Wisekeydalian2011presentation

696 views
628 views

Published on

WISekey World Economic Forum presentation

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
696
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wisekeydalian2011presentation

  1. 1. Participation With No Protection Snow White ↸ Lives in the Old Woods ♥ Single Born Once Upon A Time Apples, Walking in the Woods“Someone, somewhere knows whoyou are… because of the way yousurf… should ‘they’ really be able toknow so much about you?” – Mark Haines introducing Carlos Moreira on CNBC segment The Right to Disappear, photo credit: Joe Shlabotnik, Flickr 3 May 2011Images are licensed under the Creative Commons, use should not suggest the artist endorses this work in any way.
  2. 2. Protection Allows Participation Personal Data Protection Point-to-point security is oint-to- • Individual control necessary for personal safety • Decentralized • Mobile and efficient business.Strong authentication Transactional Integrityof people, objects and • Safe data transferproducts physically and on • Secure paymentsnetworks 2011 Copyright WISeKey SA. All Rights Reserved.
  3. 3. Safe Participation Supports Growth Secure technologies support growth through communications and transactions, without compromising trust and privacy. photo credit: @gueamu, Flickr photo credit: JD Hancock, FlickrImages are licensed under the Creative Commons, use should not suggest the artist endorses this work in any way.

×