Guard time connect_estonia 21.03.2012

901 views
712 views

Published on

Raul Vahisalu slideshow about Guardime, international teams and business development.

Published in: Business, Travel
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
901
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
27
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Endast rääkida
  • Financing process, 8mUSD in 2010
  • Ämbrite viisi teed joonudKazakhstan v. Saudi power games, äri teha endasugustegaMentaalne kaugus, ei usu ärisse kus ise kohal ei oleKiirus, vaeva nägemineFacilitors, facilitating
  • Mida teeme? – eriliste toodete müük, eriprojektid, milles puudub konkurents
  • Guard time connect_estonia 21.03.2012

    1. 1. © 2011. Copyright GuardTime. All Rights Reserved.Raul.Vahisalu@GuardTime.com General Manager Estonia 21.03.2012
    2. 2. GuardTimeProof of time, origin and integrity for the world’s electronic data Founded in Estonia in 2006 IP of Estonian scientists Ahto Buldas and Märt Saarepera Accredited timestamping service provider in EU since 2007 Financed by ASI, Brother, Singaporean Government and Hong Kong based Horizons Ventures © 2011. Copyright GuardTime. All Rights Reserved. Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San Diego
    3. 3. Hash Functions GuardTime’s technology is based on cryptographic hash functions HASH VALUE HASH AXSJ76SNWCRVRVL INPUT DATA FFAONRDNZG4VUS FUNCTION U2HAS7DJWZR2U ONE-WAY ONLY © 2011. Copyright GuardTime. All Rights Reserved. REVERSE CALCULATION NOT POSSIBLE 3
    4. 4. When trust is not enough 4 © 2011. Copyright GuardTime. All Rights Reserved.
    5. 5. When trust is not enough TIME 5 © 2011. Copyright GuardTime. All Rights Reserved.
    6. 6. Keyless Signatures: How It Works Enable any Sign the event Signatures are Receive a system or logs, backups, mathematically © 2011. Copyright GuardTime. All Rights Reserved. signature for environment to archives, other verifiable for each data item use Keyless data and the life of the signed Signatures applications dataWhen trust is not enough 6
    7. 7. When trust is not enough 7 © 2011. Copyright GuardTime. All Rights Reserved.
    8. 8. Prove This Didn’t Happen Does your proof require that someone trust you? • ‘Cleaning up’ the application and system logs Accidental • ‘Fixing’ the backups and archives (admin) • Checking in untested applications • Removing application and system log entries Intentional • Changing database records (admin) • Adjusting application and system configurations © 2011. Copyright GuardTime. All Rights Reserved. • Removing log entries Malicious • Changing database records (hacker) • Inserting new code into the operating environmentWhen trust is not enough 8
    9. 9. Use Case: Auditable Scan-To-Server Signing capabilities are embedded directly into the multi-functional printer Documents are signed after scanned and converted to PDF The signature is embedded within the PDF Signed PDF documents are stored on the server Recipients of the documents can verify the signature of the documents from within the scanned PDF © 2011. Copyright GuardTime. All Rights Reserved. Provides proof of origin (e.g. which scanner), time and content for the stored documentsWhen trust is not enough 9
    10. 10. International team Business is done by people! Our group CEO flight mileage last year - 250000 0900-1700 Tallinn time +9h/-8h ~10 different nationalities Negotiation and communication style Work ethic, command of languages Politics, religion, women, alcohol © 2011. Copyright GuardTime. All Rights Reserved.When trust is not enough 10
    11. 11. Research & development R&D is in Tallinn, Estonia Top of the technology pyramid Serendipity-led R&D Can innovation be outsourced? What is innovation? Accountability to investors © 2011. Copyright GuardTime. All Rights Reserved. Test-site EstoniaWhen trust is not enough 11
    12. 12. Sales What do you sell? Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear Naive, Pragmatic, Strategic IP Obstacles Not invented here Nice to have but not compulsory (through legislation) © 2011. Copyright GuardTime. All Rights Reserved. Too new, too disruptive for me Technology push v. Market pull „GuardTime is not a technology problem, its a marketing problem“When trust is not enough 12
    13. 13. Business model GuardTime is sold as a monthly subscription service based on volume (Transactions/Second) shared with partners and downstream channel Estonia as a test site for the world Cooperation agreement with the Estonian Government for a service free of charge In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion... © 2011. Copyright GuardTime. All Rights Reserved.When trust is not enough 13
    14. 14. Orwell 1984 Big Brother Doublethink Thoughtcrime Newspeak © 2011. Copyright GuardTime. All Rights Reserved. Memory holeWhen trust is not enough 14
    15. 15. © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough Thank You!Email: raul.vahisalu@guardtime.com

    ×