Product presentation Pa ul Woodall Jo seph Niehaus Be njamin Kehrer.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
CCNA – Network Fundamentals
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 8, 2013.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Conner Hansen Alex Summer Andreas Floeck Safe Message System.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
CSCI 6962: Server-side Design and Programming
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Wireless and Security CSCI 5857: Encoding and Encryption.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity.
PostalOne! / FAST Data Exchange - Vision 02/15/05.
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
LPL Financial Member FINRA/SIPC 1 Member FINRA/SIPC Account View
Web Security : Secure Socket Layer Secure Electronic Transaction.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Kerberos  Kerberos was a 3-headed dog in Greek mythology Guarded the gates of the deadGuarded the gates of the dead Decided who might enterDecided who.
Prabath Siriwardena – Software Architect, WSO2. Patterns Standards Implementations Plan for the session.
Lecture 24 Wireless Network Security
SMARTMAIL 3.0. OVERVIEW ● CLIENT ● WORKS WITH IMAP AND SMTP MAIL SERVER ● OFFERS SECURE , WORK FLOW MESSAGES, TRANSLATION ● PLUG-IN ARCHITECTURE.
1 Understanding Secure Socket Layer (SSL) Advisor Advisor Prof. Tzonelih Hwang Presenter Prosanta Gope.
Security March 9, Security What is security?  Techniques that control access to use a shared resource  Uses of shared resource must be authorized.
Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced.
Password-based user authentication and key distribution protocols for client-server applications Authors: Her-Tyan Yeh and Hung-Min Sun Sources: The Journal.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Wireless Network Security CSIS 5857: Encoding and Encryption.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
SSL on TELIT modules.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
1 Example security systems n Kerberos n Secure shell.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Skype.
How to Register on Active Orders Trading Grid Company Registration
Kerberos.
The Secure Sockets Layer (SSL) Protocol
Simulation of Session Initiation Protocol
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
WELCOME How to Setup Yahoo Account Key Feature in Browser? CONTACT US
Presentation transcript:

Product presentation Pa ul Woodall Jo seph Niehaus Be njamin Kehrer

Overview Important product specifications Basic functionality PaJoBe Architecture Protocols for your security

Vision Flexible Secure  Customizable

Levels of Comm. Low – Basic, fast communication. Medium – Session keys  more security High – Maximum security level, guarantee of receipt (“got it” button )

System Features Auto idle Portable wherever you are Contact List – modifiable nicknames – default security levels – to the minute updates Send / broadcast messages Secure conversation logs secure, efficient communication

Client Exchange Keys Server Registration Client Program Secure Login Software Architecture (How Stuff Gets Done)

Server Contact List On The Server Profiles (Authentication) Logs

ClientContact’s Client Contact On The Client User Profile Settings Multicast View Logs Establish Sessions Session

Security 1.The name of the game 2.Encryption methods – Symmetric & Asymmetric 3.Two different protocols PJB_ServerPJB_Secure

PaJoBe_Server PJB_Server    PuK-request PuK-answer (  ) user: Benny pwd: CSCI360 user: Benny pwd: 8a9ds7f76adsf6adas879fsad  9ads87fz7asdb6fadfs b89adbfasf8as6bf879ands6f a7s6dbf87asfb8  Msg(user, pwd,  )      Auth-answer(  (CL)or  )  Authentication (  or  )  user: Benny pwd: 8a9ds7f76adsf6adas879fsad

PaJoBe_Secure Session invitation (sec.level, sessionKey  )   confirmation      Randomly gen. Session key  PJB_Secure   message  Button pressed acknowledgement Sec.level = high: 3 way handshake  

Product presentation Thanks for your attention. Questions are very welcome.

Product presentation There is no need to reinvent communism for security needs.