SlideShare a Scribd company logo
1 of 14
BioSlimDiskSignaturepresentation v2.2 RiTech International Ltd Product (Signature)  Website: www.bioslimdisk.com Done by: Noel Heng Date:10/06/2011
©  RiTech International Ltd, Confidential & Proprietary 2 WHY? • Threat of data theft is real and costly • Affects employees well-being • Affects company’s brand equity • Loss of productivity and credibility • Loss of profits and sustainability
How? Physical theft and hacking Actual device is stolen and tapped for data Key Loggers Passwords or access keys can be coaxed Virtual hacking and theft Popular method of data theft Man-in-the-Middle attacks Spying and snooping on communications ©  RiTech International Ltd, Confidential & Proprietary 3
Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification No passwords during usage ©  RiTech International Ltd, Confidential & Proprietary 4
The System Block Diagram Processor
1. Protecting Fingerprints ,[object Object]
Reduces latent fingerprint copy
Intruder requires 2 unique fingerprints
Limiting fingerprint retries
Intruder has less time to guess correct fingerprint
Limits tries and time for correct fingerprint©  RiTech International Ltd, Confidential & Proprietary 6
2. Hardware Benefits AES-128bit hardware encryption Keys never leave Signature Avoids tapping/snooping of keys All data on drive is encrypted Totally hardware-based Resistant to software-based attacks Security methods are encapsulated in hardware ©  RiTech International Ltd, Confidential & Proprietary 7
3.Safekeeping Self Destruct Feature Activated when tampering is detected All data drive is destroyed Keeps confidential data out of reach No backdoor access No password or function to reset security Only valid fingerprints are allowed access ©  RiTech International Ltd, Confidential & Proprietary 8
4. Convenience Anti-static rubberized casing Hard to copy fingerprints on device Less dust attraction to protect sensor Cross platform compatibility Driverless and no Software needed Operatesin Windows, MAC, Linux, Solaris, etc. ©  RiTech International Ltd, Confidential & Proprietary 9

More Related Content

What's hot

Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General PresentationKsenia Kondratieva
 
Presciense InterQuest IoT Talk
Presciense InterQuest IoT TalkPresciense InterQuest IoT Talk
Presciense InterQuest IoT TalkJonathan Lishawa
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuityBlock Armour
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
Presciense InterQuest IoT Talk
Presciense InterQuest IoT TalkPresciense InterQuest IoT Talk
Presciense InterQuest IoT Talk
 
Virtual Security
Virtual SecurityVirtual Security
Virtual Security
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Fire walls
Fire wallsFire walls
Fire walls
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
Week13
Week13Week13
Week13
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
01 presentation-kenwillen
01 presentation-kenwillen01 presentation-kenwillen
01 presentation-kenwillen
 

Similar to Signature Presentation(10062011) Vc 3 Full

ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Security hardening and drown attack prevention for mobile backend developers
Security hardening and drown attack prevention for mobile backend developersSecurity hardening and drown attack prevention for mobile backend developers
Security hardening and drown attack prevention for mobile backend developersJiri Danihelka
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsThales e-Security
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraConnected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraTyfone, Inc.
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesSecPod
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackinghcls
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profileHem Infotech
 

Similar to Signature Presentation(10062011) Vc 3 Full (20)

ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Security hardening and drown attack prevention for mobile backend developers
Security hardening and drown attack prevention for mobile backend developersSecurity hardening and drown attack prevention for mobile backend developers
Security hardening and drown attack prevention for mobile backend developers
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva NarendraConnected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
Connected Silicon Security Challenges and Framework - Tyfone - Siva Narendra
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software Vulnerabilities
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 

Signature Presentation(10062011) Vc 3 Full

  • 1. BioSlimDiskSignaturepresentation v2.2 RiTech International Ltd Product (Signature) Website: www.bioslimdisk.com Done by: Noel Heng Date:10/06/2011
  • 2. © RiTech International Ltd, Confidential & Proprietary 2 WHY? • Threat of data theft is real and costly • Affects employees well-being • Affects company’s brand equity • Loss of productivity and credibility • Loss of profits and sustainability
  • 3. How? Physical theft and hacking Actual device is stolen and tapped for data Key Loggers Passwords or access keys can be coaxed Virtual hacking and theft Popular method of data theft Man-in-the-Middle attacks Spying and snooping on communications © RiTech International Ltd, Confidential & Proprietary 3
  • 4. Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification No passwords during usage © RiTech International Ltd, Confidential & Proprietary 4
  • 5. The System Block Diagram Processor
  • 6.
  • 8. Intruder requires 2 unique fingerprints
  • 10. Intruder has less time to guess correct fingerprint
  • 11. Limits tries and time for correct fingerprint© RiTech International Ltd, Confidential & Proprietary 6
  • 12. 2. Hardware Benefits AES-128bit hardware encryption Keys never leave Signature Avoids tapping/snooping of keys All data on drive is encrypted Totally hardware-based Resistant to software-based attacks Security methods are encapsulated in hardware © RiTech International Ltd, Confidential & Proprietary 7
  • 13. 3.Safekeeping Self Destruct Feature Activated when tampering is detected All data drive is destroyed Keeps confidential data out of reach No backdoor access No password or function to reset security Only valid fingerprints are allowed access © RiTech International Ltd, Confidential & Proprietary 8
  • 14. 4. Convenience Anti-static rubberized casing Hard to copy fingerprints on device Less dust attraction to protect sensor Cross platform compatibility Driverless and no Software needed Operatesin Windows, MAC, Linux, Solaris, etc. © RiTech International Ltd, Confidential & Proprietary 9
  • 15. Anti-static rubberized casing © RiTech International Ltd, Confidential & Proprietary 10
  • 16. Unique Service Our technology is mature and battletested Our company is the pioneer in this field Quick response to security breaches Product is constantly updated Customization to end users Security tokens, 3rd party software © RiTech International Ltd, Confidential & Proprietary 11
  • 17. Summary of Features Protecting Fingerprints Hardware Benefits Safe Keeping Convenience Worldwide registered patents United Kingdom, Netherlands, Germany China, Hong Kong, Singapore, Malaysia and many more. © RiTech International Ltd, Confidential & Proprietary 12
  • 18. END

Editor's Notes

  1. 1. Digital Signature Pairing ArchitectureDigital Signature Pairing between System Controller Processor & Biometric Digital Signal ProcessorDigital Signature Pairing between System Controller Processor & Encryption Engineer Processor2. ID Tag Sequencing Com ArchitectureAll transaction communication protocol between System Controller and Digital Signature Pairing processor are governed by ID TagverificationVerification CycleAuthentication CycleData Fetch Cycle3. System State Alert ArchitectureBiometric Fingerprint Authentication request upon Host System get intoHost System Hibernating ModeHost System Standby Mode
  2. Enhance Dual (Multiple) Bio-fingerprint Authentication ArchitectureDual Biometric Fingerprint Authentication for successful access of memory spaceDual successfully Authentication within allowing time constraint & permissible cycle
  3. 1. Admin Enrollment DestructionUpon successful administrative re-enrollment AES key will be re-admitted with new random set with Flash memory formatting 2. Enhance Encryption Engine ArchitecturePayload fully protected by Advanced Enhance Security Architecture via 128bits Communication via non-continuous and fragmented random sequencingPrevent from accidentally or intentionally monitoring of transmission linePrevent from accidentally or intentionally read back via Flash reader engine3. Randomized Storage of Security Key ArchitectureUnique Encryption Keys with randomized storage spacePrevent smart user from retrieving encryption key form system
  4. Destructive ArchitectureUpon detection of unmatched digital signature on some of the above critical phenomenonSystem Controller issue destructive command erasing data space memory or FAT memory
  5. We believe with the above fully implemented or partially enhanced features, there will not be any compromises in the security access and information content stored within our USB based Bio-Signature Storage devices