SlideShare a Scribd company logo
1 of 13
Universal Identity
Trusted Micro-Networking
Exclusive Digital Asset Ownership
ENT
1All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
Timothy Mossbarger
Serial Inventor & Entrepreneur
BS in Computer Science & Engineering, USC
Former USAF Captain & Nuclear Launch Officer
2
INTRODUCTION TO ENT
Why can’t digital trust be as strong
as the nuclear launch protocols
I use when I’m on duty?
12 years ago, Tim asked
himself a simple question:
And ENT was born.
From Nuclear Launch Codes To Trust Technology
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
3
In 15 Years, People Will Look Back And Wonder…
“How was there
ever a time when
an automobile’s
critical infrastructure
was hackable?”
Microcontrollers in car
cooperate to maintain
exponentially stronger
security of the vehicle
than existing methods
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
4
In 15 Years, People Will Look Back And Wonder…
“How was there
ever a time when
a person’s
medical records
weren’t in their
direct control at
all times?”
“I decide where my records
are stored, who has access,
for how long, and whether
they must sign my terms of
service agreement.”
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
5
In 15 Years, People Will Look Back And Wonder…
“How was there
ever a time when
counterfeit
goods could
be mistaken
for legitimate
goods?”
COMPONENTS ARE
AUTHENTIC
=
NOT COUNTERFEIT
body.camera
Manufacturer: Cam LTD
Plant: Nanking.China.cltd
Employee: HanLi.cltd
lens.camera
Manufacturer: Lens LTD
Plant: Beijing.China.lltd
Employee: ChowYun.lltd
shutter.camera
Manufacturer: Cam LTD
Plant: Nanking.China.cltd
Employee: AiShen.cltd
cmos.camera
Manufacturer: CMOS2
Plant: Taiwan.China.cmos2
Employee: ChoWan.cmos2
bios.camera
Manufacturer: Bios LTD
Plant: Shenzhen.China.bltd
Employee: FenGong.bltd
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
6
In 15 Years, People Will Look Back And Wonder…
“How was there ever a time when
we couldn’t exclusively
own, lease, or sell our
digital assets & data like
physical property?”
MARKETING DATA LEASE
Smart Meter (Gas – 6 Months)
Thermostat Data (6 Months)
Grocery Purchases (6 Months)
MARKETING DATA PURCHASE
3D Printing Designs (2)
$$$
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
$
$
$ $
$
$
7
Scalable digital safety
in critical systems:
industry, auto, military.
Our Trust Technology Makes These Possible - Today
Patient owned
medical records.
Comprehensive
anti-counterfeiting -
digital & physical.
Digital property
economy – trillions in
new market value.
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
8
ENT: Trust Technology For Dynamic, Complex Systems
State-Of-The-Art,
Next-Gen Trust Platform
ENT is a core enabling technology –
not a product or service.
ENT is decentralized, and eliminates
passwords, key management &
centralized data storage.
ENTITY NETWORK TRANSLATION Universal, Durable Identity
“I always know who I’m transacting with.”
Trusted Micro-Networking
“I permit a direct trusted connection only
with you and with no other party involved.”
True Digital Asset Ownership
“My digital assets are exclusively mine and
transferable – just like physical property.”
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
9
ENT Features Example - Private Medical Records
Universal Identity
Alice.ent Medical.Alice.ent
Alice’s medical record has a
unique, universal, & unspoofable
identity that is also a secure
address. Her record is reachable
anywhere she decides to store it.
Trusted Micro-Networking
Alice has exclusive control of her
medical record. Alice permits
her doctor to have direct access
to her medical record - under her
own terms and time limit.
Digital Asset Ownership
Alice has exclusive ownership
of her medical record. In the
event of serious injury or death,
she has set the ownership to
transfer to her husband.
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
10
Relational Key
Infrastructure (RKI)
First patent with ideal claims
issued in South Korea.
Multiple international jurisdictions
& commercially relevant markets.
IP portfolio will expand to 30+
high-quality claims over 24 months.
12 PATENTS PENDING
Decentralized Universal ID
Identity is continuous, durable and strong
in decentralized systems.
ENT Is Built On A Crypto-System Breakthrough
Stronger At Scale, Not Weaker
Relational key model means that systems
get stronger and more resilient at scale.
+
First Innovation In 30 Years
Relational key model is the first digital identity
innovation since PKI & passwords – and is
better than both in strength and capability.
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
11
IIoT Security - $29B
IIoT Data Services - $300B
Industrial Internet of Things (IoT) is
critical infrastructure, hard to protect.
High-risk, cyber-physical systems need
secure actuation and data assurance.
Fortune 500s, well-capitalized, in need
of strong, foundational solutions.
MARKET FOCUS: INDUSTRIAL IoT
Market Size For Identity, Trusted Transactions, Ownership
ENT’s native, groundbreaking capabilities are a direct,
more effective replacement for trust methods like PKI
and blockchain and impact many large markets.
Identity & Access Management (IdAM) $18.3B
Digital ownership economy
(Data, assets, commodities like bandwidth, currency)
Unknown Amount
of New Value
Cloud Storage $65.41B
Software-Defined Networking (SDN) $45.12B
Content Distribution Networks (CDN) $15.73B
Connected Cars $141B
Anti-Counterfeiting (US Only) $225B
Market sizes estimated for 2020 by MarketsAndMarkets
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
12
ENT: Core Enabling Technology, Transformational Impact
ENT is a digital identity & trusted
networking breakthrough –
a 30-year innovation, with strong IP.
ENT is in a very select category of
global-scale software technologies
that can provide foundational trust:
Passwords, PGP, PKI, blockchain.
ENT is exponentially stronger, more
resilient, and more broadly useful than
all of them - creating new digital system
paradigms & enormous new markets.
Core Technology Is Very Rare
 Groundbreaking approach
 Transformational impact across
many existing $Bn industries
(basically any computerized or
networked system)
 Creates brand new $Bn digital
asset ownership markets
 Designed to become a global,
well-governed open standard
ENT changes the approach to
trusted digital systems, with an
impact as big as the Internet.
INTRODUCTION TO ENT
All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
www.ent.net
Business Development
Toll Free 844.837.4696 ~ inquire@ent.net
F O R I N Q U I R I E S , P L E A S E C O N T A C T
13All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.

More Related Content

What's hot

Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Alex G. Lee, Ph.D. Esq. CLP
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsJorge Sebastiao
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios AMETIC
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentAlex G. Lee, Ph.D. Esq. CLP
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
Blockchain software development services
Blockchain software development servicesBlockchain software development services
Blockchain software development servicesSaratechnology
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
Internet of things 14-dec2013
Internet of things 14-dec2013Internet of things 14-dec2013
Internet of things 14-dec2013Lounge47
 
Iot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programsIot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programsMarket Engel SAS
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Darek Czuchaj
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing SectorSuradhaIyer
 
IoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative AnalysisIoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative AnalysisAlex G. Lee, Ph.D. Esq. CLP
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) Deloitte United States
 

What's hot (20)

Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
 
AI and Blockchain
AI and BlockchainAI and Blockchain
AI and Blockchain
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Practical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threatsPractical analytics hands-on to cloud & IoT cyber threats
Practical analytics hands-on to cloud & IoT cyber threats
 
AI and Blockchain Applications for Patents
AI and Blockchain Applications for PatentsAI and Blockchain Applications for Patents
AI and Blockchain Applications for Patents
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios La Inteligencia Artificial aplicada en los negocios
La Inteligencia Artificial aplicada en los negocios
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System Development
 
Insights Success 20 Most Valuable IT Service Companies
Insights Success  20 Most Valuable IT Service CompaniesInsights Success  20 Most Valuable IT Service Companies
Insights Success 20 Most Valuable IT Service Companies
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
Blockchain software development services
Blockchain software development servicesBlockchain software development services
Blockchain software development services
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
Internet of things 14-dec2013
Internet of things 14-dec2013Internet of things 14-dec2013
Internet of things 14-dec2013
 
Iot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programsIot security requirements will reshape enterprise it security programs
Iot security requirements will reshape enterprise it security programs
 
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 
IoT
IoTIoT
IoT
 
IoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative AnalysisIoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 

Viewers also liked

Viewers also liked (9)

The Human Ear and Sound
The Human Ear and SoundThe Human Ear and Sound
The Human Ear and Sound
 
Anatomy of ear
Anatomy of earAnatomy of ear
Anatomy of ear
 
Diseases of external ear
Diseases of external earDiseases of external ear
Diseases of external ear
 
The human ear
The human earThe human ear
The human ear
 
Anatomy and physiology of ENT organs
Anatomy and physiology of ENT organsAnatomy and physiology of ENT organs
Anatomy and physiology of ENT organs
 
Anatomy and physiology of the ear
Anatomy and physiology of the earAnatomy and physiology of the ear
Anatomy and physiology of the ear
 
Ear parts and its function
Ear parts and its functionEar parts and its function
Ear parts and its function
 
Ear Anatomy
Ear AnatomyEar Anatomy
Ear Anatomy
 
Anaesthesia machine
Anaesthesia machineAnaesthesia machine
Anaesthesia machine
 

Similar to Introduction to ENT (Entity Network Translation)

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015bmcmenemy
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Cool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityCool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityAndrew Goldsmith
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...Alexandra Deschamps-Sonsino
 
Partner event tibco patterns 2011-10-12
Partner event   tibco patterns 2011-10-12Partner event   tibco patterns 2011-10-12
Partner event tibco patterns 2011-10-12Lakshmi Srikanth Reddy
 
Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...Pietro Leo
 
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...David Terrar
 
Top 5 real world applications of blockchain
Top 5 real world applications of blockchain Top 5 real world applications of blockchain
Top 5 real world applications of blockchain Blockchain Council
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
Regulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRegulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRajesh Chitharanjan
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsSplunk
 

Similar to Introduction to ENT (Entity Network Translation) (20)

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Cool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityCool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland Security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...Artificially Intelligent: or why we always knew we'd be talking about this at...
Artificially Intelligent: or why we always knew we'd be talking about this at...
 
Artificially intelligent
Artificially intelligentArtificially intelligent
Artificially intelligent
 
Partner event tibco patterns 2011-10-12
Partner event   tibco patterns 2011-10-12Partner event   tibco patterns 2011-10-12
Partner event tibco patterns 2011-10-12
 
Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...Cognitive Computing: Challenges and opportunities in Building an Artificial I...
Cognitive Computing: Challenges and opportunities in Building an Artificial I...
 
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
Blockchain, IoT and AI are foundational to the Fourth Industrial Revolution -...
 
Top 5 real world applications of blockchain
Top 5 real world applications of blockchain Top 5 real world applications of blockchain
Top 5 real world applications of blockchain
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Regulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRegulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent Need
 
Driving secureiot innovation
Driving secureiot innovationDriving secureiot innovation
Driving secureiot innovation
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Introduction to ENT (Entity Network Translation)

  • 1. Universal Identity Trusted Micro-Networking Exclusive Digital Asset Ownership ENT 1All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 2. Timothy Mossbarger Serial Inventor & Entrepreneur BS in Computer Science & Engineering, USC Former USAF Captain & Nuclear Launch Officer 2 INTRODUCTION TO ENT Why can’t digital trust be as strong as the nuclear launch protocols I use when I’m on duty? 12 years ago, Tim asked himself a simple question: And ENT was born. From Nuclear Launch Codes To Trust Technology All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 3. 3 In 15 Years, People Will Look Back And Wonder… “How was there ever a time when an automobile’s critical infrastructure was hackable?” Microcontrollers in car cooperate to maintain exponentially stronger security of the vehicle than existing methods INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 4. 4 In 15 Years, People Will Look Back And Wonder… “How was there ever a time when a person’s medical records weren’t in their direct control at all times?” “I decide where my records are stored, who has access, for how long, and whether they must sign my terms of service agreement.” INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 5. 5 In 15 Years, People Will Look Back And Wonder… “How was there ever a time when counterfeit goods could be mistaken for legitimate goods?” COMPONENTS ARE AUTHENTIC = NOT COUNTERFEIT body.camera Manufacturer: Cam LTD Plant: Nanking.China.cltd Employee: HanLi.cltd lens.camera Manufacturer: Lens LTD Plant: Beijing.China.lltd Employee: ChowYun.lltd shutter.camera Manufacturer: Cam LTD Plant: Nanking.China.cltd Employee: AiShen.cltd cmos.camera Manufacturer: CMOS2 Plant: Taiwan.China.cmos2 Employee: ChoWan.cmos2 bios.camera Manufacturer: Bios LTD Plant: Shenzhen.China.bltd Employee: FenGong.bltd INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 6. 6 In 15 Years, People Will Look Back And Wonder… “How was there ever a time when we couldn’t exclusively own, lease, or sell our digital assets & data like physical property?” MARKETING DATA LEASE Smart Meter (Gas – 6 Months) Thermostat Data (6 Months) Grocery Purchases (6 Months) MARKETING DATA PURCHASE 3D Printing Designs (2) $$$ INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 7. $ $ $ $ $ $ 7 Scalable digital safety in critical systems: industry, auto, military. Our Trust Technology Makes These Possible - Today Patient owned medical records. Comprehensive anti-counterfeiting - digital & physical. Digital property economy – trillions in new market value. INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 8. 8 ENT: Trust Technology For Dynamic, Complex Systems State-Of-The-Art, Next-Gen Trust Platform ENT is a core enabling technology – not a product or service. ENT is decentralized, and eliminates passwords, key management & centralized data storage. ENTITY NETWORK TRANSLATION Universal, Durable Identity “I always know who I’m transacting with.” Trusted Micro-Networking “I permit a direct trusted connection only with you and with no other party involved.” True Digital Asset Ownership “My digital assets are exclusively mine and transferable – just like physical property.” INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 9. 9 ENT Features Example - Private Medical Records Universal Identity Alice.ent Medical.Alice.ent Alice’s medical record has a unique, universal, & unspoofable identity that is also a secure address. Her record is reachable anywhere she decides to store it. Trusted Micro-Networking Alice has exclusive control of her medical record. Alice permits her doctor to have direct access to her medical record - under her own terms and time limit. Digital Asset Ownership Alice has exclusive ownership of her medical record. In the event of serious injury or death, she has set the ownership to transfer to her husband. INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 10. 10 Relational Key Infrastructure (RKI) First patent with ideal claims issued in South Korea. Multiple international jurisdictions & commercially relevant markets. IP portfolio will expand to 30+ high-quality claims over 24 months. 12 PATENTS PENDING Decentralized Universal ID Identity is continuous, durable and strong in decentralized systems. ENT Is Built On A Crypto-System Breakthrough Stronger At Scale, Not Weaker Relational key model means that systems get stronger and more resilient at scale. + First Innovation In 30 Years Relational key model is the first digital identity innovation since PKI & passwords – and is better than both in strength and capability. INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 11. 11 IIoT Security - $29B IIoT Data Services - $300B Industrial Internet of Things (IoT) is critical infrastructure, hard to protect. High-risk, cyber-physical systems need secure actuation and data assurance. Fortune 500s, well-capitalized, in need of strong, foundational solutions. MARKET FOCUS: INDUSTRIAL IoT Market Size For Identity, Trusted Transactions, Ownership ENT’s native, groundbreaking capabilities are a direct, more effective replacement for trust methods like PKI and blockchain and impact many large markets. Identity & Access Management (IdAM) $18.3B Digital ownership economy (Data, assets, commodities like bandwidth, currency) Unknown Amount of New Value Cloud Storage $65.41B Software-Defined Networking (SDN) $45.12B Content Distribution Networks (CDN) $15.73B Connected Cars $141B Anti-Counterfeiting (US Only) $225B Market sizes estimated for 2020 by MarketsAndMarkets INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 12. 12 ENT: Core Enabling Technology, Transformational Impact ENT is a digital identity & trusted networking breakthrough – a 30-year innovation, with strong IP. ENT is in a very select category of global-scale software technologies that can provide foundational trust: Passwords, PGP, PKI, blockchain. ENT is exponentially stronger, more resilient, and more broadly useful than all of them - creating new digital system paradigms & enormous new markets. Core Technology Is Very Rare  Groundbreaking approach  Transformational impact across many existing $Bn industries (basically any computerized or networked system)  Creates brand new $Bn digital asset ownership markets  Designed to become a global, well-governed open standard ENT changes the approach to trusted digital systems, with an impact as big as the Internet. INTRODUCTION TO ENT All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.
  • 13. www.ent.net Business Development Toll Free 844.837.4696 ~ inquire@ent.net F O R I N Q U I R I E S , P L E A S E C O N T A C T 13All information contained in this presentation is proprietary. Copyright ENT Technologies 2015. All Rights Reserved.