Internet Authentic. Ecosystem “a la Russe”
Upcoming SlideShare
Loading in...5
×
 

Internet Authentic. Ecosystem “a la Russe”

on

  • 179 views

There is a new concept of building the systems of legally significant public communications.

There is a new concept of building the systems of legally significant public communications.

Statistics

Views

Total Views
179
Views on SlideShare
179
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Internet Authentic. Ecosystem “a la Russe” Internet Authentic. Ecosystem “a la Russe” Presentation Transcript

  • sterile area
  • VRR
  • Dynamic Identification
  • • pseudonym• unique dynamic code• set of obligatory requisites• set of users requisites
  • • BigMax15• 6DF73AC747 EFD370…• 19.10.2011 multiple ……• limit=$250 ……
  • Primaryarchive
  • Primaryarchive
  • s
  • PUBLIC FRIENDS ONLY FAMILY ONLY BANK ONLY ME ONLY DESCENDANTS ONLY
  • Relatives ColleaguesBusiness-partners ICQ Skype SMS E-mail POST OFFICE
  • Complementary (logical) protection schemes during every new session the user proves the legitimacyof the previous one; the user is notified about all major activities fromindependent channels chosen by him- or herself; for the conduction of important operations a quarantineperiod is introduced between the moment of giving thecommand and its implementation (during this time theusers in question can get all the information about theforthcoming operation through other independentchannels and if necessary can block its implementation);
  • Complementary (logical) protection schemes the used banking accounts have a limited list of paymentaddressees (therefore the intruder to the system will beunable to transfer money to his or her own account); ConsequenceThe toolbox the user is provided with will make him or herlegally accountable for the operations conducted in theelectronic environment with the help of VVR.
  • Intermediate result
  • Intermediate result we generated a sterile communication area, where communication subjects are represented by their virtual robot-residents (VRR); we gave users a convenient identifiable assistant, which will perform many routine operations for its owner; we built a simple system of communications between robots;
  • Intermediate result we localized the human factor having excluded any possibility to carry out illegal operations in the sterile area; we completely simplified user authentication during his contact with his VRR. we protected the user’s personal date in the system
  • Internet Authentic Internet Free
  • Thank you Nadya Onishchenko 08.02.nnn@gmail.com