SlideShare a Scribd company logo
Confidential Secur   communications for all Secur Digital, Inc. July, 2010                                   www.securdigital.com  
About  Secur Digital , Inc. SecurDigital, Inc. Confidential ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secur Digital , Inc. SecurDigital, Inc. Confidential ” Secur Digital has upped the ante considerably here. In a sudden leap, this innovative new product has shaken off the complexity of unified communications and has taken the lead in terms of ease of use, security and interoperability. Starting with simple encryption techniques in a Java-based application,  Secur Digital has introduced  Secur Voice ©   Privacy Edition, a next-gen secure digital data transmission solution, which takes the focus away from hardware or firmware centric smartphone offerings and provides a Solution that is application platform, operating system, device and carrier independent.  Secur Voice delivers encrypted voice, data or video transmission from any device to any device(s), with selectable encryption algorithms - allowing any companies to literally deploy “ Secur  Communications”.   Bruce F. Magown, CEO   Secur Digital, Inc.
The Targets – Which one are you? SecurDigital, Inc. Confidential
Passive / Active Threats – The Targeteers! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SecurDigital, Inc. Confidential
Multinational Forces Community of Interest ,[object Object],[object Object],[object Object],SecurDigital, Inc. Confidential
Law Enforcement Community of Interest ,[object Object],[object Object],SecurDigital, Inc. Confidential
Corporate Security Community of Interest ,[object Object],[object Object],[object Object],[object Object],SecurDigital, Inc. Confidential
Solution Overview SecurDigital, Inc. Confidential The internal software on your cell phone converts your voice in real-time into encrypted data which is then sent over your carriers infrastructure to the  Secur Voice ©  Enterprise Server where it is de-crypted.  It is then re-encrypted and sent over your carrier’s infrastructure the receiving cell phone where it is de-crypted and is converted back to voice. Secur Voice ©  also features a dual-layered encryption schema which provides full protection against covert listening devices. You may select different encryption algorithms.  For example, your outbound conversation may be AES 128 encryption, while your callers inbound conversation may be elliptical curve; making listening to your conversation impossible  Secur Voice ©  is ultra-strong encryption software.
Solution Detail SecurDigital, Inc. Confidential »  Secur Voice ©   Privacy Edition is a completely new wireless communication solution and architecture which provides secure communications interoperability with any cell, satellite, walkie-talkie, or VoIP phone system. You can download the 38k Java app from our secure locations world-wide and follow the simple instructions to install. How it Works The Java app communicates directly with our  Secur Voice ©   Enterprise Server application as a hosted option or may be resident on your servers.  Additionally, we provide internet virus, internet firewall and voice authentication.  The solution is operating system, application platform, device and carrier independent.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Solution Interoperability Multiple Platforms / Multiple Environments SecurDigital, Inc. Confidential Satellite VOIP/PSTN CHAT/IM/ SMS Video/ Collaboration SW/MW/Trunked HF/VHF/ SDR Cellular/ Multiple  Mobile OS’s
SecurDigital :  Highly Scalable Back Office & Provisioning: SecurDigital, Inc. Confidential ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pricing Model SecurDigital, Inc. Confidential ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Value-Added Security Optional Interoperable Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SecurDigital, Inc. Confidential
Voice Biometric Engine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VMM-1 Engine Structure
VMM-1 Engine Pricing Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SecurDigital, Inc. Confidential
Confidential Secur   communications for all Secur Digital, Inc. July, 2010 Frank R. Mitchell EVP Advanced Programs SecurDigital Inc. Phone: (928) 642-2262 Email: fmitchell@securdigital.com Skype: mitchellfr_sd                                   www.securdigital.com  

More Related Content

What's hot

Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
JEEVAN GEORGE ANTONY
 
Vodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagVodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tag
Deyaa Ahmed
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
Arief Gunawan
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
Droidcon Berlin
 
NFC in direct mail: The pros and cons
NFC in direct mail: The pros and consNFC in direct mail: The pros and cons
NFC in direct mail: The pros and cons
CPS Cards
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Shane Turner
 
What is a Trusted Service Manager?
What is a Trusted Service Manager?What is a Trusted Service Manager?
What is a Trusted Service Manager?
Rambus Inc
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
NFC Forum
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) ADITYA GUPTA
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Block Armour
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]Khaled Hasan
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
Colin Valencia
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
Sagar Patekar
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
Ihar Bayarenka
 

What's hot (20)

Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
Identive Group | Press Release | Identive Group's RFID and Near Field Communi...
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Vodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagVodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tag
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
 
Nfc
NfcNfc
Nfc
 
NFC in direct mail: The pros and cons
NFC in direct mail: The pros and consNFC in direct mail: The pros and cons
NFC in direct mail: The pros and cons
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
 
What is a Trusted Service Manager?
What is a Trusted Service Manager?What is a Trusted Service Manager?
What is a Trusted Service Manager?
 
Nfc
NfcNfc
Nfc
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 

Viewers also liked

Intre noi, parintii. Seminar "Parintele adolescentului perfect"
Intre noi, parintii. Seminar "Parintele adolescentului perfect" Intre noi, parintii. Seminar "Parintele adolescentului perfect"
Intre noi, parintii. Seminar "Parintele adolescentului perfect"
Alexandra Vasile
 
Man In Space
Man In SpaceMan In Space
Man In Space
Marcelo Pinheiro
 
Linear Expressions
Linear ExpressionsLinear Expressions
Linear Expressions
kendickison
 
Inquiry Article
Inquiry ArticleInquiry Article
Inquiry Article
rwilt004
 
Academic Exchange Article
Academic Exchange ArticleAcademic Exchange Article
Academic Exchange Article
rwilt004
 
What Do Pilots See
What Do Pilots SeeWhat Do Pilots See
What Do Pilots See
Marcelo Pinheiro
 

Viewers also liked (7)

Intre noi, parintii. Seminar "Parintele adolescentului perfect"
Intre noi, parintii. Seminar "Parintele adolescentului perfect" Intre noi, parintii. Seminar "Parintele adolescentului perfect"
Intre noi, parintii. Seminar "Parintele adolescentului perfect"
 
Man In Space
Man In SpaceMan In Space
Man In Space
 
Linear Expressions
Linear ExpressionsLinear Expressions
Linear Expressions
 
Inquiry Article
Inquiry ArticleInquiry Article
Inquiry Article
 
IoT standardisation
IoT standardisationIoT standardisation
IoT standardisation
 
Academic Exchange Article
Academic Exchange ArticleAcademic Exchange Article
Academic Exchange Article
 
What Do Pilots See
What Do Pilots SeeWhat Do Pilots See
What Do Pilots See
 

Similar to Secur Digital Presentation 22jul10 Frm Show

SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
Mustafa Kuğu
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
Icomm Technologies
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
Finite Moments
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
VASCO Data Security
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroFidel Angel Salgueiro
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
Icomm Technologies
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
Entrust Datacard
 
How Government-Level Encryption For Telecommunications Ensures Data Confident...
How Government-Level Encryption For Telecommunications Ensures Data Confident...How Government-Level Encryption For Telecommunications Ensures Data Confident...
How Government-Level Encryption For Telecommunications Ensures Data Confident...
VOROR
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
Digital Policy and Law Consulting
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
Dimitris Chalambalis
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
Robert Kleinschmidt
 

Similar to Secur Digital Presentation 22jul10 Frm Show (20)

SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
How Government-Level Encryption For Telecommunications Ensures Data Confident...
How Government-Level Encryption For Telecommunications Ensures Data Confident...How Government-Level Encryption For Telecommunications Ensures Data Confident...
How Government-Level Encryption For Telecommunications Ensures Data Confident...
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 

Secur Digital Presentation 22jul10 Frm Show

  • 1. Confidential Secur communications for all Secur Digital, Inc. July, 2010                                   www.securdigital.com  
  • 2.
  • 3. Secur Digital , Inc. SecurDigital, Inc. Confidential ” Secur Digital has upped the ante considerably here. In a sudden leap, this innovative new product has shaken off the complexity of unified communications and has taken the lead in terms of ease of use, security and interoperability. Starting with simple encryption techniques in a Java-based application, Secur Digital has introduced Secur Voice © Privacy Edition, a next-gen secure digital data transmission solution, which takes the focus away from hardware or firmware centric smartphone offerings and provides a Solution that is application platform, operating system, device and carrier independent. Secur Voice delivers encrypted voice, data or video transmission from any device to any device(s), with selectable encryption algorithms - allowing any companies to literally deploy “ Secur Communications”.   Bruce F. Magown, CEO   Secur Digital, Inc.
  • 4. The Targets – Which one are you? SecurDigital, Inc. Confidential
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Solution Overview SecurDigital, Inc. Confidential The internal software on your cell phone converts your voice in real-time into encrypted data which is then sent over your carriers infrastructure to the Secur Voice © Enterprise Server where it is de-crypted. It is then re-encrypted and sent over your carrier’s infrastructure the receiving cell phone where it is de-crypted and is converted back to voice. Secur Voice © also features a dual-layered encryption schema which provides full protection against covert listening devices. You may select different encryption algorithms. For example, your outbound conversation may be AES 128 encryption, while your callers inbound conversation may be elliptical curve; making listening to your conversation impossible Secur Voice © is ultra-strong encryption software.
  • 10.
  • 11. Solution Interoperability Multiple Platforms / Multiple Environments SecurDigital, Inc. Confidential Satellite VOIP/PSTN CHAT/IM/ SMS Video/ Collaboration SW/MW/Trunked HF/VHF/ SDR Cellular/ Multiple Mobile OS’s
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Confidential Secur communications for all Secur Digital, Inc. July, 2010 Frank R. Mitchell EVP Advanced Programs SecurDigital Inc. Phone: (928) 642-2262 Email: fmitchell@securdigital.com Skype: mitchellfr_sd                                   www.securdigital.com  

Editor's Notes

  1. Disclaimer: This presentation serves marketing purposes only. This presentation is made by SecurDigital, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“ "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date.
  2. Would you mind if you knew someone was listening to all of your calls on your home phone? Did you know that your cell phone can be turned on in the off position and the microphone will pick up your private conversations at home? Did you know that your phone is sending its signal numbers out to wireless towers 24/7? Did you know the only way to shut down your cell phone is to pull out the battery? Did you know that our government listens to every cell conversation on Route #95? Did you know that if you put your bank or credit card number into your cell that it stays there forever? All information the phone receives s put on record. There is no way to dump that info. If you are leading a Company or responsible for other peoples money that information buck stops with you, for you to be a secure source. Did you know that even the Bluetooth ear bud could be listened to with a scanner? Imagine someone standing in the street with a hidden scanner and transmitter you are most intimate calls can and are being routed to the internet, especially You-Tube. Did you know that most of the world is building their infrastructure on Maxi WiFi because it is less expensive and less time consuming to bury land cables? These citizens use their Phone for paying utilities and other bills over their cell phone. Ask a young computer engineer still in college what does he do all his work on, a lap top or a cell phone, they will tell you that lap tops are from the stone age. They have phones that are more portable, less expensive and handle all pictures, and recordings, documents, letters and forms all installed in the cell phone…You need to see the world is changing in front of your eyes. That person that says he does not see the need for personal cell security does not understand the world he is living in today…
  3. True, reported in on June 7 th , 2010 in Dispatch Magazine, for which the event happened in Oakland, CA, one week prior.
  4. A device called an IMSI-catcher pretends to the mobile phones in its vicinity to be a legitimate base station of the mobile phone network, subjecting the communication between the phone and the network to a man-in-the-middle attack. This is possible because while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. Once the mobile phone has accepted the IMSI-catcher as its base station the IMSI-catcher can deactivate GSM encryption using a special flag. 
  5. Multiple environments including Conferences and Presentations, Telecon’s, Sporting events including The Olympics, Joint Operations and coordinated pursuits, corporate IT infrastructures and issued devices, and personal security
  6. Mathematical Algorithms At the heart of any voice biometric engine are mathematical functions or algorithms that are used to model unique speech patterns. There are several different algorithms commonly used today. Examples include: Dynamic Time Warping (DTW), Hidden Markov Model (HMM), Gaussian Mixture Model (GMM), and Support Vector Machines (SVM). These different algorithms each have strengths and weaknesses. We believe that no single algorithm is appropriate for all application scenarios. So, our decision engine can use one or more algorithms to provide greater flexibility across a wider range of  voice authentication scenarios. Control . The control section is our internal interface to all voice biometric engine functions. Communications occur with our main service logic to coordinate all customer requests, move voiceprints back and forth between memory and data storage, and perform other management functions. Analyis and Filtering . We've developed a custom pre-processor that evaluates all signals before they are sent to the voice biometric engine for additional processing. A number of audio quality checks are performed to ensure that the enrollment, verification, or identification process will be successful. A variety of different signal filtering techniques are invoked as appropriate. Feature Extraction . Following analysis and filtering, various audio features (MFCC and others) are extracted from the signal -- depending on the underlying algorithm(s) being used. The features are then modeled and synthesized into a voiceprint. GMM, LBG, DTW, SVM, Other . Multiple engine algorithms can be invoked to help support feature extraction and modeling of voiceprints. Voice Biometrics Group currently supports GMM, LBG, and DTW algorithms within the VMM-1 engine. SVM and other variants are currently being evaluated for future releases. Enroll, Verify, Identify . VBG's multi-mode VMM-1 engine allows customers to support both automated authentication use cases as well as offline (or batch) identification tasks. Segmentation is also performed at lower levels to assist with identification and verification tasks.
  7. Disclaimer: This presentation serves marketing purposes only. This presentation is made by SecurDigital, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“ "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date.