Building Secure Relationships - PowerPoint PPT Presentation

1 / 38
About This Presentation
Title:

Building Secure Relationships

Description:

Almost 8-9 months were spent on Research and Development. ... called the 'Proximity' hence the keys no longer hog the limelight ... – PowerPoint PPT presentation

Number of Views:18
Avg rating:3.0/5.0
Slides: 39
Provided by: seemantsha
Category:

less

Transcript and Presenter's Notes

Title: Building Secure Relationships


1
Building Secure Relationships!
  • - Seemant Shankar Mathur

2
Main Presentation
  • Our Presentation Is divided into the following
    main sections

Introduction
Implementations
What we need?
3
Introduction
A small company.
Landmark Products
4
Introduction
A small company.
  • Started on 12th June 2002
  • Self Initiated Effort.
  • Small but strong.

5
Introduction
A small company.
  • Started on 12th June 2002
  • Almost 8-9 months were spent on Research and
    Development.
  • Almost 2-3 months have been spent on generating
    awareness in various
  • institutions posing as prospective customers.
  • Self Initiated Effort.
  • Small but strong.

6
Introduction
A small company.
  • Started due to a uncontrolled series of hacking
    attempts in the college.
  • Started as an attempt to fix the various
    loopholes which are exploited by
  • hackers to breach networks.
  • Came up with the Ravelin Concept within 1 month
    of RD.
  • Self Initiated Effort.
  • Small but strong.

7
Introduction
A small company.
  • Small but strong.
  • Have already invented an authentication and
    encryption technology which
  • works on a basis completely different from
    ones available and widely used
  • today.
  • Main design objective was to increase efficiency
    without increasing
  • investments and utilizations of system
    resources.

8
Introduction
A small company.
Landmark Products
  • E-Cognition currently has two of a kind
    authentication
  • and encryption products on its inventory
  • Ravelin Authentication Protocol
  • Spectrum Seek Encryption Protocol.

9
Introduction
Landmark Products
  • E-Cognition currently has two of a kind
    authentication
  • and encryption products on its inventory
  • Ravelin Authentication Protocol
  • Spectrum Seek Encryption Protocol.

10
Introduction
Landmark Products
  • Ravelin Authentication Protocol
  • loopholes left behind by other authentication
    technologies.

2) All authentication technologies today are
Brute Force and eavesdropping prone.
3) All authentication mechanisms existing today
are safe so long as the authentication
server is not breached.
1) A direct instance of the password is stored in
some form in the server and/or traverses
through the connecting media. A direct instance
would also include encrypted forms of
passwords (MD5, etc.)
  • Spectrum Seek Encryption Protocol.

11
Introduction
Landmark Products
  • Ravelin Authentication Protocol
  • How Ravelin Authentication protocols covers the
    loopholes

2) Is completely Brute Force safe. A complete
Brute Force process will produce a large
list of Prospective passwords as compared to
the SINGLE PASSWORD generated on other
authentication technologies.
1) No direct instance of the password is stored
in any form in the main authenticating
server or traverses via the connecting media.
3) Is completely safe even in case the main
authentication server is breached.
  • Spectrum Seek Encryption Protocol.

12
Introduction
Landmark Products
  • Spectrum Seek Encryption Protocol.
  • Problems faced by current encryption technologies

1) All technological advancements are towards the
production of a high bit key, in turn,
leading to a higher consumption of system
resources and bandwidth.
2) The Process of key sharing and verification
becomes a hassle in case of PKI (Public Key
Infrastructure).
3) No encryption technology can safeguard data
from being snooped in cases of the private
key being compromised or stolen.
13
Introduction
Landmark Products
  • Spectrum Seek Encryption Protocol.
  • The Spectrum Seek difference

3) Spectrum Seek adds a completely new dimension
into encryption called the Proximity
hence the keys no longer hog the limelight
for the encryption/decryption process. Hence
Spectrum Seek is the only encryption
protocol in the world which provides its users
data security EVEN IF the keys ARE
compromised!
  • Spectrum Seek amplifies the security of a key by
    as much as 32
  • times. This implies that an 8-bit key using
    the Spectrum Seek platform
  • will provide equal security as a 256-bit key
    length by consuming the
  • resources equal to an 8-bit key length!

2) Spectrum Seek provides efficiency comparable
to a PKI by using SKI thus again saving
system resources as well as the hassles of key
sharing.
14
Main Presentation
Introduction
Implementations
What we need?
15
Implementations
Banking and Finance Sector.
Healthcare Industry
Media Industry
16
Implementations
Banking and Finance Sector
  • Problems faced by the credit card industry

2) Cannot be personalized in terms of user
language proficiency or physical
disabilities.
3) Credit cards are a mere shopping tool with no
features extended to the manufacturer.
1) Container Dependence.
17
Implementations
Banking and Finance Sector
  • The RaveCard difference

2) Personalizable to individuals language
proficiency and physical disabilities.
3) Manufacturer friendly by the introduction
of the anytime anywhere deal structure.
1) Not Container Dependant.
18
Implementations
Banking and Finance Sector
  • Market Perception and the RaveCard advantage.

19
Implementations
Banking and Finance Sector
  • Total worldwide loss due to credit card frauds
    and charge backs annually (In 1999)

21,605.3 million
20
Implementations
Banking and Finance Sector
  • Total number of magstripe cards which would
    migrate to chip based cards by the EMV

905.1 million
21
Implementations
Banking and Finance Sector
  • Year by which all magstripe cards would be
    converted to chip based cards (As proposed by EMV)

2006
22
Implementations
Banking and Finance Sector
  • Cost to company to manufacture one smart card.

1
23
Implementations
Banking and Finance Sector
  • Cost to company to purchase and distribute a
    smart card reader to the card holder.

12
24
Implementations
Banking and Finance Sector
  • Total cost of migration

117,660.30 million
25
Implementations
Banking and Finance Sector
  • Cost to company for manufacturing one RaveCard

1.75
26
Implementations
Banking and Finance Sector
  • Total cost involved in distributing RaveCards

1,583.93 million
27
Implementations
Banking and Finance Sector
  • Costs Saved In Issuing RaveCards

10,182.38 million
28
Implementations
Banking and Finance Sector
  • Money saved by industry (Cost of distribution
    Money saved in frauds)

31,787.68 million
  • Source www.rainbow.com www.nexdisk.com.
  • All Information above calculated assuming 100
    penetration.

29
Implementations
Banking and Finance Sector
Healthcare Industry
Media Industry
  • Similar Implementations have been thought of in
    the 450,000 million Healthcare industry and the
    798,000 million Media industry.

30
Implementations
Introduction
Implementations
What we need?
31
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
32
What we need?
Work Performed Till Now.
  • Various banks and finance institutions
    approached
  • and awareness about the products generated.
  • Working Prototype Up and Running.
  • Intensive crash tests performed to check
    durability.

33
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
34
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
35
What we need?
  • Managed Security Service provider (MSS).

Possible Company Structures.
  • Generate long term relationships with customers
  • by helping them save infrastructural costs
    involved
  • in setting up a proprietary security outfit.
  • Targeted towards catering to the high needs in
  • BFS market.
  • Can consolidate other avenues like Healthcare,
  • e-Governance, Defense, Media, etc.
  • A BPO dealing with only security.

36
What we need?
Possible Company Structures.
  • Stand Alone Solution Provider.
  • Can pose as a stand alone security solution
    provider
  • by packaging and tailor making Ravelin and
    Spectrum
  • Seek to suit corporations variegated needs.
  • Last Option.
  • Become another fish in the ocean.

37
What we need?
Work Performed Till Now.
Possible Company Structures.
Limitations.
The Way Ahead
38
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
39
What we need?
  • Monetary.
  • Being a self initiated start up,
  • we are highly cash constraint.
  • Are not big enough to cater to
  • industrys macroscopic demands.

Limitations.
40
What we need?
Work Performed Till Now.
Limitations.
Possible Company Structures
The Way Ahead
41
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
42
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
43
What we need?
  • Apply For Venture Funding.
  • Tie up with an existing company dealing
  • In the same niche.
  • Will not solve the industrys Experience
  • requirement.
  • A time intensive process.
  • Will provide the perfect mix of experience and
  • technology and hence enjoy a shorter time to
  • market.
  • The two companies can work symbiotically
  • The best bet.

The Way Ahead
44
What we need?
Work Performed Till Now.
The Way Ahead
Possible Company Structures
Limitations.
45
What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
46
Thank You For Attending this Presentation
At This Point of Time I would be Happy to
cater to any questions or suggestions you may
have. Have a Wonderful Evening!
Write a Comment
User Comments (0)
About PowerShow.com