Your SlideShare is downloading. ×
0
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Internet Authentic. Ecosystem “a la Russe”
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Internet Authentic. Ecosystem “a la Russe”

134

Published on

There is a new concept of building the systems of legally significant public communications.

There is a new concept of building the systems of legally significant public communications.

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
134
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. sterile area
  • 2. VRR
  • 3. Dynamic Identification
  • 4. • pseudonym• unique dynamic code• set of obligatory requisites• set of users requisites
  • 5. • BigMax15• 6DF73AC747 EFD370…• 19.10.2011 multiple ……• limit=$250 ……
  • 6. Primaryarchive
  • 7. Primaryarchive
  • 8. s
  • 9. PUBLIC FRIENDS ONLY FAMILY ONLY BANK ONLY ME ONLY DESCENDANTS ONLY
  • 10. Relatives ColleaguesBusiness-partners ICQ Skype SMS E-mail POST OFFICE
  • 11. Complementary (logical) protection schemes during every new session the user proves the legitimacyof the previous one; the user is notified about all major activities fromindependent channels chosen by him- or herself; for the conduction of important operations a quarantineperiod is introduced between the moment of giving thecommand and its implementation (during this time theusers in question can get all the information about theforthcoming operation through other independentchannels and if necessary can block its implementation);
  • 12. Complementary (logical) protection schemes the used banking accounts have a limited list of paymentaddressees (therefore the intruder to the system will beunable to transfer money to his or her own account); ConsequenceThe toolbox the user is provided with will make him or herlegally accountable for the operations conducted in theelectronic environment with the help of VVR.
  • 13. Intermediate result
  • 14. Intermediate result we generated a sterile communication area, where communication subjects are represented by their virtual robot-residents (VRR); we gave users a convenient identifiable assistant, which will perform many routine operations for its owner; we built a simple system of communications between robots;
  • 15. Intermediate result we localized the human factor having excluded any possibility to carry out illegal operations in the sterile area; we completely simplified user authentication during his contact with his VRR. we protected the user’s personal date in the system
  • 16. Internet Authentic Internet Free
  • 17. Thank you Nadya Onishchenko 08.02.nnn@gmail.com

×