Mobile_Security_En

287 views

Published on

Secure communications 4 mobile market

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
287
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Mobile_Security_En

  1. 1. SECURE COMMUNICATION SERVICE Confidential information
  2. 2. About Company <ul><li>It was founded in 2005 by experts of cryptography and information security </li></ul><ul><li>Company holds licenses in the areas of cryptographic and technical information security </li></ul><ul><li>Company domain area is development of cryptographic security tools (hardware and software) </li></ul><ul><li>It provides the service of Certificate Authority for legitimate usage of electronic digital signature </li></ul>CRYPTOMACH Ltd.
  3. 3. Our Mission ̶ “Defended privacy” Communications security and confidentiality as a new service on the mobile communications market
  4. 4. Service Description <ul><li>Application of the reliable cryptography for securing of the information confidentiality and authenticity during the whole path of the information transmission between the end subscribers of mobile communication </li></ul>We offer a new service for the mobile communications market: « The Communication Channel with Guaranteed Security Level »
  5. 5. Service Capability “ Anti-corruption” implementation of “police function”, i.e. traffic monitoring ( on request only) Confidential Transmission of : <ul><ul><li>Data </li></ul></ul>Subscribers/Consumers authentication Data integrity control Keys generating and distribution by subscribers / consumers personally <ul><ul><li>Voice </li></ul></ul><ul><ul><li>Messages </li></ul></ul>
  6. 6. Service Components Subscriber’s secure mobile terminal that supports cryptographic functions ̶ ̶ it holds and use private keys and prevent unlicensed software usage Public Key Certification Authority ( PKI CA ) smartphone with installed security software (Cryptophone) Special SIM - card is the « third party » that ensures « trusting » to public keys of subscribers
  7. 7. Target Group Medium and Large enterprises concerned about business secrets confidentiality Remote Services Providers ensuring secure channel for e.g. financial transactions , medical consultations, remote control and usage of corporate resources and so on Law authorities and government officials with essential data access rights (at next step)
  8. 8. Project Stages 1. Pilot project : Software solution for Windows Mobile and Symbian smartphones enabling protected transmission of voice and data 2. Intermediate production solution : Authentication of the System subscribers by the public key certificates 3. Final solution : A hardware element usage ̶ a SIM - card is the secure key keeper
  9. 9. Benefits New value added service for corporate customers New customers through unique service offering New potential market entry: Information Leakage Detection and Protection (ILDP) New advantages of traditional cellular communications through secure services
  10. 10. Disadvantages of competitive solutions Special voice protection handsets are based on out-of-date models and have restricted functionality Entirely software solutions are weakly protected from unlicensed distribution and have weak secret keys protection Hardware-software solution based on special microSD “memory” card provide limited capabilities. ( http://www.secusmart.com/ ) Unreasonably high price ( about 2,5 – 3 K € ) $
  11. 11. Contacts Cryptomach Ltd. Central office : Akademika Proskury Str. , 1 kharkov , 61070, Ukraine Tel .: +38 0 (57) 315 - 44 - 70 E-mail: [email_address] Web: www.cryptomach.com DSCA Cryptomach (PKI CA) Chernyshevskaya Str. , 4 Kharkov , 61057, Ukraine Tel.: +380 (57) 766 - 33 - 77, 763 - 33 - 77 Fax: +380 (57) 706 - 20 - 87 E-mail: [email_address] Web: www.my-pki.com

×