SlideShare a Scribd company logo
RAJEEV GANDHI MEMORIAL COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous)
Affiliated to JNTUA – Anantapur, Approved by AICTE – New Delhi,
Accredited by NBA and NAAC with ‘A’ Grade – New Delhi
Nandyal – 518501, Kurnool (Dist.), A.P
DEPARTMENT OF
ELECTRONICS AND COMMUNICATION ENGINEERING
A Technical Report on
“i-TWIN TECHNOLOGY”
ESTD: 1995
Submitted By
AD.Chandra Mohan
(12095A0403)
CERTIFICATE
This is to certify that AD.CHANDRA MOHAN (12095A0403), of
B.TECH, E.C.E have carried out the Technical seminar report on “i-TWIN TECHNOLOGY”
under the esteemed guidance of Department for the fulfillment of the award of the BACHELOR
OF TECHNOLOGY in Electronics and Communication Engineering in R.G.M.C.E.T,
Nandyal (Affiliated to J.N.T.University, Anantapur) is a bonafied record of the work done by
me during the year 2011-2015.
Dr.D.SATYANARAYANA
HOD of E.C.E
CANDIDATE’S DECLARATION
I hereby declare that the report titled “i-TWIN TECHNOLOGY” submitted towards
completion of Technical Report in IV Year 2nd
Semester of B.Tech (ECE) at the Rajeev Gandhi
Memorial College of Engineering & Technology, Nandyal. Is an authentic record of my
original report and is prepared by me.
I have not submitted the matter embodied in this report for the award of any other degree
in any other institutions.
By
AD.CHANDRA MOHAN
Regd.No: 12095A0403
Place: Nandyal
Date:
ACKNOWLEDGEMENT
At the outset, we would like to express our sincere and grateful thanks to the management
of Rajeev Gandhi Memorial College of Engineering & Technology, under the leadership of
Dr.M. SANTHIRAMUDU, Chairman for providing us an opportunity to fulfill our aspirations.
Our special thanks to Dr. T. JAYACHANDRA PRASAD, Principal, Rajeev Gandhi
Memorial College of Engineering & Technology, for providing all the facilities and guidelines,
required for our academic pursuit.
Our special thanks to Dr. D. SATHYANARAYANA, Head of the Department (ECE),
Rajeev Gandhi Memorial College of Engineering & Technology, for providing all the
facilities and guidelines, required for our academic pursuit.
By
AD.CHANDRA MOHAN
12095A0403
ABSTRACT
A USB flash drive is a data storage device that consists of flash memory
with an integrated Universal Serial Bus (USB) interface. A Cloud Storage is also
a similar case where in the data is stored remotely and is accessed whenever
needed. But a drawback of this USB flash drives is its small size cause of
which it can easily be misplaced or lost. This is a particular problem if the data
it contains is sensitive and confidential. In Cloud Storages the data can be
stolen or misused if the username and password of an account to access the
storage is hacked by someone. There are many more drawbacks like limited
storage, no security, back up, temp files, no remote disable etc.
i-Twin is a 'limitless' secure USB device that enables users to access, edit
& share all their files & media between any two online computers anywhere in
the world. The only limit is the size of your computer’s hard drive. i-Twin is an
innovative solution that allows remote file access without the security and
privacy risks of the cloud and USB flash drives. It’s very easy to access as a
USB device and no special installation is required. i-Twin uses thoroughly
analyzed crypto protocols and algorithms(AES 256 bit encryption). It has
features like bi-directional file access, no temp files, remote disable, smart key
generation, password support and twin trust authentication.
CONTENTS
Chapter: 1. Introduction 1
1.1 History 2
Chapter: 2. Working of i-Twin 3
Chapter: 3. Features of i-Twin 4
Chapter: 4.Detailed authentication process 6
Chapter: 5. Comparison with other technologies
5.1 i-Twin vs USB 7
5.2 i-Twin vs Cloud storage 8
Chapter: 6.1 Advantages 9
6.2 Requirements 10
Conclusion 11
References 11
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 1
CHAPTER-1
INTRODUCTION
i-Twin is a revolutionary new file sharing and remote access device
brought to you by a company called i-Twin. It's like two ends of a cable,
without the cable. It's as simple to use as a flash drive. It’s literally plug and
play.
i-Twin can connect any two online computers anywhere in the world. i-
Twin enables you to have access to any or all of your home computer's files and
folders while you're on-the-go. Similarly, you can also use i-Twin to access to
any or all of your office computer's files and folders while on-the-go. There's no
in-built limit to the amount of storage you can access with i-Twin while you're
on-the-go. The only limit is the size of your hard drives. The only other "limit" is
the speed of your Internet connection. The faster it is, the better your
experience.
You can select files for accessing later on-the-go, or you can edit them
remotely, without the files leaving your computer. You can also back-up files to
your home or office computer while you're out on-the-go. It's so easy, it's
unbelievable.
Fig 1: i-Twin device
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 2
1.1 HISTORY
i-Twin was invented by an Indian named Lux Anantharaman. After
achieving a Bachelors degree in Electrical and Electronic Engineering from IIT
in Chennai and a Masters degree from IISc in Bangalore, Lux worked first as
an IT security researcher at the Institute of Systems Science, Singapore and
then as senior researcher at Kent Ridge Digital Labs and the Institute for
Infocomm Research. Lux specializes in PKI implementations, efficient digital
certificate revocations and usable security. Lux was pursuing a part-time MBA
at NUS Business School, Singapore, but put studies on hold because of
potential of i-Twin.
Lux Anantharaman (Founder and Designer)
Electrical and Electronics Engineering from
Chennai and a master’s degree from IISC in
Bangalore.
He says i-Twin is like the two ends of a cable,
without a cable.
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 3
CHAPTER-2
WORKING OF i-TWIN
Fig 2: How to use i-Twin
 When you connect i-Twin, you'll see a regular window pop-up, just as you
would if you plugged in a regular USB flash drive.
 Drag and drop files and folders into this window to share them - as many as
you want. Leave your computer with one half of i-Twin connected to it.
 Detach the other half of i-Twin and take it with you.
 Wherever you go, you can remotely access the shared files, simply by
plugging the half you are carrying into any online Windows computer,
anywhere.
 i-Twin allows you to transfer files to - or from - your home computer. Or
your office computer. Or your friend's, or your colleague's! i-Twin also allows
you to edit the shared files on a remote computer, while keeping them on
that remote computer, (no need to transfer those files before you edit them).
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 4
CHAPTER-3
FEATURES OF i-TWIN
 Like A Limitless Capacity Secure USB Drive
i-Twin allows you to securely access your entire hard drive. It's as
if you are carrying an access-key to all your files in a device that fits in
the palm of your hand. And unlike portable storage, i-Twin lets your data
stay safely at home (or in the office).
 Remotely edit shared files
Remotely edit any shared file from any location. i-Twin allows you
to keep a single version on one computer, with you and your chosen i-
Twin partner collaborating directly on this version. Say goodbye to
multiple versions of files flying around by email.
 Backup your data from anywhere
When you are on the road, you can use i-Twin to move copies of
files from your laptop to your home or office computer. If you are
traveling and taking lots of pictures, you can free up your SD card by
moving files onto your laptop and transferring them back home. It keeps
your data safe and secure.
 One-time cost. No fees, ever
Don't pay for cloud storage. Don't pay subscription fees for file
access. Don't get locked in. You have all the storage you need on your
computer and home hard drive. With i-Twin, share it and access it from
anywhere.
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 5
 Data Security
i-Twin doesn't store any data on itself. It just enables a secure connection
between two computers. Your remote data can only be accessed if you have
the physical i-Twin with you. Additionally, you can set up your i-Twin to
require a password. i-Twin includes a feature that allows you to remotely
disable the connection should you lose your remote i-Twin half. So you can
rest assured that your data is safe, even if you lose your i-Twin device. If you
have ever lost a portable memory device, you know that terrible feeling. We
want to make sure this never happens to you again. It even makes use of AES
(256 bit key encryption) in order to transfer the data from one computer to
another.
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 6
CHAPTER-4
DETAILED AUTHENTICATION PROCESS
 Before allowing any data transfer every i-Twin is authenticated by i-
Twins Twin Trust Services.
 All communications between the i-Twin are i-Twin Trust is secured using
industry strength HTTPs (RSA1024 bits, 128 bits RC4) protocol.
 After successful authentication by Twin Trust assist i-Twin to discover its
other half.
 After authentication with Twin Trust, two halves of i-Twin mutually
authenticated each other using pre-shared AES 256 bit crypto key.
 If password is set, then verification is performed on both i-Twins before
data transfer is initiated.
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 7
CHAPTER-5
COMPARISION WITH OTHER TECHNOLOGIES
5.1 i-Twin vs USB
i-Twin USB
Price
$ 99. $120 (approx.) for 64GB.
Capacity Access to computer's entire
hard drive & any attached
storage.
2GB to 256GB (depending on
model).
Remote Disable If you lose one half, you
can remotely disable it.
If you lose the device, you lose
and expose your data.
Data Encryption
AES 256-bit.
Standard USB devices don't
support encryption. Need
additional software.
Creation of 2nd
copy of file
You can edit remote files
directly, with no additional
copy created.
Yes. This leads to confusion
due to multiple versions of the
same file.
Table 1: i-Twin vs USB
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 8
5.2 i-Twin vs Cloud Storage
i-Twin Cloud storage
Ease of Installation Plug 'n' Play,
Install & configure it.
Need to create,
remember & use login.
Storage Limit & Monthly
Fees
No storage limit and fee
required
Has storage limits and
fee.
Security & Privacy
Hardware based security
plus optional password
& remote disable
Password only.
Remote Editing
Directly edit your
home/office files
remotely,
Remote editing requires
2nd copy to be created
on other computers.
Accidental Delete
Protection
Present. Not present
Table 2: i-Twin vs Cloud Storage
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 9
CHAPTER-6
6.1 ADVANTAGES
 Smart key generation
Two i-Twins together generate a random 256-bit AES key, every
time they are physically paired and plugged into a computer. Smart Key
generation is assisted by the computer to add randomness. Smart crypto
key resides only on the two halves of the paired i-Twin. Smart Crypto key
is used for encrypting all data traffic between two i-Twins.
 No “Temp Files”
Unplug i-Twin and all temp files are purged automatically. This is
especially useful when using a computer that does not belong to you.
 Password support
i-Twin even provides password support. Passwords of any length
can be set. Unlike other web services, i-Twin's password is stored on
itself, not on any server. If you forget your password, simply pair both
halves of your i-Twin, plug them into a computer and set a new
password. No need for tech support!
 Bi-Directional File Access
When using i-Twin, the connection between the 2 computers is
completely symmetrical. Access, copy, backup & remotely edit files on
computer A from computer B, and on B from A. You will have access to
files on both A and B.
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 10
 i-Twin is like the two ends of a cable, without the cable.
i-Twin is just like a wireless device connecting two systems and securely
transferring data between them.
6.2 REQUIREMENTS
 Windows and Mac OS X compatible
You can use i-Twin on any of both Windows and Mac OSX platforms.
 Minimum 512MB 1GB ram needed
 15MB space on hard disk
 USB 2.0 port
 Broadband connection uploading speed should be 1Mbps
Fig 3 : Windows and Mac OS X compatible
i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 11
CONCLUSION
The i-Twin - A fantastic solution for the home user who wishes to access
and change their files remotely and securely. The i-Twin bypasses the virtual
world of cloud services to turn your physical storage into its own networking
solution. The i-Twin is simple to use and inexpensively solves the Drop box
limitations. For those who want to keep files up-to-date between two
computers the i-Twin is for you.
REFERENCES
 http://www.i-Twin.com
 http://www.tekgoblin.com/2012/02/05/i-Twin-review/#ixzz1lqkIcjMy

More Related Content

What's hot

iTwin Technology
iTwin TechnologyiTwin Technology
iTwin Technology
IRJET Journal
 
Futex ppt
Futex  pptFutex  ppt
Jini technology ppt
Jini technology pptJini technology ppt
skinput technology
skinput technologyskinput technology
skinput technology
yamini rayalu
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
Jeevan Kumar D
 
Screenlessdisplay
ScreenlessdisplayScreenlessdisplay
Screenlessdisplay
Meghana Desu
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
Rohith Palakurthi
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
Prathibha Thammineni
 
Tele immersion
Tele immersionTele immersion
Tele immersion
satyam jasoliya
 
AMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri MattaAMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri Matta
bagisrim
 
Ppt digital scent
Ppt digital scentPpt digital scent
Ppt digital scentsheena_jain
 
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALAWIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
Saikiran Panjala
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
-jyothish kumar sirigidi
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
ranjeetdon
 
Eye ring
Eye ringEye ring
Eye ring
SNOW WHITE
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
nixytl
 

What's hot (20)

iTwin Technology
iTwin TechnologyiTwin Technology
iTwin Technology
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
skinput technology
skinput technologyskinput technology
skinput technology
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Screenlessdisplay
ScreenlessdisplayScreenlessdisplay
Screenlessdisplay
 
Li Fi technology abstract document
Li Fi technology abstract documentLi Fi technology abstract document
Li Fi technology abstract document
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
 
Tele immersion
Tele immersionTele immersion
Tele immersion
 
AMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri MattaAMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri Matta
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Ppt digital scent
Ppt digital scentPpt digital scent
Ppt digital scent
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALAWIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Skinput technology
Skinput technologySkinput technology
Skinput technology
 
Eye ring
Eye ringEye ring
Eye ring
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
 

Similar to I twin technology

Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
Samy Fodil
 
i-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppti-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppt
tpvvsreenivasarao
 
IRJET- Smart Drive
IRJET-  	  Smart DriveIRJET-  	  Smart Drive
IRJET- Smart Drive
IRJET Journal
 
E Keytech
E KeytechE Keytech
E Keytech
Che Hsu
 
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
IJNSA Journal
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
Kumar Gaurav
 
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Associate Professor in VSB Coimbatore
 
Internet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxInternet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptx
ErYashwantJagtap
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of Things
IRJET Journal
 
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneSecured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
IRJET Journal
 
Resume.2016.03.08
Resume.2016.03.08Resume.2016.03.08
Resume.2016.03.08Zhijie Li
 
G04734450
G04734450G04734450
G04734450
IOSR-JEN
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2lunarfall
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
IJERA Editor
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
guest9f2a14
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
xharlylejahn
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
SuprithC2
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
ssusera1b6c7
 
iCloud Technology and Application by AbleMoJah
iCloud Technology and Application by AbleMoJahiCloud Technology and Application by AbleMoJah
iCloud Technology and Application by AbleMoJah
Able MoJah
 

Similar to I twin technology (20)

Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
 
i-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppti-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppt
 
IRJET- Smart Drive
IRJET-  	  Smart DriveIRJET-  	  Smart Drive
IRJET- Smart Drive
 
E Keytech
E KeytechE Keytech
E Keytech
 
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
 
Internet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptxInternet of Things Presentation (IoT).pptx
Internet of Things Presentation (IoT).pptx
 
IRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of ThingsIRJET- Multi Plug Control using Internet of Things
IRJET- Multi Plug Control using Internet of Things
 
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneSecured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
 
Resume.2016.03.08
Resume.2016.03.08Resume.2016.03.08
Resume.2016.03.08
 
G04734450
G04734450G04734450
G04734450
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
iCloud Technology and Application by AbleMoJah
iCloud Technology and Application by AbleMoJahiCloud Technology and Application by AbleMoJah
iCloud Technology and Application by AbleMoJah
 

I twin technology

  • 1. RAJEEV GANDHI MEMORIAL COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous) Affiliated to JNTUA – Anantapur, Approved by AICTE – New Delhi, Accredited by NBA and NAAC with ‘A’ Grade – New Delhi Nandyal – 518501, Kurnool (Dist.), A.P DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING A Technical Report on “i-TWIN TECHNOLOGY” ESTD: 1995 Submitted By AD.Chandra Mohan (12095A0403)
  • 2. CERTIFICATE This is to certify that AD.CHANDRA MOHAN (12095A0403), of B.TECH, E.C.E have carried out the Technical seminar report on “i-TWIN TECHNOLOGY” under the esteemed guidance of Department for the fulfillment of the award of the BACHELOR OF TECHNOLOGY in Electronics and Communication Engineering in R.G.M.C.E.T, Nandyal (Affiliated to J.N.T.University, Anantapur) is a bonafied record of the work done by me during the year 2011-2015. Dr.D.SATYANARAYANA HOD of E.C.E
  • 3. CANDIDATE’S DECLARATION I hereby declare that the report titled “i-TWIN TECHNOLOGY” submitted towards completion of Technical Report in IV Year 2nd Semester of B.Tech (ECE) at the Rajeev Gandhi Memorial College of Engineering & Technology, Nandyal. Is an authentic record of my original report and is prepared by me. I have not submitted the matter embodied in this report for the award of any other degree in any other institutions. By AD.CHANDRA MOHAN Regd.No: 12095A0403 Place: Nandyal Date:
  • 4. ACKNOWLEDGEMENT At the outset, we would like to express our sincere and grateful thanks to the management of Rajeev Gandhi Memorial College of Engineering & Technology, under the leadership of Dr.M. SANTHIRAMUDU, Chairman for providing us an opportunity to fulfill our aspirations. Our special thanks to Dr. T. JAYACHANDRA PRASAD, Principal, Rajeev Gandhi Memorial College of Engineering & Technology, for providing all the facilities and guidelines, required for our academic pursuit. Our special thanks to Dr. D. SATHYANARAYANA, Head of the Department (ECE), Rajeev Gandhi Memorial College of Engineering & Technology, for providing all the facilities and guidelines, required for our academic pursuit. By AD.CHANDRA MOHAN 12095A0403
  • 5. ABSTRACT A USB flash drive is a data storage device that consists of flash memory with an integrated Universal Serial Bus (USB) interface. A Cloud Storage is also a similar case where in the data is stored remotely and is accessed whenever needed. But a drawback of this USB flash drives is its small size cause of which it can easily be misplaced or lost. This is a particular problem if the data it contains is sensitive and confidential. In Cloud Storages the data can be stolen or misused if the username and password of an account to access the storage is hacked by someone. There are many more drawbacks like limited storage, no security, back up, temp files, no remote disable etc. i-Twin is a 'limitless' secure USB device that enables users to access, edit & share all their files & media between any two online computers anywhere in the world. The only limit is the size of your computer’s hard drive. i-Twin is an innovative solution that allows remote file access without the security and privacy risks of the cloud and USB flash drives. It’s very easy to access as a USB device and no special installation is required. i-Twin uses thoroughly analyzed crypto protocols and algorithms(AES 256 bit encryption). It has features like bi-directional file access, no temp files, remote disable, smart key generation, password support and twin trust authentication.
  • 6. CONTENTS Chapter: 1. Introduction 1 1.1 History 2 Chapter: 2. Working of i-Twin 3 Chapter: 3. Features of i-Twin 4 Chapter: 4.Detailed authentication process 6 Chapter: 5. Comparison with other technologies 5.1 i-Twin vs USB 7 5.2 i-Twin vs Cloud storage 8 Chapter: 6.1 Advantages 9 6.2 Requirements 10 Conclusion 11 References 11
  • 7. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 1 CHAPTER-1 INTRODUCTION i-Twin is a revolutionary new file sharing and remote access device brought to you by a company called i-Twin. It's like two ends of a cable, without the cable. It's as simple to use as a flash drive. It’s literally plug and play. i-Twin can connect any two online computers anywhere in the world. i- Twin enables you to have access to any or all of your home computer's files and folders while you're on-the-go. Similarly, you can also use i-Twin to access to any or all of your office computer's files and folders while on-the-go. There's no in-built limit to the amount of storage you can access with i-Twin while you're on-the-go. The only limit is the size of your hard drives. The only other "limit" is the speed of your Internet connection. The faster it is, the better your experience. You can select files for accessing later on-the-go, or you can edit them remotely, without the files leaving your computer. You can also back-up files to your home or office computer while you're out on-the-go. It's so easy, it's unbelievable. Fig 1: i-Twin device
  • 8. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 2 1.1 HISTORY i-Twin was invented by an Indian named Lux Anantharaman. After achieving a Bachelors degree in Electrical and Electronic Engineering from IIT in Chennai and a Masters degree from IISc in Bangalore, Lux worked first as an IT security researcher at the Institute of Systems Science, Singapore and then as senior researcher at Kent Ridge Digital Labs and the Institute for Infocomm Research. Lux specializes in PKI implementations, efficient digital certificate revocations and usable security. Lux was pursuing a part-time MBA at NUS Business School, Singapore, but put studies on hold because of potential of i-Twin. Lux Anantharaman (Founder and Designer) Electrical and Electronics Engineering from Chennai and a master’s degree from IISC in Bangalore. He says i-Twin is like the two ends of a cable, without a cable.
  • 9. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 3 CHAPTER-2 WORKING OF i-TWIN Fig 2: How to use i-Twin  When you connect i-Twin, you'll see a regular window pop-up, just as you would if you plugged in a regular USB flash drive.  Drag and drop files and folders into this window to share them - as many as you want. Leave your computer with one half of i-Twin connected to it.  Detach the other half of i-Twin and take it with you.  Wherever you go, you can remotely access the shared files, simply by plugging the half you are carrying into any online Windows computer, anywhere.  i-Twin allows you to transfer files to - or from - your home computer. Or your office computer. Or your friend's, or your colleague's! i-Twin also allows you to edit the shared files on a remote computer, while keeping them on that remote computer, (no need to transfer those files before you edit them).
  • 10. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 4 CHAPTER-3 FEATURES OF i-TWIN  Like A Limitless Capacity Secure USB Drive i-Twin allows you to securely access your entire hard drive. It's as if you are carrying an access-key to all your files in a device that fits in the palm of your hand. And unlike portable storage, i-Twin lets your data stay safely at home (or in the office).  Remotely edit shared files Remotely edit any shared file from any location. i-Twin allows you to keep a single version on one computer, with you and your chosen i- Twin partner collaborating directly on this version. Say goodbye to multiple versions of files flying around by email.  Backup your data from anywhere When you are on the road, you can use i-Twin to move copies of files from your laptop to your home or office computer. If you are traveling and taking lots of pictures, you can free up your SD card by moving files onto your laptop and transferring them back home. It keeps your data safe and secure.  One-time cost. No fees, ever Don't pay for cloud storage. Don't pay subscription fees for file access. Don't get locked in. You have all the storage you need on your computer and home hard drive. With i-Twin, share it and access it from anywhere.
  • 11. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 5  Data Security i-Twin doesn't store any data on itself. It just enables a secure connection between two computers. Your remote data can only be accessed if you have the physical i-Twin with you. Additionally, you can set up your i-Twin to require a password. i-Twin includes a feature that allows you to remotely disable the connection should you lose your remote i-Twin half. So you can rest assured that your data is safe, even if you lose your i-Twin device. If you have ever lost a portable memory device, you know that terrible feeling. We want to make sure this never happens to you again. It even makes use of AES (256 bit key encryption) in order to transfer the data from one computer to another.
  • 12. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 6 CHAPTER-4 DETAILED AUTHENTICATION PROCESS  Before allowing any data transfer every i-Twin is authenticated by i- Twins Twin Trust Services.  All communications between the i-Twin are i-Twin Trust is secured using industry strength HTTPs (RSA1024 bits, 128 bits RC4) protocol.  After successful authentication by Twin Trust assist i-Twin to discover its other half.  After authentication with Twin Trust, two halves of i-Twin mutually authenticated each other using pre-shared AES 256 bit crypto key.  If password is set, then verification is performed on both i-Twins before data transfer is initiated.
  • 13. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 7 CHAPTER-5 COMPARISION WITH OTHER TECHNOLOGIES 5.1 i-Twin vs USB i-Twin USB Price $ 99. $120 (approx.) for 64GB. Capacity Access to computer's entire hard drive & any attached storage. 2GB to 256GB (depending on model). Remote Disable If you lose one half, you can remotely disable it. If you lose the device, you lose and expose your data. Data Encryption AES 256-bit. Standard USB devices don't support encryption. Need additional software. Creation of 2nd copy of file You can edit remote files directly, with no additional copy created. Yes. This leads to confusion due to multiple versions of the same file. Table 1: i-Twin vs USB
  • 14. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 8 5.2 i-Twin vs Cloud Storage i-Twin Cloud storage Ease of Installation Plug 'n' Play, Install & configure it. Need to create, remember & use login. Storage Limit & Monthly Fees No storage limit and fee required Has storage limits and fee. Security & Privacy Hardware based security plus optional password & remote disable Password only. Remote Editing Directly edit your home/office files remotely, Remote editing requires 2nd copy to be created on other computers. Accidental Delete Protection Present. Not present Table 2: i-Twin vs Cloud Storage
  • 15. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 9 CHAPTER-6 6.1 ADVANTAGES  Smart key generation Two i-Twins together generate a random 256-bit AES key, every time they are physically paired and plugged into a computer. Smart Key generation is assisted by the computer to add randomness. Smart crypto key resides only on the two halves of the paired i-Twin. Smart Crypto key is used for encrypting all data traffic between two i-Twins.  No “Temp Files” Unplug i-Twin and all temp files are purged automatically. This is especially useful when using a computer that does not belong to you.  Password support i-Twin even provides password support. Passwords of any length can be set. Unlike other web services, i-Twin's password is stored on itself, not on any server. If you forget your password, simply pair both halves of your i-Twin, plug them into a computer and set a new password. No need for tech support!  Bi-Directional File Access When using i-Twin, the connection between the 2 computers is completely symmetrical. Access, copy, backup & remotely edit files on computer A from computer B, and on B from A. You will have access to files on both A and B.
  • 16. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 10  i-Twin is like the two ends of a cable, without the cable. i-Twin is just like a wireless device connecting two systems and securely transferring data between them. 6.2 REQUIREMENTS  Windows and Mac OS X compatible You can use i-Twin on any of both Windows and Mac OSX platforms.  Minimum 512MB 1GB ram needed  15MB space on hard disk  USB 2.0 port  Broadband connection uploading speed should be 1Mbps Fig 3 : Windows and Mac OS X compatible
  • 17. i-Twin Technology Dept. of E.C.E, RGMCET-Nandyal Page 11 CONCLUSION The i-Twin - A fantastic solution for the home user who wishes to access and change their files remotely and securely. The i-Twin bypasses the virtual world of cloud services to turn your physical storage into its own networking solution. The i-Twin is simple to use and inexpensively solves the Drop box limitations. For those who want to keep files up-to-date between two computers the i-Twin is for you. REFERENCES  http://www.i-Twin.com  http://www.tekgoblin.com/2012/02/05/i-Twin-review/#ixzz1lqkIcjMy