Download presentation
Presentation is loading. Please wait.
Published byHalie Busbey Modified over 10 years ago
1
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center
2
So whats wrong with the Internet!! (Nothing???) Its almost free! Anyone can use it (no permissions required for accessing it!) Its available and pervasive (almost everywhere now) Anyone can create any website, put any content, on any server, with any IP address with absolutely NO GOVERNMENT CONTROL! Its freedom and democracy at its best!
3
www.uniken.com The Inter-network A US Defense (DARPA) initiative that was commercialized and adopted (blindly) by the mainstream enterprises Source: Wikipedia
4
4 © Copyright 2010 UNIKEN Inc. All rights reserved www.uniken.com
5
The Trust (?) Model Hardware [PC/Mobile/Tablets] Operating Systems Browsers [APP-Viewers] DNS [Server Location] Certification Authority Ecosystem [Server Identity] TCP/IP {or UDP} [Data Transport] User Identity [Login/Password/ OTP/Biometric]
6
Service and User Categorization on the Internet www.uniken.com Services that DO NOT require security and privacy/secrecy Users who do not care for privacy or security Services that require security and privacy Users who CARE about Privacy and Secrecy
7
The current Internet Application Model is Broken. Period. No matter what you do on top of it, it will remain vulnerable to attacks if it is used for services that it was never designed for!
8
THE FUNDAMENTAL PROBLEM The current internet/intranet (TCP/IP or UDP) based client-server application model does not provide a trusted ecosystem for authenticated communication between the client and server (or Application to Application authentication and secrecy)
9
IS IT TIME TO RELOOK AT THE BASIC COMPUTING TECHNOLOGIES THAT CAN CATER TO SPECIFIC NEEDS ARISING OUT OF HIGH SECURITY COMPUTING APPLICATIONS? DO WE NEED A RADICALLY NEW APPROACH TO CREATE A NEXT GENERATION HIGH-SECURITY COMPUTING INFRASTUCTURE?
10
What if there was a way to create a Private Application Ecosystem which enabled hi-touch and ubiquitous user experience across devices over a massively scalable Private Communication Channels/Circuits with End-to-End Military Grade Security?
11
REL-ID ECO: A SECURE PRIVATE APPLICATION ECOSYSTEM
13
The REL-ID ECO - Secure Private Application Ecosystem - is a closed ecosystem wherein the applications (services), enterprise data, devices and underlying communication within this ecosystem are completely private, secure and not accessible (or even visible) to the outside world. Only authorized users, applications and devices can have access to this Private Application Ecosystem. The REL-ID ECO - Secure Private Application Ecosystem - is a closed ecosystem wherein the applications (services), enterprise data, devices and underlying communication within this ecosystem are completely private, secure and not accessible (or even visible) to the outside world. Only authorized users, applications and devices can have access to this Private Application Ecosystem. [Note: This break-through technology has been developed and patented, over several years of R&D in the UNIKEN INNOVATION CENTER].
15
Private Application Ecosystem
17
Private Communication Circuit
19
App-Viewer Desktop/Laptop APPS/Widgets Enterprise HTML5 Quick Apps
20
HYBRID APP TECHNOLOGY Tablets/Smart Phones Device Binding 2-Factor Authentication Containerization Always On Mutual Authentication MITM Proof Encrypted Channels Location Based Services
21
DATE | 03042013 TIME | 0030HRS Special Purpose Secure Enterprise Computing Appliance Biometric Authentication (optional) Additional Smart Card Authentication (optional)
22
Memory device with an invisible secure space. Secure data storage. With the rise in security threats related to theft of critical enterprise information the need for a high-performance portable secure memory device is quite evident. Unikens innovation center has developed a secure memory device which ensures that sensitive high-value data and applications are protected. REL-ID SECURE PORTABLE MEMORY DEVICE
23
INDIA PRIVATE (SECURE) INTERNET! A CLOSED PRIVATE APPLICATION ECOSYSTEM FOR CRITICAL NATIONAL ASSETS AND ENTERPRISES
24
MEET US AT THE UNIKEN BOOTH IF YOU WANT TO KNOW MORE, OR EVEN IF YOU DISAGREE WITH US! IN EITHER CASE WE WOULD LIKE TO TALK TO YOU. THANK YOU!
25
Secure Private Application Ecosystem Container Secure App-Viewer Mutually-Authenticated, Encrypted & Tunneled Pipe Secure Data Store Device Signature Device 3 rd Party Apps OS 2FA/3FA RELIDGATERELIDGATE RELIDGATERELIDGATE REL-ID ECO PLATFORM REL-ID ECO PLATFORM Enterprise Application Data Center Enterprise Application Data Center Desktops/Laptops/Tablets/SmartPhones [Windows, iOS, Android, MacOS, Linux] Command Center Private Communication Channel/Circuit [Internet/Intranet]
26
REL-ID Private Communication Channel (R-PCC) Mutually Authenticated Communication Handshake (MITM Proof) Encrypted Communication (optional), High-Speed and Concurrent Horizontally Scalable (Millions of End-Points) Assets behind R-PCC are not visible to the Internet and hence protected from various attacks Requires zero admin privileges on end-user devices Is created ON-DEMAND Is agnostic to the underlying NETWORK (Internet or Intranet) RPCC Agent can be embedded in any third party application stack (both software and firmware) Network Application REL-ID PCC Agent R-PCC (REL-ID Mutually Authenticated and Encrypted Channel) Internet or Intranet
27
Secure Private Communication Circuit/Channel (Internet and Intranet) RELID GATERELID GATE RELID GATERELID GATE Massively Scalable Secure Private Communication Circuit/Channel Applications/Services on this channel are NOT visible and accessible outside of this channel/circuit The end-users could be customers, employees and partners The devices could be laptops/desktops, mobile phones, tablets This enables a closed, controlled, highly secure private ecosystem Massively Scalable Secure Private Communication Circuit/Channel Applications/Services on this channel are NOT visible and accessible outside of this channel/circuit The end-users could be customers, employees and partners The devices could be laptops/desktops, mobile phones, tablets This enables a closed, controlled, highly secure private ecosystem Enterprise Services Third Party Services Third Party Services REL-ID ECO PLATFORM REL-ID ECO PLATFORM Command Center Device
28
REL-ID GATE App Management Identity Management Device Management Authentication (2FA/3FA) Access Management R-PCC* Over Intranet R-PCC* Over Internet Secure Channel Enterprise Web-Apps [ Virtual Image ] Enterprise Mobile Apps 3 rd Party Web-Apps [Virtual Image] 3 rd Party Mobile Apps Command Center Secure Channel Employee Partner Customer REL-ID Widget (Secure Client App Container) Mobile Phones, Tablets, Desktops and Laptops *R-PCC: REL-ID Private Communication Channel (Encrypted) THE REL-ID ECO TM Internet Private Data Center
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.