs, increasingly year-round support logistics costs (only the cost of SMSs) no costs in case of lost applications no costs of appliction renewal Maintenance costs of a system based on equipment tokens, increasingly year-round support logistics costs (delivery of devices) costs of lost devices (lost, broken - usually around 10%) costs of devices renewal (usually after every 3 years) comparison of total costs after 5 consecutive years of using for users

B-CERB kompletne zabezpieczenie przed phishingiem copyright 2008 by Wheel 21 CERB system, our references

Thank You. Time for questions. copyright 2009 by Wheel, kontakt: