Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
WebShield eP3 Network Overview (02-04-2017)
1. Jonathan Hare
CEO, WebShield Inc.
jonathan@webshield.io
(415) 265-3250
eP3 Network Ecosystem Overview
Empowering People with Privacy and Personalization
www.eP3.network
2. 2
Traditional enterprise-centric security and policy enforcement creates
an inherent conflict between privacy, security and sharing…
…making it fundamentally incapable of enabling personalization
while protecting privacy and security on a global scale.
WebShield Inc.
3. No reliable way for disparate organizations and systems to agree when they are talking about the same person
(either for online users, or records about them)
No robust way to enforce policies or enable personalization without undermining privacy
(enterprises control the “keys” to data, must understand context and monitor activities to enforce policies)
No reliable way to de-identify comprehensive longitudinal records
(genomics, claims, clinical, demographics, online behavior, etc.)
No way to get disparate stakeholders to trust each other with sensitive resources
(can’t agree on policies, commercial terms, or who is in control)
No way to link, analyze or use data without decrypting it somewhere
(who is trusted with the keys for everyone’s data?)
The Fundamental Barrier Enterprise-centric computing Personalization with Privacy
3 WebShield Inc.
4. 4
fragmented islands of data and functionality,
ineffective personalization and process optimization across organizations,
systemic lack of security, privacy and consumer control,
and periodic disasters...
It always ends
the same way
WebShield Inc.
5. 5
We need to try something
different that completely eliminates
the fundamental conflict
between privacy and sharing…
WebShield Inc.
6. 6 WebShield Inc.
New Paradigm: “Quantum Privacy”
obfuscate data so that it is both
- fully opaque (meaningless gibberish)
and
- fully computable (no loss of information)
- at the same time…
simultaneously enforce policies of all stakeholders
at the finest possible level of granularity (‘quantum level’)
before any meaningful data is revealed to anyone (including “insiders”)
7. enables global pooling and analytics of proprietary and regulated data
7 WebShield Inc.
eP3 Network Ecosystem
Empowering People with Privacy and Personalization
open, self-funding and freely available – with privacy and prosperity for all
Unified Trust Model
supports diverse trust criteria for regulatory compliance, audit processes,
commercial terms and access authorization by disparate stakeholders
Trust Network
precision cross-organizational policy enforcement
via certified cloud-based trust authorities
Privacy Network
frictionless privacy-preserving data pooling, cloud
analytics & personalization on a global scale
Quantum Privacy
8. Empowering People with Privacy and Personalization
8
eP3 Network Ecosystem
eP3 Network Ecosystem is an informal multi-sector consortium of non-profits, commercial vendors, standards
organizations, enterprises, research institutions, government agencies and individuals committed to empowering
people with privacy and personalization. This means giving people in every aspect of their lives the ability to:
• find, access and securely share information about them or that they’re authorized to use, and to…
• select policies for privacy and security protection and personalization, while at the same time…
• allowing individuals and society to benefit from shared services for precision personalization,
process optimization, and population research on a global scale.
Non-Profit and Trust Governance Launch Partners
WebShield Inc.
9. WebShield Inc.9
• Software defined ‘neutral zone’ enables privacy-preserving data pooling, analytics and
access authorization on a global scale
- all data is encrypted and anonymized at source, and linked to publisher’s “trust criteria”
- supports analytics or policy enforcement without revealing any information to anyone
• End-to-end attribute-level enforcement of trust criteria
- commercial terms, regulatory compliance, authorized recipients and purposes of use, etc.
- each publisher remains in control of their resources regardless of where they flow
- no data sharing agreements or consent necessary for processing in the ‘neutral zone’
• Trust criteria automatically inherited by aggregates, analytic outputs and user responses
- stakeholder’s policies are consistently enforced on any resources published, and upon
anything directly or indirectly derived from them
- enables global-scale pooling across organizations and people that don’t trust each other
Privacy Network
10. Privacy Network
10 WebShield Inc.
Privacy Network
2952.3367731...
sJ92fKA24sL…
72679426.3166…
82Fa4JiqR3i…
93742157.4126…
We2B381H5…
Privacy
Proxy
Node 1 Node 2 Node N
encrypt
tokenize
randomize
crypto-hash
Input Graph
148.53
148.53
clear
text
Privacy Graph
apply
policies
obfuscatePrivacy
Algorithm
management plane
control plane
data plane
tokenized
randomized
crypto-hashed
429jQk1Mz9…
93742157.4126…
We2B381H5…
{148.53} {dx72Fx92Ua…} {T62p2JsV9sI…}
429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua…
Trust
Authority
Privacy Algorithms
Graphs are broken up into individual values, obfuscated by distributed “privacy pipes”,
then re-assembled into a “privacy graph” made up entirely of opaque tokens.
Privacy graphs are completely opaque and meaningless
to any observer, yet remain fully computable.
Algorithms and policy rules obfuscated by the same
privacy algorithm can be executed upon privacy graph
data without revealing any information to anyone.
Self-describing input graphs
including data, algorithms, schema,
provenance & trust criteria
11. 11 WebShield Inc.
Privacy Network
Privacy
Proxy
Node 1 Node 2 Node N
encrypt
tokenize
randomize
crypto-hash
Input Graph
148.53
148.53
clear
text
148.53
Privacy Graph
apply
policies
obfuscate
enforce
policies
de-obfuscate
Privacy
Algorithm
management plane
control plane
data plane
tokenized
randomized
crypto-hashed
429jQk1Mz9…
93742157.4126…
We2B381H5…
429jQk1Mz9…
{148.53} {dx72Fx92Ua…} {T62p2JsV9sI…}
429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua…
Trust
Authority
Privacy Algorithms
Privacy graph information can be resolved into clear text only after all of the
trust criteria linked to all resources that contributed to creating it are enforced.
• vastly better security and privacy (up to millions of times more secure)
• unlimited aggregation and analysis with no loss of accuracy
• precision access control (single attribute, single recipient, specified purpose, one-time)
• no need to agree on trust criteria
Privacy Network
12. WebShield Inc.12
• Inherently neutral and open – can incorporate any standards or proprietary technologies
- supports any data models, assessment methodologies, trust frameworks, audit standards,
- supports any algorithms, software, technology infrastructure, etc.
• Simultaneous enforcement of disparate policies & regulatory requirements
- payment/licensing terms, privacy, security, authorized recipients, authorized purposes
- HIPAA, CFR 42-2, GLBA, FERPA, IRS 6103, COPPA, FISMA, ISO-2701/2, EU GDPR, etc.
- distributed governance by multiple stakeholders (including the subject of records)
• Certification / accreditation of cloud-based shared services by neutral trust authorities
- data sharing, cybersecurity, analytics, decision support, secure communication, etc.
- FISMA/FedRAMP, EHNAC (18 accreditations programs), SAFE-BioPharma (FICAM), etc.
Unified Trust Model
13. Can dynamically combine any
authentication services into a
personalized many-factor
authentication network that
learns to recognize a user
across devices and through
time with an unprecedented
combination of convenience,
accuracy and privacy.
WebShield Inc.13
Authentication
SMS
Touch IDVoice
Authenticator
Password Device ID
Email ID Verification
Privacy Network
Genomic
Exchange &
Clearinghouse MPIs
Online Device
Profiles
Insurance
Claims Phone
Registries
Insurance
Enrollment
HR
Payroll
Government
Records
ERP/CRM
Postal
Database
Security
Directories
Online
Profiles
In-Person
Proofing
EHR
Records
Labs
Records
Credit
Bureau
Online Device
Profiles
Public
Records
Practice
Management
Professional
Licensing
Trust
Network
Please enter your email address or mobile number:
Mobile Phone
- or -
Email Address
other options…
* Protected by the Privacy Network
✅ Accept Privacy Policies explain
CancelVerify my Identity*
jonathan.hare@me.com
Choose how to authenticate your identity:
◎ Message my Cell Phone AND send me Email
◎ Send me Email AND Google Authenticator
◎ Touch ID on my Cell Phone
` explainCancelAuthenticate Me
Patient Record Request
Digitally Signed
Provider NPI
Patient ID (at Provider)
Deliver to (Direct Address)
Patient Digital Signature
Trust Network
Certified / Accredited Authorization Credentials
• Encrypted with intended recipient’s public key
• Digitally signed by multiple trusted authorities
• Attributes verified with unprecedented assurance
• Linked to privacy-preserving trust authorities for
cybersecurity, regulatory compliance, licensing, etc.
• Eliminates identity theft and cyber-security fraud
Supports convenient global single-sign-on and
high-assurance authentication and authorization,
with no need to remember usernames, passwords
or account numbers.
A diverse network of authoritative data
sources, record-linking algorithms and
consent and authorization services
enables privacy-preserving precision
identity and attribute proofing, record
linking, resource discovery and access
authorization – all without revealing
any personal information to anyone.
14. 14 WebShield Inc.
treating clinicians
& patient
general
public
researchers &
care managers
Data and other resources can be
shared, aggregated and analyzed
in a virtual ‘data ocean’ without
risking the regulatory compliance,
privacy, security or commercial
rights of any participants.
trust
authorities
identity
networks
analytics
networks
data
networks
Data remains obfuscated until all trust criteria are satisfied for all inputs and all
stakeholders, enforced with the finest-grained access control possible – individual
attributes, a single recipient, a specified purpose, one time, on a trusted device
Global Crowdsourcing
Claims
Records
EHR
Records
Lab
Records
Pharmacy
Records
Genomic
Data
Practice
Management
Device
Data
Demographic
Data
Online
Behavior
Other
Records
trust frameworks & brands
algorithms
computing infrastructure
software & cloud services
schemas & data models
Free crowdsourcing and
value-added syndication
via a virtual exchange and
marketplace supports a
self-funding network
freely available to any
participants….
15. Child
Teacher
Clinician
Colleague
Friend
Spouse
any
credential
or relationship
Trusted Social Networking
Privacy Network
WebShield Inc.* Brands shown are for illustration only
any
social media,
messaging clients
or websites
any digital
content
general health education banking children online
My Policies edit my polices JonathanHare cancel
people
devices
security
payments
advertising
messaging
privacy
general
Users and organizations can link privacy and security policies directly to their content
(documents, messages, pictures, videos, web pages, etc.), and freely share it through
standard messaging clients, social media apps, websites and collaboration tools.
Content is encrypted end-to-end
until recipient is authenticated and
authorized, and not revealed to apps
or websites used for sharing.
Neutral trust authorities independently verify the identities, credentials and
relationships of recipients, enabling trusted social networking with built-in
regulatory compliance (HIPAA, FERPA, COPPA, etc.) and rights management.
15
16. Self-funding Network Each additional solution, person or organization pulls in more data, users,
and ecosystem resources, creating a self-reinforcing network effect.
Business Model Enabling global crowd-sourcing of privacy sensitive and proprietary resources
translates into vastly lower costs, free access and unprecedented personalization and privacy.
WebShield Inc.16
in-kind resources
Individuals Enterprisesanonymised data, opt-ins,
online engagement
Consumers and enterprises “pay” for solutions
with cash and/or in-kind resources.
$
$
Solutions
Vendors
licensed
resources
16
17. privacy network
data
personalized
education
personalized
entertainment
identity fraud
prevention
virtual exchange &
marketplace
payment
syndicate
trust
syndicate
identity
syndicate personalized
healthcare
17 WebShield Inc.
$
$
$$
$
$
$
$
$
$
$
Privacy Network Syndicates are virtual joint ventures whose members pool resources to create
value-added services, receiving a share of resulting revenues and/or access to free services…
revenues and in-kind resources generated by syndicates are
allocated among their members based upon agreed-upon
payment and syndication terms….
Enterprises
Individuals
18. eP3 Network Ecosystem
has sweeping implications anywhere that
privacy and trust matters
18 WebShield Inc.
By empowering individuals and eliminating regulatory and commercial barriers to sharing resources, the
eP3 Network cross-fertilizes previously disparate markets into a vast exchange and marketplace with a
common underlying network of users, devices, computing infrastructure, trust authorities and data sources
20. Patient20
Hospital Radiology Imaging Center
Labs
Skilled Nursing
Facility
Pharmacy
Genomics
Consumer
Devices & Apps
Healthcare
Clearinghouses
Clinic Research
Institutions
Commercial
Payers
Federal
Agencies
Privacy Network
Patient-Centered Health - On-demand, Privacy-Preserving, National Scale
• comprehensive patient-centered longitudinal records
• personalized care management & cost, quality and safety metrics
• personalized prior authorization / pre-cert / e-referral management
• patient-centered secure messaging, data access and care coordination
• forgery proof audit trails, virtual audits, automated pre-emptive fraud prevention
WebShield Inc.
21. Patient21
Hospital Radiology Imaging Center
Labs
Skilled Nursing
Facility
Pharmacy
Carebox
VisionTree
Genomics
Consumer
Devices & Apps
Healthcare
Clearinghouses
Clinic Research
Institutions
Consumer Directed Exchange
Network Commercial
Payers
Federal
Agencies
Identity and Authorization
OpenID Connect
OAuth 2.0, SAML
UMA (User Managed Access)
POET (Pre-OAuth Entity Trust)
HEART Profile
Data Exchange
FHIR
Direct Messaging
eHealth Exchange
Blue Button
Privacy Network
Open Standards
WebShield Inc.
22. web phone email tablet
Privacy Network
22
Preemptive Fraud and Abuse Prevention
• better identity screening and
surveillance keeps “bad” guys out
• forgery-proof audit trails keeps
“good” guys honest and productive
• analytics “connects dots” better,
detects fraud and abuse before
delivery or payment
• Pre-payment Virtual Audits are
self-funding, effective, fair, scalable
• Trusted Provider Fast Track builds
compliance into care coordination,
flags and deters inappropriate
utilization before it happens
WebShield Inc.
23. eP3 Network
for Consumer Online and e-Commerce
• Vastly better privacy and security for consumers, dramatically greater revenue for industry.
• Privacy-preserving global single-sign-on and 1-click “Buy Button” enables trusted social
commerce via any messaging client, social media app or website.
• Precision anonymous personalization increases advertising revenue yield 500%+, opens
new markets in personalized services and cross-organizational process optimization.
• User-centric syndication gives consumers convenient access to content they want on any
device at any time, while doubling online revenue for content owners.
23 WebShield Inc.
Eliminating the conflict between privacy and personalization has sweeping implications
24. Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only
Watch Free with Ads
Accept Privacy Protection
Show Policies
The Privacy Network uses information about you to
authorize access to content, protect you from identity
theft, and to enforce privacy policies on the use of
your information and files.
Cancel
explain
1-click Privacy Protection opt-in
First-time users must opt-in to privacy and
cybersecurity protection in order to access
protected content (e.g. a football game).
Opt-in authorizes use of fully obfuscated data
in order to anonymously:
• authenticate user and verify attributes and
relationships.
• detect and verify user devices.
• analyze obfuscated activity logs to detect
identity theft & cyber-security fraud.
• locate and authorize access to user’s
records, accounts and digital media.
• authorize 1-click payments.
• enforce security, privacy and personalization
policies of user and other stakeholders.
better privacy, better security, better personalization
• robust identity theft protection with multi-factor
authentication, identity proofing and cyber-fraud
detection.
• user’s identity and personal data hidden from advertisers,
content owners, apps and websites.
• all user data and activity logging fully obfuscated and
anonymised – no insider access by anyone.
• personal information only revealed if authorized by user.
• all payments information fully tokenized.
The Privacy Network eliminates the conflict between privacy, personalization and convenience
WebShield Inc.24
25. Proving authorization without revealing any personal information to anyone
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only
Watch Free with Ads
Commercial
Credit
Bureaus
Phone
RegistriesProfessional
Licensing
Marketing
Profiles
Data
Aggregators
Fraud
Analytics
Enterprise
Healthcare
Records
Security
DirectoriesEmployer
HR
Retailer
Affinity ProgramsSupply-
Chain
Insurance
Databases
Banking
Records`
CRM
ERP
Government
Education
Records
Public
Records DMV Records
State & Local
Records
IRS
Records
Social Security
Citizenship &
Immigration
Healthcare
Data
Sources
(3) virtual database of obfuscated
and anonymised data used to verify
user’s identity, authorize access
and derive authentication options.
Accept Privacy Protection
Show Policies Cancel
explain
Text my Cell Send me Email
your phone your email- or -
The Privacy Network does not recognize this device.
To authorize access, please enter one of the following:
other options
verify device(415) 265-3250 verify device
(Y4t) rG2-Ua91
xRs4Mw42dAk
baX3yPEq7Nm
(6) obfuscated log
entries returned
(5) User authenticated, which in turn:
• verifies identity, authorizes access
• validates privacy protection opt-in
• registers device to enable subsequent
no-login access and 1-click buy
no personal information revealed to anyone
E9ts S120Ls7V
xRs4Mw42dAk
baX3yPEq7Nm
phone
voice
print
password
Authentication Services
device
fingerprint
email
fingerprint
facial
biometric
(4) passes encrypted authentication
parameters to neutral authentication
services that satisfy authorization
requirements.
(415) 265-3250
jonathan.hare@me.com
FaceBookID 2335135
Trust
Authorities
Y4trG2-Ua91
(2) attributes are obfuscated and
anonymised by Privacy Network
and submitted to Trust Authorities.
Anonymised &
Obfuscated Data
Obfuscated
Computation
Unified
Trust Model
WebShield Inc.25
(1) for first-time users and
unrecognized devices, user enters
any attribute (phone, email, etc.)
that specifies their identity.
26. Individual users gain direct control of privacy and personalization policies
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only
Watch Free with Ads
Accept Privacy Protection
Show Policies Cancel
explain
• Individuals control personal policies that are
enforced globally on records and accounts
held by any participating publisher,
organization or online service.
• Enables consumers to assert their legal
rights to access and share their healthcare
(HIPAA), educational (FERPA), financial and
government records.
• Consumer control with neutral governance
of security, privacy and access control
mitigates regulatory liability of participants.
Accept Privacy Protection
Show Policies
general health education banking children online
My Policies edit my polices Jonathan Hare cancel
people
devices
security
payments
advertising
messaging
privacy
general
Retrieve my records for my personal health network:
Healthcare providers can access my personal health network:
o whenever they are treating me, as long as they are agree to enforce HIPAA.
o only if they have my express consent.
In an emergency, Emergency Room and Ambulance staff may:
o access my complete personal health record network.
o access only my critical health information (e.g. allergies, vaccinations, medications).
o NOT access my personal health vault, even if my life is in jeopardy.
I want to be notified whenever:
o anyone accesses my health records.
o my records are accessed by someone not on my list of authorized providers.
o I do NOT want to be notified – just keep track so I can check later if I want to.
Find and request copies of my health records and store them for me.
Microsoft HealthVaultStore in:
Welcome, Jonathan:
You are now being protected
by the Privacy Network:
26 WebShield Inc.
27. 1-click purchasing anywhere, without privacy or security risks
WebShield Inc.
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only27
• Embeddable “Buy Button” enables 1-click, no-login purchasing – can be linked to any
digital content or online offer.
• No need to reveal sensitive identity or credit card information to verify identity, log
in, create accounts or authorize payments.
• Eliminates identity fraud and cyber-security risks with multi-factor authentication and
identity proofing, forgery-proof audit trails, and global ‘privatized’ fraud analytics.
28. Precision-targeted advertising with “perfect privacy”
28 WebShield Inc.
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
• Enables 500%+ increase in online advertising revenue.
• Anonymised advertising networks can be linked directly to any online content. Ads are
personalized without login, and delivered via any social network, messaging app or website.
• Ad-stream is embedded in content and can’t be detected or blocked by ad-blockers or
non-participating websites or apps.
* Brands shown are for illustration only
29. Global single-sign-on – 1-click access on any registered user device, for any online
content
29 WebShield Inc.
Any Device
Privacy Network
• 1-click access to all purchases, subscriptions and ad-supported content
from any participating retailers and publishers, on any user devices.
• Devices can be provisioned on demand without remembering account
names or passwords or revealing any sensitive information.
• Seamless digital library management across all retailers and publishers.
* Brands shown are for illustration only
30. Any Device
Any Online
Channel
User-centric social commerce and content distribution
Privacy Network
Buy Episode 1 $1.99
Buy Season 1 $15.99
Watch Free with Ads
Hi, Jonathan My Policies
Protected by Privacy Network
Watch Free with Ads
30 WebShield Inc.* Brands shown are for illustration only
• Digital content and e-commerce offers can be freely distributed through any social
media apps, messaging clients or websites.
• Digital content (and embedded ads) can be dynamically personalized without
requiring user login or revealing any sensitive information to anyone.
• Branded “Buy” or “Subscribe” buttons and advertising networks can be embedded in
any online content, offering owners multi-channel distribution without losing control.
31. Any Device
Any Online
Channel
User-Centric Syndication: consumers create their own personal entertainment networks
Privacy Network
Any
Content
Movies
Videos
Games
Digital Media
Messaging
Files
TV
Music
Web Sites
WebShield Inc.31 * Brands shown are for illustration only
• Content owners more than double their online revenues via precision targeted anonymous
ads, free social marketing, and frictionless conversion into purchases and paid subscriptions.
• Consumers choose their own personal bundle of free ad-supported viewing, paid
subscriptions and paid on-demand or purchases.
• Online channels incorporate Privacy Network services to deliver faster performance and
“native” user experience in exchange for a share of advertising and commerce revenues.
32. WebShield Inc.32
April eP3 Network Ecosystem Stakeholder Meetings & Events
April 25th in Washington DC:
• Patient-Centered Data Liquidity and Regulatory Compliance
• Sponsored by EHNAC, SAFE BioPharma Association, NH-ISAC
April 26th in Washington DC:
• Consumer Empowerment and Privacy Protection
• Veterans Health, Education and Student Privacy, Child Safety, Identity & Privacy for
BlockChain, Legislative Opportunities, etc.
• Organized by moderators, speakers from IEEE, Society for Women’s Health, Future of
Privacy Forum, Veterans Prostate Cancer Awareness, etc.
April 27th - 28th in Washington DC:
• Health Datapalooza Start-up Panel, Consumer Directed Exchange Exhibit Hall