This document provides information about i-Twin technology, which allows users to access and share files between any two online computers. It describes how i-Twin works by connecting two halves of a device that are plugged into different computers to enable file sharing and editing remotely. Key features of i-Twin include bi-directional file access, no temporary files, remote disabling, strong encryption, and not requiring cloud storage fees. i-Twin provides advantages over USB drives and cloud storage by allowing access to a computer's entire storage and remote editing without creating additional copies.
includes how i Twin Technology works. why it is more popular, Features, Authentication Policies, comparison with the USB and Cloud Computing Services how it is better than these services.
includes how i Twin Technology works. why it is more popular, Features, Authentication Policies, comparison with the USB and Cloud Computing Services how it is better than these services.
In computing ,a futex is a linux kernel system call that programmers can use to implement basic locking, or as a building block for higher-level locking abstractions such as posix mutexes or condition variables.
Ambient Intelligence (AmI) refers to a vision of the future information society where intelligent interfaces enable people and devices to interact with each other and with the environment. Ambient intelligence (AmI) research builds upon advances in sensors and sensor networks, pervasive computing, and artificial intelligence. Because these contributing fields have experienced tremendous growth in the last few years, AmI research has strengthened and expanded. Because AmI research is maturing, the resulting technologies promise to revolutionaries daily human life by making people's surroundings edible and adaptive.
This is a novel creation.It is a technology for visually impaired persons.It enables them to become independent by doing their day to day task like banking, reading, walking etc on their own. It is very easy to use and apart from visually impaired persons, it enables tourist to track the location. It is a wearable device which enables the person to handle anywhere he wants.
Simplifying IoT by Solving Software Complexity at the EdgeSamy Fodil
With today’s urge to run software on or in close proximity to devices, companies struggle with development and/or operational complexity!
Taubyte’s Distributed Edge Cloud allows developers to focus on product features without worrying about deployment, security, connectivity, and latency, thus reducing both costs and time to market!
Our unique and innovative smart platform, which extends from last-mile data centers to IoT gateways, can dynamically provision serverless proximity computing, storage, database, ledger, and message brokers.
In computing ,a futex is a linux kernel system call that programmers can use to implement basic locking, or as a building block for higher-level locking abstractions such as posix mutexes or condition variables.
Ambient Intelligence (AmI) refers to a vision of the future information society where intelligent interfaces enable people and devices to interact with each other and with the environment. Ambient intelligence (AmI) research builds upon advances in sensors and sensor networks, pervasive computing, and artificial intelligence. Because these contributing fields have experienced tremendous growth in the last few years, AmI research has strengthened and expanded. Because AmI research is maturing, the resulting technologies promise to revolutionaries daily human life by making people's surroundings edible and adaptive.
This is a novel creation.It is a technology for visually impaired persons.It enables them to become independent by doing their day to day task like banking, reading, walking etc on their own. It is very easy to use and apart from visually impaired persons, it enables tourist to track the location. It is a wearable device which enables the person to handle anywhere he wants.
Simplifying IoT by Solving Software Complexity at the EdgeSamy Fodil
With today’s urge to run software on or in close proximity to devices, companies struggle with development and/or operational complexity!
Taubyte’s Distributed Edge Cloud allows developers to focus on product features without worrying about deployment, security, connectivity, and latency, thus reducing both costs and time to market!
Our unique and innovative smart platform, which extends from last-mile data centers to IoT gateways, can dynamically provision serverless proximity computing, storage, database, ledger, and message brokers.
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...IJNSA Journal
The objective of the paper is to develop an proficient and economical method for Hard Disk Drive(HDD) Security. The task is implemented using Full Disk Encryption (FDE) with Advanced Encryption Standards(AES) for data security of Personal Computers(PCS) and Laptops . The focus of this work is to authenticate and protect the content of HDD from illegal use. The paper proposes a novel approach for protecting a HDD based on Partial Disk Encryption(PDE) which one of the flavour of FDE. The
proposed method is labelled as DiskTrust. FDE encrypts entire content or a single volume on your disk. Symmetric key uses same key for encryption as well for decryption. DiskTrust uses these two technology to build cost effective solution for small scale applications. Finally, the applicability of these methodologies for HDD security will be evaluated on a set of data files with different key sizes.
Notice Board is primary thing in many places like institutions, public utility places i.e., bus stops, railway stations, colleges, malls, etc. But sticking various notices day to day is a tedious process and also a separate person is required to take care of it daily and manually. This project is about advanced wireless notice board. The project is built around ARM controller 11 Raspberry-pi which is heart of the system. Display is obtained on projector or LCD monitor. Wi-Fi is used for Data transmission. At any time we can add or remove or alter the image according to our requirement. At transmitter authorized PC or mobile is used for sending a notices or messages. At receiving end Wi-Fi is connected to raspberry pi. The raspberry pi can be dedicated to Ethernet. When an authorized user sends a notice from his system, it is received by the receiver. The message may be a voice note or image. Wireless communication is a popular technology that allows an electronic device to exchange data wirelessly over a computer network, including high speed wireless connections and so the data is received from authenticated user. In this paper, we propose a remotely send notice to Raspberry pi from a web application and also we include speaker to receive a voice message.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
1. RAJEEV GANDHI MEMORIAL COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous)
Affiliated to JNTUA – Anantapur, Approved by AICTE – New Delhi,
Accredited by NBA and NAAC with ‘A’ Grade – New Delhi
Nandyal – 518501, Kurnool (Dist.), A.P
DEPARTMENT OF
ELECTRONICS AND COMMUNICATION ENGINEERING
A Technical Report on
“i-TWIN TECHNOLOGY”
ESTD: 1995
Submitted By
AD.Chandra Mohan
(12095A0403)
2. CERTIFICATE
This is to certify that AD.CHANDRA MOHAN (12095A0403), of
B.TECH, E.C.E have carried out the Technical seminar report on “i-TWIN TECHNOLOGY”
under the esteemed guidance of Department for the fulfillment of the award of the BACHELOR
OF TECHNOLOGY in Electronics and Communication Engineering in R.G.M.C.E.T,
Nandyal (Affiliated to J.N.T.University, Anantapur) is a bonafied record of the work done by
me during the year 2011-2015.
Dr.D.SATYANARAYANA
HOD of E.C.E
3. CANDIDATE’S DECLARATION
I hereby declare that the report titled “i-TWIN TECHNOLOGY” submitted towards
completion of Technical Report in IV Year 2nd
Semester of B.Tech (ECE) at the Rajeev Gandhi
Memorial College of Engineering & Technology, Nandyal. Is an authentic record of my
original report and is prepared by me.
I have not submitted the matter embodied in this report for the award of any other degree
in any other institutions.
By
AD.CHANDRA MOHAN
Regd.No: 12095A0403
Place: Nandyal
Date:
4. ACKNOWLEDGEMENT
At the outset, we would like to express our sincere and grateful thanks to the management
of Rajeev Gandhi Memorial College of Engineering & Technology, under the leadership of
Dr.M. SANTHIRAMUDU, Chairman for providing us an opportunity to fulfill our aspirations.
Our special thanks to Dr. T. JAYACHANDRA PRASAD, Principal, Rajeev Gandhi
Memorial College of Engineering & Technology, for providing all the facilities and guidelines,
required for our academic pursuit.
Our special thanks to Dr. D. SATHYANARAYANA, Head of the Department (ECE),
Rajeev Gandhi Memorial College of Engineering & Technology, for providing all the
facilities and guidelines, required for our academic pursuit.
By
AD.CHANDRA MOHAN
12095A0403
5. ABSTRACT
A USB flash drive is a data storage device that consists of flash memory
with an integrated Universal Serial Bus (USB) interface. A Cloud Storage is also
a similar case where in the data is stored remotely and is accessed whenever
needed. But a drawback of this USB flash drives is its small size cause of
which it can easily be misplaced or lost. This is a particular problem if the data
it contains is sensitive and confidential. In Cloud Storages the data can be
stolen or misused if the username and password of an account to access the
storage is hacked by someone. There are many more drawbacks like limited
storage, no security, back up, temp files, no remote disable etc.
i-Twin is a 'limitless' secure USB device that enables users to access, edit
& share all their files & media between any two online computers anywhere in
the world. The only limit is the size of your computer’s hard drive. i-Twin is an
innovative solution that allows remote file access without the security and
privacy risks of the cloud and USB flash drives. It’s very easy to access as a
USB device and no special installation is required. i-Twin uses thoroughly
analyzed crypto protocols and algorithms(AES 256 bit encryption). It has
features like bi-directional file access, no temp files, remote disable, smart key
generation, password support and twin trust authentication.
6. CONTENTS
Chapter: 1. Introduction 1
1.1 History 2
Chapter: 2. Working of i-Twin 3
Chapter: 3. Features of i-Twin 4
Chapter: 4.Detailed authentication process 6
Chapter: 5. Comparison with other technologies
5.1 i-Twin vs USB 7
5.2 i-Twin vs Cloud storage 8
Chapter: 6.1 Advantages 9
6.2 Requirements 10
Conclusion 11
References 11
7. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 1
CHAPTER-1
INTRODUCTION
i-Twin is a revolutionary new file sharing and remote access device
brought to you by a company called i-Twin. It's like two ends of a cable,
without the cable. It's as simple to use as a flash drive. It’s literally plug and
play.
i-Twin can connect any two online computers anywhere in the world. i-
Twin enables you to have access to any or all of your home computer's files and
folders while you're on-the-go. Similarly, you can also use i-Twin to access to
any or all of your office computer's files and folders while on-the-go. There's no
in-built limit to the amount of storage you can access with i-Twin while you're
on-the-go. The only limit is the size of your hard drives. The only other "limit" is
the speed of your Internet connection. The faster it is, the better your
experience.
You can select files for accessing later on-the-go, or you can edit them
remotely, without the files leaving your computer. You can also back-up files to
your home or office computer while you're out on-the-go. It's so easy, it's
unbelievable.
Fig 1: i-Twin device
8. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 2
1.1 HISTORY
i-Twin was invented by an Indian named Lux Anantharaman. After
achieving a Bachelors degree in Electrical and Electronic Engineering from IIT
in Chennai and a Masters degree from IISc in Bangalore, Lux worked first as
an IT security researcher at the Institute of Systems Science, Singapore and
then as senior researcher at Kent Ridge Digital Labs and the Institute for
Infocomm Research. Lux specializes in PKI implementations, efficient digital
certificate revocations and usable security. Lux was pursuing a part-time MBA
at NUS Business School, Singapore, but put studies on hold because of
potential of i-Twin.
Lux Anantharaman (Founder and Designer)
Electrical and Electronics Engineering from
Chennai and a master’s degree from IISC in
Bangalore.
He says i-Twin is like the two ends of a cable,
without a cable.
9. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 3
CHAPTER-2
WORKING OF i-TWIN
Fig 2: How to use i-Twin
When you connect i-Twin, you'll see a regular window pop-up, just as you
would if you plugged in a regular USB flash drive.
Drag and drop files and folders into this window to share them - as many as
you want. Leave your computer with one half of i-Twin connected to it.
Detach the other half of i-Twin and take it with you.
Wherever you go, you can remotely access the shared files, simply by
plugging the half you are carrying into any online Windows computer,
anywhere.
i-Twin allows you to transfer files to - or from - your home computer. Or
your office computer. Or your friend's, or your colleague's! i-Twin also allows
you to edit the shared files on a remote computer, while keeping them on
that remote computer, (no need to transfer those files before you edit them).
10. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 4
CHAPTER-3
FEATURES OF i-TWIN
Like A Limitless Capacity Secure USB Drive
i-Twin allows you to securely access your entire hard drive. It's as
if you are carrying an access-key to all your files in a device that fits in
the palm of your hand. And unlike portable storage, i-Twin lets your data
stay safely at home (or in the office).
Remotely edit shared files
Remotely edit any shared file from any location. i-Twin allows you
to keep a single version on one computer, with you and your chosen i-
Twin partner collaborating directly on this version. Say goodbye to
multiple versions of files flying around by email.
Backup your data from anywhere
When you are on the road, you can use i-Twin to move copies of
files from your laptop to your home or office computer. If you are
traveling and taking lots of pictures, you can free up your SD card by
moving files onto your laptop and transferring them back home. It keeps
your data safe and secure.
One-time cost. No fees, ever
Don't pay for cloud storage. Don't pay subscription fees for file
access. Don't get locked in. You have all the storage you need on your
computer and home hard drive. With i-Twin, share it and access it from
anywhere.
11. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 5
Data Security
i-Twin doesn't store any data on itself. It just enables a secure connection
between two computers. Your remote data can only be accessed if you have
the physical i-Twin with you. Additionally, you can set up your i-Twin to
require a password. i-Twin includes a feature that allows you to remotely
disable the connection should you lose your remote i-Twin half. So you can
rest assured that your data is safe, even if you lose your i-Twin device. If you
have ever lost a portable memory device, you know that terrible feeling. We
want to make sure this never happens to you again. It even makes use of AES
(256 bit key encryption) in order to transfer the data from one computer to
another.
12. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 6
CHAPTER-4
DETAILED AUTHENTICATION PROCESS
Before allowing any data transfer every i-Twin is authenticated by i-
Twins Twin Trust Services.
All communications between the i-Twin are i-Twin Trust is secured using
industry strength HTTPs (RSA1024 bits, 128 bits RC4) protocol.
After successful authentication by Twin Trust assist i-Twin to discover its
other half.
After authentication with Twin Trust, two halves of i-Twin mutually
authenticated each other using pre-shared AES 256 bit crypto key.
If password is set, then verification is performed on both i-Twins before
data transfer is initiated.
13. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 7
CHAPTER-5
COMPARISION WITH OTHER TECHNOLOGIES
5.1 i-Twin vs USB
i-Twin USB
Price
$ 99. $120 (approx.) for 64GB.
Capacity Access to computer's entire
hard drive & any attached
storage.
2GB to 256GB (depending on
model).
Remote Disable If you lose one half, you
can remotely disable it.
If you lose the device, you lose
and expose your data.
Data Encryption
AES 256-bit.
Standard USB devices don't
support encryption. Need
additional software.
Creation of 2nd
copy of file
You can edit remote files
directly, with no additional
copy created.
Yes. This leads to confusion
due to multiple versions of the
same file.
Table 1: i-Twin vs USB
14. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 8
5.2 i-Twin vs Cloud Storage
i-Twin Cloud storage
Ease of Installation Plug 'n' Play,
Install & configure it.
Need to create,
remember & use login.
Storage Limit & Monthly
Fees
No storage limit and fee
required
Has storage limits and
fee.
Security & Privacy
Hardware based security
plus optional password
& remote disable
Password only.
Remote Editing
Directly edit your
home/office files
remotely,
Remote editing requires
2nd copy to be created
on other computers.
Accidental Delete
Protection
Present. Not present
Table 2: i-Twin vs Cloud Storage
15. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 9
CHAPTER-6
6.1 ADVANTAGES
Smart key generation
Two i-Twins together generate a random 256-bit AES key, every
time they are physically paired and plugged into a computer. Smart Key
generation is assisted by the computer to add randomness. Smart crypto
key resides only on the two halves of the paired i-Twin. Smart Crypto key
is used for encrypting all data traffic between two i-Twins.
No “Temp Files”
Unplug i-Twin and all temp files are purged automatically. This is
especially useful when using a computer that does not belong to you.
Password support
i-Twin even provides password support. Passwords of any length
can be set. Unlike other web services, i-Twin's password is stored on
itself, not on any server. If you forget your password, simply pair both
halves of your i-Twin, plug them into a computer and set a new
password. No need for tech support!
Bi-Directional File Access
When using i-Twin, the connection between the 2 computers is
completely symmetrical. Access, copy, backup & remotely edit files on
computer A from computer B, and on B from A. You will have access to
files on both A and B.
16. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 10
i-Twin is like the two ends of a cable, without the cable.
i-Twin is just like a wireless device connecting two systems and securely
transferring data between them.
6.2 REQUIREMENTS
Windows and Mac OS X compatible
You can use i-Twin on any of both Windows and Mac OSX platforms.
Minimum 512MB 1GB ram needed
15MB space on hard disk
USB 2.0 port
Broadband connection uploading speed should be 1Mbps
Fig 3 : Windows and Mac OS X compatible
17. i-Twin Technology
Dept. of E.C.E, RGMCET-Nandyal Page 11
CONCLUSION
The i-Twin - A fantastic solution for the home user who wishes to access
and change their files remotely and securely. The i-Twin bypasses the virtual
world of cloud services to turn your physical storage into its own networking
solution. The i-Twin is simple to use and inexpensively solves the Drop box
limitations. For those who want to keep files up-to-date between two
computers the i-Twin is for you.
REFERENCES
http://www.i-Twin.com
http://www.tekgoblin.com/2012/02/05/i-Twin-review/#ixzz1lqkIcjMy