SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
sterile area
VRR
Dynamic Identification
• pseudonym
• unique
  dynamic
  code
• set of
  obligatory
  requisites
• set of users
  requisites
• BigMax15
• 6DF73AC747
  EFD370…
• 19.10.2011
  multiple
  ……
• limit=$250
  ……
Primary
archive
Primary
archive
s
PUBLIC
           FRIENDS ONLY

  FAMILY ONLY
                   BANK ONLY

         ME ONLY


            DESCENDANTS
                ONLY
Relatives




  Colleagues




Business-partners



                          ICQ        Skype
                    SMS         E-mail        POST
                                             OFFICE
Complementary (logical)
          protection schemes


 during every new session the user proves the legitimacy
of the previous one;
 the user is notified about all major activities from
independent channels chosen by him- or herself;
 for the conduction of important operations a quarantine
period is introduced between the moment of giving the
command and its implementation (during this time the
users in question can get all the information about the
forthcoming operation through other independent
channels and if necessary can block its implementation);
Complementary (logical)
            protection schemes



 the used banking accounts have a limited list of payment
addressees (therefore the intruder to the system will be
unable to transfer money to his or her own account);


                      Consequence

The toolbox the user is provided with will make him or her
legally accountable for the operations conducted in the
electronic environment with the help of VVR.
Intermediate result
Intermediate result
 we generated a sterile communication area,
 where communication subjects are represented
 by their virtual robot-residents (VRR);


 we gave users a convenient identifiable
 assistant, which will perform many routine
 operations for its owner;


 we built a simple system of communications
 between robots;
Intermediate result
  we localized the human factor having excluded
 any possibility to carry out illegal operations in
 the sterile area;


 we completely simplified user authentication
 during his contact with his VRR.



 we protected the user’s personal date in the
 system
Internet Authentic   Internet Free
Thank you

      Nadya Onishchenko
    08.02.nnn@gmail.com

Contenu connexe

Similaire à Internet Authentic. Ecosystem “a la Russe”

Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
IJERA Editor
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
IS Decisions
 

Similaire à Internet Authentic. Ecosystem “a la Russe” (20)

BOTNET
BOTNETBOTNET
BOTNET
 
IRJET- A Decentralized Voting Application using Blockchain Technology
IRJET- 	 A Decentralized Voting Application using Blockchain TechnologyIRJET- 	 A Decentralized Voting Application using Blockchain Technology
IRJET- A Decentralized Voting Application using Blockchain Technology
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksSecure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
 
Creating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using BlockchainCreating An E-Commerce web application using Blockchain
Creating An E-Commerce web application using Blockchain
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Blockchain technology ppt
Blockchain technology pptBlockchain technology ppt
Blockchain technology ppt
 
Review 1 Multi Level Banking (1).pptx
Review 1 Multi Level Banking (1).pptxReview 1 Multi Level Banking (1).pptx
Review 1 Multi Level Banking (1).pptx
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Presenta zcondemo
Presenta zcondemoPresenta zcondemo
Presenta zcondemo
 
Presentaz
PresentazPresentaz
Presentaz
 
The next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environmentThe next stage of the mnp service development in convergence environment
The next stage of the mnp service development in convergence environment
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networks
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Internet Authentic. Ecosystem “a la Russe”

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10. VRR
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21. • pseudonym • unique dynamic code • set of obligatory requisites • set of users requisites
  • 22. • BigMax15 • 6DF73AC747 EFD370… • 19.10.2011 multiple …… • limit=$250 ……
  • 23.
  • 24.
  • 25.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. s
  • 33. PUBLIC FRIENDS ONLY FAMILY ONLY BANK ONLY ME ONLY DESCENDANTS ONLY
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Relatives Colleagues Business-partners ICQ Skype SMS E-mail POST OFFICE
  • 39. Complementary (logical) protection schemes  during every new session the user proves the legitimacy of the previous one;  the user is notified about all major activities from independent channels chosen by him- or herself;  for the conduction of important operations a quarantine period is introduced between the moment of giving the command and its implementation (during this time the users in question can get all the information about the forthcoming operation through other independent channels and if necessary can block its implementation);
  • 40. Complementary (logical) protection schemes  the used banking accounts have a limited list of payment addressees (therefore the intruder to the system will be unable to transfer money to his or her own account); Consequence The toolbox the user is provided with will make him or her legally accountable for the operations conducted in the electronic environment with the help of VVR.
  • 42. Intermediate result we generated a sterile communication area, where communication subjects are represented by their virtual robot-residents (VRR); we gave users a convenient identifiable assistant, which will perform many routine operations for its owner; we built a simple system of communications between robots;
  • 43. Intermediate result we localized the human factor having excluded any possibility to carry out illegal operations in the sterile area; we completely simplified user authentication during his contact with his VRR. we protected the user’s personal date in the system
  • 44. Internet Authentic Internet Free
  • 45.
  • 46. Thank you Nadya Onishchenko 08.02.nnn@gmail.com