The Telesens Notary Server and Messenger Raising up Security to the Next Level Deutsche Post März 15 1.

Презентация:



Advertisements
Похожие презентации
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
Advertisements

Isayeva Anastasia 9 «Б». What is a lawyer? Lawyer (lat. Advocatus - from advoco - invite) - a person whose profession is to provide qualified legal assistance.
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Cisco AVVID Framework ARCH v
Innovation Strategy Management Lecture 6. Programme Part 1 – The basis of Innovation Part 1 – The basis of Innovation Part 2 – Innovation and New Product.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
1 Where is the O(penness) in SaaS? Make sure youre ready for the next wave … Jiri De Jagere Senior Solution Engineer, Progress Software Session 123.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
Overview of the Paysonnel CE. Overview Paysonnel CE Go to URL- 1 Click [Login to Paysonnel CE] 2 How to Log-in to Paysonnel CE 1 2.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Three – Exchange 2007.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
"Cloud services" - what it is.. First of all – it is innovative online services. They provide an opportunity to use the enormous potential of the Internet.
The waterfall model is a popular version of the systems development life cycle model for software engineering. Often considered the classic approach to.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module One – UMS.
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, Voic Pro Advanced Functions Module One – Text to Speech.
NEW Business NEW Business. What is business? A business can be defined as an organization that provides goods and services to others who want or need.
The waterfall model is a popular version of the systems development life cycle model for software engineering. Often considered the classic approach to.
What to expect? How to prepare? What to do? How to win and find a good job? BUSINESS ENGLISH COURSE NOVA KAKHOVKA GUMNASUIM 2012.
© 2002, Cisco Systems, Inc. All rights reserved. AWLF 3.0Module 7-1 © 2002, Cisco Systems, Inc. All rights reserved.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Web The Internet. Level A2 Waystage Level A2 Waystage Listening (p.17) I can understand simple messages delivered at a relatively high speed (on every.
Транксрипт:

The Telesens Notary Server and Messenger Raising up Security to the Next Level Deutsche Post März 15 1

At a Glance Company Profil We are an international Company headquartered in London with a 16 year international track-record within the IT- Infrastructure and Software Development Business. Germany is appointed as the European Business Hub März 15 2 Our Product With our new NOTARY-SERVER Technology we ensure a new level of data-/ transmission security Facts and Figures Founded in: 1998 Employees: ca. 190 employees CEO: Eduard Rubin CEO Germany: Nino Messaoud Customers At a Glance

März 15 3 Threats for Data and Transaction security Hackers have stolen 45 Million Healthcare patient records Sony Network was hacked and data from 100 million accounts was stolen 30 Million bank accounts have been hacked TAN, M-TAN, Photo- TAN have all been hacked Threats for Transaction Security

März 15 4 Common Threats M / E Commerce E – Payment Fraud Man in the middle Attack Stealing Internet Identity E – Government secrets are public Loosing competitve edges to competitors

In most cases the user is not even aware that a third-party has access to his confidential information The critical points in any Internet-Transmission are Can you really 100% identify the sender and receiver ? Are you sure that the transmitted data is received without any changes ? Think about what would happen if someone changes data while transmission or not the original receiver gets the data März 15 5 Common Threats

European Banks and Insurance Companies are losing hundreds of million Euros / Year because of fraudulence Within some E-Government Systems, fraud has opened the doors to faked documents, driving licenses etc. Within the Healthcare and Telemedicine Industry, genuine data can save lives Due to industrial espionage, companies are losing funds, competitive edges etc. Provide yourself and/or your clients an environment with maximum Security Protect yourself and/or your clients against fraud and against recourse rights März 15 6 Common Threats

What can Telesens do for you? März 15 7 Notary Server Technology Identify 100% the sender and receiver Ensure that nobody can change Data during transmission and provide your employees and/or customers a safe way of transmitting data Use our applications or use the NOTARY SERVER as a core-technology for your own applications and services. Telesens provides you the technology. We do not host your data. The Data is always under your control. Hide your secrets to competitors and lower the risk of fraudulence Independent of mobile or desktop applications. The NOTARY-SERVER secures your values We have developed a technology, which provides you with the highest possible security standards to avoid the aforementioned threats With the usage of our NOTARY-SERVER Technology you can ensure the following:

How it works Telesens has developed a new, innovative security and identification solution that enables all online transactions and interactions to be conducted securely. The unique characteristic of this solution is the sole use of INDIVIDUAL KEYS. There is not one general key but a distinctive key for every transaction. Transactions can only be conducted by users that have been registered as well as clearly identified with their hardware and as a person. März 15 8 How it works

März 15 9 You can use the NOTARY-SERVER Technology with any device of your choice. Independent of whether its a Mobile- or Desktop Device. Additionally, we support the major operating systems (Windows©, Android© or Apple OS©.) The NOTARY-SERVER can be placed at your office or within a high security Computing Center. Each Client and Client-Scenario has his own NOTARY-SERVER. There is not one Server for all clients. This ensures that each client is protected separately. How it works

The Requirements März How it works NOTARY-SERVER TRANSACTION- SERVER Mobile Devices Desktop Devices and/or

The Process NOTARY-SERVER The Notary Server only knows the encrypted identity of the user and corresponding data. Only in the communication with the Transaction Server, it is able to provide the requested information. Each Server without the other is not able to provide any kind of information. System of your Company How it works or TRANSACTION-SERVER Start process https Firewall Secured Communication The Transaction Server is always the gateway between the User and the secured Data. It is responsible for the Data-Handling and the key-exchanges. Identified Hardware + Tag / PIN März 15 11

The Telesens Messenger – Tutus Built on Notary-Server Technology Provides your employees, customers, partners etc. a secure and identified way of communication Has all standard functions like other Messengers, plus -Encrypted & Identified communication without general key -Encrypted & Identified Voice- and Video Communication -Encrypted & Identified single- or group communication -Encrypted & Identified Cloud Services, Data-Rooms etc. Perfect integration & combination with the Notary Server Independent of your mobile device, Tablet or Desktop Telesens Messenger März 15 12

The advantages to existing Products The NOTARY-SERVER Technology can be used as a product or as a core technology in addition to your existing products. Due to the combination of different keys & items, the Sender / Receiver is identified 100%. No information can be changed during transmission. What you send is what the participant receives. No common key & technology for all users and scenarios. Each customer gets his own NOTARY-SERVER. Place the NOTARY-SERVER within your own Server-Farm or inside a Computing Center. What makes us different März 15 13

What is different to other solutions? Instead of using third party tools like Key Generating devices, you can use YOUR standard device for all purposes. The handling is very easy. Use your personal QR-Code to start any kind of action depending on your provider. You do not need to link your hardware device to e.g. your credit card, etc. It works with any known hardware on the major operating systems like Windows©, Android© and IOS©. What makes us different März 15 14

What is different to other solutions? No one – not even the provider or telecommunication provider – can read your messages and/ or content of transactions. Man in the Middle or Brute-Force Attacks can not harm you. These are the common attacks to steal sensitive data. TAN-Services – even to registered mobile device have been cracked. The Notary Server protects you against those attacks. Compared to other encryption solutions: How do you know if your recipient is the dedicated person? With the Notary Server, the recipient is 100% identified. März What makes us different

ProFix – Our latest customer ProFix provides it services to a wide client base 250+ Banks in 14 countries which now use the NOTARY SERVER technology to secure their transactions Profix provides services like International Money Transfer SWIFT EastNets Products A customized version of the Telesens Messenger Tutus will be used as Payment Instrument to transfer money März Latest News

The Registration Process I März The Registration process can be customized to your own homepage and / or already existing registration processes. During registration we collect unique identifier of the used hardware. If the User wants to use several devices (e.g. desktop and mobile), then he needs to register both devices. How it Works

The Registration Process II März How it Works After the registration, the User receives s his activation code to the previously entered addres. This is to confirm the given address. Please keep in mind, that usually the cooperate knows his customers. In case he is unknown, we support services like e.g. Post-Ident or similar services to confirm given address in the registration process.

The Registration Process III März How it Works After successful registration, the User receives a confirmation. The important information is the pers.Ident Number. THIS is the unique identifier of the User for all future processes. Now the User can select which applications he would like to install on his device, e.g. Home Banking Software, POS-Software, E- Commerce Software etc. This screen & processes can be customized to customer needs. So YOUR applications can be provided after successful registration.

The Registration Process IV März How it Works Providing QR-Code is the most comfortable way for the end consumer to download applications of any kind.

The Mobile Device Registration (I) März How it Works Now the User is able to launch the – on the Notary Server High-Security Technology based – Messenger. This Messenger can be customized to your individual needs and CI. In the first Step – first launch of the Messenger – the User has to select the language. Due to our architecture, we are able to support any desired language.

The Mobile Device Registration (II) März How it Works Now the User has to enter the previously provided pers.Ident Number and has to select a personal password. The password is needed to launch the application.

The Mobile Device Registration (III) März How it Works In the next Step, the User has to scan the provided QR-Code. This Step is a further security issue to make sure that the app is installed on the registered hardware and to confirm, that the QR-Code – which is used as a door opener to the applications – is correct.

The Mobile Device Registration (IV) März How it Works In the final Step, the User has to enter the activation code that was provided to the registered mobile device, which was entered during the registration process.

The Mobile Device Registration (V) März How it Works Registration is completed. The User finally has three options: 1.Inform my contacts that I have now successfully registered the Messenger. These contacts are out of the address book and the User can decide whom he wants to inform 2.Request confirmation from the informed contacts 3.Invite contacts to install the Messenger

The Application (I) März How it Works In the address book, the User can decide whom to invite, whom to block, to receive information who is already registered etc.

The Application (II) März How it Works Furthermore, he can query his contacts by Messenger Contacts, contacts where he as sent invitation to, contacts where he is waiting for confirmation etc.

The Application: Device Contacts März How it Works

The Application: Messenger Contacts März How it Works

The Application: Contact Invitation März How it Works

The Application: Add New Contacts März How it Works

The Application: Multiple Selection for Invitations März How it Works

The Application: Multiple Selection for Confirmations März How it Works

The Application März How it Works

The Application: Request Information About Contacts März How it Works

The Application: Start New Chat, File Transfer, etc. März How it Works To initiate any action, the User has to identify himself by Scanning the QR-Code from his personal card OR Using a SoftTag to identify himself. A SoftTag can usually be placed on his keychain One of these security steps has to be completed. Otherwise no action e.g. chat, file transfer, start of an application or payment process is possible.

The Application: Multiple Chats März How it Works The User is able to handle multiple chats (Person to Person or Group chat) at once.

The Application: Control Chats März How it Works The User is able to add / delete chat participants at any time. Furthermore, he can SEARCH through the chat history for specific keywords.

The Application: Chat History März How it Works The Chat Window can be customized to your needs. Colors, CI etc. are changeable.

The Application: Additional Security März How it Works For very sensitive operations we can additionally use a PIN-Verification. If that option is chosen, then we have the following security levels: 1.Identified Hardware 2.Identified User by QR-Code and/or SoftTag 3.Entered PIN Plus, there is always the extremely high encryption in all processes and without using a general key or storing data on the local device, we have the most secure solution you can imagine.

The Next Messenger Version März How it Works Voice communication encryption based on the Notary Server technology Video communication encryption based on the Notary Server technology File Transfers adjusted to your companys needs (Volume) Emoticons

März The Future Healthcare POS-Systems Money Transfer Agencies E-Coupon M-2-M Communication KIOSK Systems E-Commerce / M-Commerce Data Rooms Computing Centers Cloud Services The secured mobile device as a general key to various branches and markets

Who Are We? März Who Are We? Mr. Eduard Rubin 2012 – present day: Kharkiv Computer and "Kharkiv Polytechnic Institute Director 2010 – present day: "Kharkiv Polytechnic Institute", Computer Aided Management Systems department Associate professor 2009 – present day: Telesens International Ltd. Founder and CEO 2002 – 2009 : Telesens LLC Founder and CEO 1998 – 2002 : Telesens AG, Germany Director od Development Center Ukraine 1995 – 2000 : Intermesse ONLINE Serving the worlds first online exhibition Founder and Director 1991 – 1995 : M + R Import / Export GmbH Export & Import between CIS countries Founder and Director 1987 – 1991 : Scientific Production Cooperative Sintez The first private industrial production of computers based on the Z-80

Who Are We? März Who Are We? Mr. Eduard Rubin – Public activities and awards 2011 – present day: Chairman of Kharkov Branch Board of the European Business Association 2008 – 2010: Vice Chairman of Kharkov Branch Board of the European Business Association 2007: Finalist of the competition Entrepreneur of the Year elected by Ernest & Young 2006: Winner of the competition Entrepreneur of the Year in the nomination Information Technologies elected by Ernest & Young 2005: Phd of technical sciences in automated management systems and progressive information technologies. Defended the thesis in Kharkov National Polytechnic University The Kharkov Polytechnic Institute 2005 – 2008: Vice President of the Association IT 2002 – present day: Head of Employers Organization Kharkov Regional Branch of Employers in Telecommunications 1998 – present day: Member of the Academy of Computing Sciences in the Ukraine

Who Are We? März Who Are We? Mr. Nino Messaoud, Degree in Commercial Information Techn. 05/2014 – present day: Setup, Preparation of Director of Telesens Deutschland GmbH i.Gr – 2014 : Managing Director of SHD Einzelhandelsgesellschaft mbH & Co. KG Managing more than 100 employees in one of leading software companies for ERP Systems (furniture retail) 2007 – 2008 : Al Hamed Enterprises (UAE) Consulting- and Re-Structuring of the Group of Companies 2006 – 2007 : Conception & Development of the worlds first B-2-B Diamond Trading System for Antwerp 2003 – 2006 : Various Projects as Head of Consultancy & Development in Kuwait, UAE 1998 – 2002 : Telesens AG, Germany Head of Business Unit Post-Billing 1994 – 1998 : AMS (American Management Systems) Head of GUI-Development for Mannesmann (today Vodafone) Billing System 1997 – 1997 : Software Developer for various companies (project freelancer), e.g. GDG Globus Reisen, Deutsche Presse Grosso, AXA Colonia

Who Are We? März Who Are We? Telesens Facts & Figures Internationally operating Company with Headquarter in London (UK). Germany will be setup as the European Hub to provide our Customers contracts based on German law in the heart of Europe with two major business units o Products: Telesens Notary Server & Messenger Technologies o Outsourcing projects to Ukraine with German project development (one face to the customer) 15 Years of experience in international product- and project development for telecommunications and other branches with more than 200 successful projects with more than 50 customers worldwide ISO-Certified processes since 2006 More than 100 highly qualified and top educated analysts, developers, project managers, quality insurance specialists, etc., and a direct link to the University of Kharkov Silicon Valley - educational, scientific and industrial center founded by Telesens and National Technical University «Kharkov Polytechnic Institute»

Quality Management System März Who Are We? Company Quality Management System complies with the ISO 9001:2008 requirements that has been endorsed by the Certificate No issued by the certification authority TÜV Rheinland All Telesens Business Processes are in accordance with internationally-accepted standards and models: o International and industry standards: ISO 9001, ISO/IEC (Amd.1,2), ANSI/EIA 649, ANSI/EIA 836 o Methodological products: Rational Unified Process®, PMI PMBOK® Guide, SEI CMMI® Product Suite to ensure the processes' integrity, consistency and improvability

Our Technology Skills März Who Are We? Hardware & Software Platforms o Sun Sparc (Solaris), HP (Unix), Intel (Windows, Linux) Software Development Technologies o Java EE, Microsoft.NET (2.0, 3.5, 4.0), CORBA DBMS o Oracle, MS SQL Server, Sybase, MySQL, IBM DB2 Programming Languages o Java, C#, C/C++, VB, SQL, PL/SQL, TSQL, PHP Technologies and Frameworks o ASP.NET (2.0, 3.5, 4.0), ASP.NET MVC o Spring, OSGi, EJB, Hibernate, iBatis, Swing, GWT/Smart-GWT, JSP, JSF, Struts/Tiles o Ajax, HTML, DHTML, XML, XSLT, JavaScript, JQuery, CSS, Iron Speed Designer, MOSS / Sharepoint 2007, 2010 Application Servers o Oracle Weblogic, IBM WebSphere, JBoss, Resin, Apache Tomcat, MS IIS Tools o Sybase Power Designer, Eclipse, NetBeans, MS Visual Studio, Oracle Data Integrator, Oracle Warehouse Builder, JasperServer, MS SQL Reporting Services, Crystal Reports Subversion, MS VSS, Rational ClearCase, Rational ClearQuest, Atlassian Jira, Apache Maven, Apache Ant, Altova XML Spy, soapUI

Our Technology Partners März Who Are We?

Some of our customers März Who Are We?

Customer Testimonials März For Ucell, as fastest growing operator in Uzbekistan, its very important to have an efficient tool to manage the interconnect business in order to hold the leading position in tough competition environment. Telesens executives have demonstrated their ability to respond to requests of COSCOMs staff in a prompt and flexible way. Ucell is very much looking forward to develop and strengthen our partnership with Telesens. Helge Taltanen, CTO FE COSCOM LLC Due to their professional competence, the Telesens employees participating in this project were able to get into the new available infrastructure very fast. Both technical and interpersonal communication with them was excellent. The fast synchronization of the development processes was easily achieved. The developed software module is remarkable for ist high quality. The planned functionality was achieved fully within planned timeline and budget. This project can be designated as a 100% success. Therefore we plan to entrust Telesens Ukraine with further projects. Chris Steenbergen, Busiess Support Solutions T-Systems Nova GmbH Customer Testimonials

Who Are We? März Who Are We? IT-Services provided by us Application Development Project Solutions Product Solutions Software Reengineering Mobile Applications Professional Services Integration and Implementation Support Services IT-Resourcing Dedicated Project Teams Dedicated Quality Insurance IT-Consulting Management Consultancy Technical Consultancy Think-Tank We operate with some customers Think Tanks to invent with them the ideas from tomorrow

Copyright März Copyright Accountability for content The contents of our pages have been created with the utmost care. However, we cannot guarantee the contents' accuracy, completeness or topicality. According to statutory provisions, we are furthermore responsible for our own content on this Powerpoint©. In this context, please note that we are accordingly not obliged to monitor merely the transmitted or saved information of third parties, or investigate circumstances pointing to illegal activity. Our obligations to remove or block the use of information under generally applicable laws remain unaffected by this as per §8 to 10 of the Telemedia Act (TMG). Copyright This Powerpoint© and its contents are subject to German copyright law. Unless expressly permitted by law (§ 44a et seq. of the copyright law), every form of utilizing, reproducing or processing works subject to copyright protection on our web pages requires the prior consent of the respective owner of the rights. Individual reproductions of a work are allowed only for private use, so must not serve either directly or indirectly for earnings. Unauthorized utilization of copyrighted works is punishable (§ 106 of the copyright law). Telesens Deutschland GmbH Vürfels Bergisch Gladbach, Germany Tel.: