PUBLIC FRIENDS ONLY FAMILY ONLY BANK ONLY ME ONLY DESCENDANTS ONLY
Relatives ColleaguesBusiness-partners ICQ Skype SMS E-mail POST OFFICE
Complementary (logical) protection schemes during every new session the user proves the legitimacyof the previous one; the user is notified about all major activities fromindependent channels chosen by him- or herself; for the conduction of important operations a quarantineperiod is introduced between the moment of giving thecommand and its implementation (during this time theusers in question can get all the information about theforthcoming operation through other independentchannels and if necessary can block its implementation);
Complementary (logical) protection schemes the used banking accounts have a limited list of paymentaddressees (therefore the intruder to the system will beunable to transfer money to his or her own account); ConsequenceThe toolbox the user is provided with will make him or herlegally accountable for the operations conducted in theelectronic environment with the help of VVR.
Intermediate result we generated a sterile communication area, where communication subjects are represented by their virtual robot-residents (VRR); we gave users a convenient identifiable assistant, which will perform many routine operations for its owner; we built a simple system of communications between robots;
Intermediate result we localized the human factor having excluded any possibility to carry out illegal operations in the sterile area; we completely simplified user authentication during his contact with his VRR. we protected the user’s personal date in the system