Title: Building Secure Relationships
1Building Secure Relationships!
2Main Presentation
- Our Presentation Is divided into the following
main sections
Introduction
Implementations
What we need?
3Introduction
A small company.
Landmark Products
4Introduction
A small company.
- Started on 12th June 2002
5Introduction
A small company.
- Started on 12th June 2002
- Almost 8-9 months were spent on Research and
Development.
- Almost 2-3 months have been spent on generating
awareness in various - institutions posing as prospective customers.
6Introduction
A small company.
- Started due to a uncontrolled series of hacking
attempts in the college.
- Started as an attempt to fix the various
loopholes which are exploited by - hackers to breach networks.
- Came up with the Ravelin Concept within 1 month
of RD.
7Introduction
A small company.
- Have already invented an authentication and
encryption technology which - works on a basis completely different from
ones available and widely used - today.
- Main design objective was to increase efficiency
without increasing - investments and utilizations of system
resources.
8Introduction
A small company.
Landmark Products
- E-Cognition currently has two of a kind
authentication - and encryption products on its inventory
- Ravelin Authentication Protocol
- Spectrum Seek Encryption Protocol.
9Introduction
Landmark Products
- E-Cognition currently has two of a kind
authentication - and encryption products on its inventory
- Ravelin Authentication Protocol
- Spectrum Seek Encryption Protocol.
10Introduction
Landmark Products
- Ravelin Authentication Protocol
- loopholes left behind by other authentication
technologies.
2) All authentication technologies today are
Brute Force and eavesdropping prone.
3) All authentication mechanisms existing today
are safe so long as the authentication
server is not breached.
1) A direct instance of the password is stored in
some form in the server and/or traverses
through the connecting media. A direct instance
would also include encrypted forms of
passwords (MD5, etc.)
- Spectrum Seek Encryption Protocol.
11Introduction
Landmark Products
- Ravelin Authentication Protocol
- How Ravelin Authentication protocols covers the
loopholes
2) Is completely Brute Force safe. A complete
Brute Force process will produce a large
list of Prospective passwords as compared to
the SINGLE PASSWORD generated on other
authentication technologies.
1) No direct instance of the password is stored
in any form in the main authenticating
server or traverses via the connecting media.
3) Is completely safe even in case the main
authentication server is breached.
- Spectrum Seek Encryption Protocol.
12Introduction
Landmark Products
- Spectrum Seek Encryption Protocol.
- Problems faced by current encryption technologies
1) All technological advancements are towards the
production of a high bit key, in turn,
leading to a higher consumption of system
resources and bandwidth.
2) The Process of key sharing and verification
becomes a hassle in case of PKI (Public Key
Infrastructure).
3) No encryption technology can safeguard data
from being snooped in cases of the private
key being compromised or stolen.
13Introduction
Landmark Products
- Spectrum Seek Encryption Protocol.
- The Spectrum Seek difference
3) Spectrum Seek adds a completely new dimension
into encryption called the Proximity
hence the keys no longer hog the limelight
for the encryption/decryption process. Hence
Spectrum Seek is the only encryption
protocol in the world which provides its users
data security EVEN IF the keys ARE
compromised!
- Spectrum Seek amplifies the security of a key by
as much as 32 - times. This implies that an 8-bit key using
the Spectrum Seek platform - will provide equal security as a 256-bit key
length by consuming the - resources equal to an 8-bit key length!
2) Spectrum Seek provides efficiency comparable
to a PKI by using SKI thus again saving
system resources as well as the hassles of key
sharing.
14Main Presentation
Introduction
Implementations
What we need?
15Implementations
Banking and Finance Sector.
Healthcare Industry
Media Industry
16Implementations
Banking and Finance Sector
- Problems faced by the credit card industry
2) Cannot be personalized in terms of user
language proficiency or physical
disabilities.
3) Credit cards are a mere shopping tool with no
features extended to the manufacturer.
1) Container Dependence.
17Implementations
Banking and Finance Sector
2) Personalizable to individuals language
proficiency and physical disabilities.
3) Manufacturer friendly by the introduction
of the anytime anywhere deal structure.
1) Not Container Dependant.
18Implementations
Banking and Finance Sector
- Market Perception and the RaveCard advantage.
19Implementations
Banking and Finance Sector
- Total worldwide loss due to credit card frauds
and charge backs annually (In 1999)
21,605.3 million
20Implementations
Banking and Finance Sector
- Total number of magstripe cards which would
migrate to chip based cards by the EMV
905.1 million
21Implementations
Banking and Finance Sector
- Year by which all magstripe cards would be
converted to chip based cards (As proposed by EMV)
2006
22Implementations
Banking and Finance Sector
- Cost to company to manufacture one smart card.
1
23Implementations
Banking and Finance Sector
- Cost to company to purchase and distribute a
smart card reader to the card holder.
12
24Implementations
Banking and Finance Sector
117,660.30 million
25Implementations
Banking and Finance Sector
- Cost to company for manufacturing one RaveCard
1.75
26Implementations
Banking and Finance Sector
- Total cost involved in distributing RaveCards
1,583.93 million
27Implementations
Banking and Finance Sector
- Costs Saved In Issuing RaveCards
10,182.38 million
28Implementations
Banking and Finance Sector
- Money saved by industry (Cost of distribution
Money saved in frauds)
31,787.68 million
- Source www.rainbow.com www.nexdisk.com.
- All Information above calculated assuming 100
penetration.
29Implementations
Banking and Finance Sector
Healthcare Industry
Media Industry
- Similar Implementations have been thought of in
the 450,000 million Healthcare industry and the
798,000 million Media industry.
30Implementations
Introduction
Implementations
What we need?
31What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
32What we need?
Work Performed Till Now.
- Various banks and finance institutions
approached - and awareness about the products generated.
- Working Prototype Up and Running.
- Intensive crash tests performed to check
durability.
33What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
34What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
35What we need?
- Managed Security Service provider (MSS).
Possible Company Structures.
- Generate long term relationships with customers
- by helping them save infrastructural costs
involved - in setting up a proprietary security outfit.
- Targeted towards catering to the high needs in
- BFS market.
- Can consolidate other avenues like Healthcare,
- e-Governance, Defense, Media, etc.
- A BPO dealing with only security.
36What we need?
Possible Company Structures.
- Stand Alone Solution Provider.
- Can pose as a stand alone security solution
provider - by packaging and tailor making Ravelin and
Spectrum - Seek to suit corporations variegated needs.
- Become another fish in the ocean.
37What we need?
Work Performed Till Now.
Possible Company Structures.
Limitations.
The Way Ahead
38What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
39What we need?
- Being a self initiated start up,
- we are highly cash constraint.
- Are not big enough to cater to
- industrys macroscopic demands.
Limitations.
40What we need?
Work Performed Till Now.
Limitations.
Possible Company Structures
The Way Ahead
41What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
42What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
43What we need?
- Apply For Venture Funding.
- Tie up with an existing company dealing
- In the same niche.
- Will not solve the industrys Experience
- requirement.
- A time intensive process.
- Will provide the perfect mix of experience and
- technology and hence enjoy a shorter time to
- market.
- The two companies can work symbiotically
The Way Ahead
44What we need?
Work Performed Till Now.
The Way Ahead
Possible Company Structures
Limitations.
45What we need?
Work Performed Till Now.
Possible Company Structures
Limitations.
The Way Ahead
46Thank You For Attending this Presentation
At This Point of Time I would be Happy to
cater to any questions or suggestions you may
have. Have a Wonderful Evening!