Your SlideShare is downloading. ×
BioSlimDiskSignaturepresentation v2.2<br />RiTech International Ltd<br />Product (Signature) <br />Website: www.bioslimdis...
©  RiTech International Ltd, Confidential & Proprietary<br />2<br />WHY?<br />• Threat of data theft is real and costly<br...
How?<br />Physical theft and hacking<br />Actual device is stolen and tapped for data<br />Key Loggers<br />Passwords or a...
Securing Data<br />Signature can meet security challenges with<br />Tamper-proof with self-destruct function<br />Fingerpr...
The System Block Diagram<br />Processor<br />
1. Protecting Fingerprints<br /><ul><li>Dual-finger authentication
Reduces latent fingerprint copy
Intruder requires 2 unique fingerprints
Limiting fingerprint retries
Intruder has less time to guess correct fingerprint
Limits tries and time for correct fingerprint</li></ul>©  RiTech International Ltd, Confidential & Proprietary<br />6<br />
2. Hardware Benefits<br />AES-128bit hardware encryption<br />Keys never leave Signature<br />Avoids tapping/snooping of k...
3.Safekeeping<br />Self Destruct Feature<br />Activated when tampering is detected<br />All data drive is destroyed<br />K...
4. Convenience<br />Anti-static rubberized casing<br />Hard to copy fingerprints on device<br />Less dust attraction to pr...
Upcoming SlideShare
Loading in...5
×

Signature Presentation(10062011) Vc 3 Full

335

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
335
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 1. Digital Signature Pairing ArchitectureDigital Signature Pairing between System Controller Processor &amp; Biometric Digital Signal ProcessorDigital Signature Pairing between System Controller Processor &amp; Encryption Engineer Processor2. ID Tag Sequencing Com ArchitectureAll transaction communication protocol between System Controller and Digital Signature Pairing processor are governed by ID TagverificationVerification CycleAuthentication CycleData Fetch Cycle3. System State Alert ArchitectureBiometric Fingerprint Authentication request upon Host System get intoHost System Hibernating ModeHost System Standby Mode
  • Enhance Dual (Multiple) Bio-fingerprint Authentication ArchitectureDual Biometric Fingerprint Authentication for successful access of memory spaceDual successfully Authentication within allowing time constraint &amp; permissible cycle
  • 1. Admin Enrollment DestructionUpon successful administrative re-enrollment AES key will be re-admitted with new random set with Flash memory formatting 2. Enhance Encryption Engine ArchitecturePayload fully protected by Advanced Enhance Security Architecture via 128bits Communication via non-continuous and fragmented random sequencingPrevent from accidentally or intentionally monitoring of transmission linePrevent from accidentally or intentionally read back via Flash reader engine3. Randomized Storage of Security Key ArchitectureUnique Encryption Keys with randomized storage spacePrevent smart user from retrieving encryption key form system
  • Destructive ArchitectureUpon detection of unmatched digital signature on some of the above critical phenomenonSystem Controller issue destructive command erasing data space memory or FAT memory
  • We believe with the above fully implemented or partially enhanced features, there will not be any compromises in the security access and information content stored within our USB based Bio-Signature Storage devices
  • Transcript of "Signature Presentation(10062011) Vc 3 Full"

    1. 1. BioSlimDiskSignaturepresentation v2.2<br />RiTech International Ltd<br />Product (Signature) <br />Website: www.bioslimdisk.com<br />Done by: Noel Heng<br />Date:10/06/2011<br />
    2. 2. © RiTech International Ltd, Confidential & Proprietary<br />2<br />WHY?<br />• Threat of data theft is real and costly<br />• Affects employees well-being<br />• Affects company’s brand equity<br />• Loss of productivity and credibility<br />• Loss of profits and sustainability<br />
    3. 3. How?<br />Physical theft and hacking<br />Actual device is stolen and tapped for data<br />Key Loggers<br />Passwords or access keys can be coaxed<br />Virtual hacking and theft<br />Popular method of data theft<br />Man-in-the-Middle attacks<br />Spying and snooping on communications<br />© RiTech International Ltd, Confidential & Proprietary<br />3<br />
    4. 4. Securing Data<br />Signature can meet security challenges with<br />Tamper-proof with self-destruct function<br />Fingerprint recognition (biometric)<br />Built-in AES-128 bit data encryption<br />Features to protect user identification<br />No passwords during usage<br />© RiTech International Ltd, Confidential & Proprietary<br />4<br />
    5. 5. The System Block Diagram<br />Processor<br />
    6. 6. 1. Protecting Fingerprints<br /><ul><li>Dual-finger authentication
    7. 7. Reduces latent fingerprint copy
    8. 8. Intruder requires 2 unique fingerprints
    9. 9. Limiting fingerprint retries
    10. 10. Intruder has less time to guess correct fingerprint
    11. 11. Limits tries and time for correct fingerprint</li></ul>© RiTech International Ltd, Confidential & Proprietary<br />6<br />
    12. 12. 2. Hardware Benefits<br />AES-128bit hardware encryption<br />Keys never leave Signature<br />Avoids tapping/snooping of keys<br />All data on drive is encrypted<br />Totally hardware-based<br />Resistant to software-based attacks<br />Security methods are encapsulated in hardware<br />© RiTech International Ltd, Confidential & Proprietary<br />7<br />
    13. 13. 3.Safekeeping<br />Self Destruct Feature<br />Activated when tampering is detected<br />All data drive is destroyed<br />Keeps confidential data out of reach<br />No backdoor access<br />No password or function to reset security<br />Only valid fingerprints are allowed access<br />© RiTech International Ltd, Confidential & Proprietary<br />8<br />
    14. 14. 4. Convenience<br />Anti-static rubberized casing<br />Hard to copy fingerprints on device<br />Less dust attraction to protect sensor<br />Cross platform compatibility<br />Driverless and no Software needed<br />Operatesin Windows, MAC, Linux, Solaris, etc.<br />© RiTech International Ltd, Confidential & Proprietary<br />9<br />
    15. 15. Anti-static rubberized casing<br />© RiTech International Ltd, Confidential & Proprietary<br />10<br />
    16. 16. Unique Service<br />Our technology is mature and battletested<br />Our company is the pioneer in this field<br />Quick response to security breaches<br />Product is constantly updated<br />Customization to end users<br />Security tokens, 3rd party software<br />© RiTech International Ltd, Confidential & Proprietary<br />11<br />
    17. 17. Summary of Features<br />Protecting Fingerprints<br />Hardware Benefits<br />Safe Keeping<br />Convenience<br />Worldwide registered patents<br />United Kingdom, Netherlands, Germany<br />China, Hong Kong, Singapore, Malaysia and many more.<br />© RiTech International Ltd, Confidential & Proprietary<br />12<br />
    18. 18. END<br />

    ×