Your SlideShare is downloading. ×
  • Like
Internet Authentic. Ecosystem “a la Russe”
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Internet Authentic. Ecosystem “a la Russe”

  • 114 views
Published

There is a new concept of building the systems of legally significant public communications.

There is a new concept of building the systems of legally significant public communications.

Published in Technology , Economy & Finance
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
114
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. sterile area
  • 2. VRR
  • 3. Dynamic Identification
  • 4. • pseudonym• unique dynamic code• set of obligatory requisites• set of users requisites
  • 5. • BigMax15• 6DF73AC747 EFD370…• 19.10.2011 multiple ……• limit=$250 ……
  • 6. Primaryarchive
  • 7. Primaryarchive
  • 8. s
  • 9. PUBLIC FRIENDS ONLY FAMILY ONLY BANK ONLY ME ONLY DESCENDANTS ONLY
  • 10. Relatives ColleaguesBusiness-partners ICQ Skype SMS E-mail POST OFFICE
  • 11. Complementary (logical) protection schemes during every new session the user proves the legitimacyof the previous one; the user is notified about all major activities fromindependent channels chosen by him- or herself; for the conduction of important operations a quarantineperiod is introduced between the moment of giving thecommand and its implementation (during this time theusers in question can get all the information about theforthcoming operation through other independentchannels and if necessary can block its implementation);
  • 12. Complementary (logical) protection schemes the used banking accounts have a limited list of paymentaddressees (therefore the intruder to the system will beunable to transfer money to his or her own account); ConsequenceThe toolbox the user is provided with will make him or herlegally accountable for the operations conducted in theelectronic environment with the help of VVR.
  • 13. Intermediate result
  • 14. Intermediate result we generated a sterile communication area, where communication subjects are represented by their virtual robot-residents (VRR); we gave users a convenient identifiable assistant, which will perform many routine operations for its owner; we built a simple system of communications between robots;
  • 15. Intermediate result we localized the human factor having excluded any possibility to carry out illegal operations in the sterile area; we completely simplified user authentication during his contact with his VRR. we protected the user’s personal date in the system
  • 16. Internet Authentic Internet Free
  • 17. Thank you Nadya Onishchenko 08.02.nnn@gmail.com