SlideShare une entreprise Scribd logo
1  sur  20
IwatelInnovative VoIP Applications 1
The IP Communications extensions The same IP technology that enables IP Communications solutions to: Boost productivity Increase mobility Enhance flexibility Also creates additional MANAGEABLE challenges for information security These new challenges exist : The Beepcard…
Future ahead ……………... The Beepcard Calling/PrepaidCard
A new customer experience
Single Sign-OnUsing Smart CardAuthentication
Comparison to PSTN In many ways PSTN is good with respect to toll fraud Still a very large amount of toll fraud on PSTN No voice crypto  Person in wiring closet can listen to calls Anyone willing to poke around can listen to calls Caller ID is bogus 	Anyone can produce fake caller id for a few hundred dollars Is the security of the PSTN good enough? Will you give you credit card number over the telephone? Discuss a merger?
The BeepcardA unique solution for vocal services  The ideal tool for telephone reception programs Access to vocal services requires that the customer be identified upstream.  This takes place either through the use of the buttons on the telephone for DTMF vocal applications or the use of voice for the voice recognition version. In order to facilitate and secure identification, Iwatel offers the Beepcard, the authenticator that generates a dynamic sound password : the sound sequences are simply carried over the telephone network.
An authenticator for VoIP  With voice over IP, the information and telephone systems come together, allowing companies to enrich the services that are provided on the vocal applications for their customers and/or employees. However, this opening into the outside world brings with it risks in terms of network security. The primary risk involves identity theft : hackers can get into a badly-protected network and gain access to confidential information pertaining to customers and employees. In order to secure vocal applications on IP, Iwatel offers a strong (double factor) authentication solution. The user that wants to access the vocal services prove this identity using the dynamic sound password produced by his Beepcardand an a code (authenticated by voice recognition). Security is ensured because the user is authenticated using an object that he alone has and using a code that only he knows.
The strong authentication server Iwatel’s Server is an advanced security administration solution, offering a modular and extensible solution for centrally managing identities and rights, in compliance with the entire distributed security policies.
Quick Return On Investment...  ...pertaining to customer relations  Costs pertaining to fraud are reduced thanks to secured access   Portray an innovative image  Opening up of new, richer services Quickly deployed thanks to its card format  Multi-component card, able to incorporate several means of authentication  Rechargeable cards actually render extra revenue from the recharge  residual  fees to retailers ... and for VoIP  Reduce the risk of intrusion  Enrich the services offered from telephone sets  Provide mobile employees with access to their entire office  Offer an ergonomic and attractive solution  Preserve the company's image  ... and from Iwatel IUCS side Reduction in the work load of "help desk" employees and administrators.  30% reduction in security system operating costs  Economical, fast and safe deployment for a secure IT environment, which participates in increasing the overall level of competitiveness.
Beepcard Simplify and secure multi-channel electronic exchanges  Very simple operation The Beepcard is an authenticator, and its ISO banking card format allows it to be easily carried in a wallet. 	Containing a microprocessor, battery, speaker, mike and a button, the Beepcard is a real concentration of technologies.  A simple press of the button generates a sound : this is the dynamic password that can be directly read by a microphone.  The dynamic password, to which is added the card user's identifier, is then sent to the authentication server over the network to which the device (fixed telephone or cell phone, PC, PDA, etc.) equipped with a microphone is connected.
Multiple Applications With its extremely high degree of security, it can open up access to many applications: identification and authentication at call centers, purchases over the phone or over the internet, financial transactions over the phone (bank wire transfers, payments, etc.), use of prepaid services (telephone communication, pay per view, gift cards, etc.), connection to a private company network, etc.
Multiple Applications (cont’) Available as an option, software modules make implementing applications easy:  Web : secure access to internet and intranet applications.  Keys : the password safe for secure access to the internet and intranet, and access in Radius mode.  Phone : authentication for vocal servers.
How is it working 1Payment       session 2 …Call IVR    1-800-xxx 4Press Card 5Press PIN 6Authentication 7OK…. Secured LAN DB 3Ask for   ID &PIN Pay-card WEB Server IVR Server  PHONE    WEB
SimulationMicrophone + Speaker + Knowledge Verification  Knowledge Voiceover Telephone “Send Acoustic Signal” Authenticate Knowledge “User Speaks password” VoicePrints Data Center “Dial Access Number” Biometric Biometric Authenticate Voice Accept “Card is now active” Authorization acknowledged Enjoy your call!
System automatically recharges credit
Schematic Start service End service Welcome announcement Input account voice password Input tour acoustic signal Origin & Destination screening Remaining credit/time Message  Yes No Publicity Message (option) Follow-on call Present User Menu Remaining credit message To call To menu B-party release Message recording Call Setup BUSY/NO REPLY CONNECT CONVERSATION Real time credit check A-party release To menu choices Credit exhausted Enable/Disable possible
EnjoythisVideo
TO BE REMEMBERED  ,[object Object]
Vulnerability of vocal applications, especially VoIP ones

Contenu connexe

Tendances

Strength of predictive dialer software
Strength of predictive dialer softwareStrength of predictive dialer software
Strength of predictive dialer softwareLeadsRain
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
 
Sestek presentation 2014
Sestek presentation 2014Sestek presentation 2014
Sestek presentation 2014Mustafa Kuğu
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29evancmiller
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactionslfilliat
 
Sestek voice biometrics
Sestek voice biometricsSestek voice biometrics
Sestek voice biometricsMustafa Kuğu
 
REVE Systems-Company Profile
REVE Systems-Company ProfileREVE Systems-Company Profile
REVE Systems-Company ProfileREVE Systems
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...S&T GROUP
 
Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?Rambus Inc
 
Презентация компании Siemens "Система контроля и управления доступом Aliro"
Презентация компании Siemens "Система контроля и управления доступом Aliro"Презентация компании Siemens "Система контроля и управления доступом Aliro"
Презентация компании Siemens "Система контроля и управления доступом Aliro"journalrubezh
 
Smart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC PaymentSmart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC PaymentSazzadur Rahaman
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
The Impact of HCE on NFC Adoption
The Impact of HCE on NFC AdoptionThe Impact of HCE on NFC Adoption
The Impact of HCE on NFC AdoptionPaula Hunter
 

Tendances (19)

Strength of predictive dialer software
Strength of predictive dialer softwareStrength of predictive dialer software
Strength of predictive dialer software
 
Ivr system
Ivr systemIvr system
Ivr system
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Sestek presentation 2014
Sestek presentation 2014Sestek presentation 2014
Sestek presentation 2014
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
Sestek voice biometrics
Sestek voice biometricsSestek voice biometrics
Sestek voice biometrics
 
REVE Systems-Company Profile
REVE Systems-Company ProfileREVE Systems-Company Profile
REVE Systems-Company Profile
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
Konvergenca podira zakone klasične komunikacije, Miro Faganel in Matija Brgle...
 
Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?Host Card Emulation in Android: What Does it Mean?
Host Card Emulation in Android: What Does it Mean?
 
Presentation1
Presentation1Presentation1
Presentation1
 
Презентация компании Siemens "Система контроля и управления доступом Aliro"
Презентация компании Siemens "Система контроля и управления доступом Aliro"Презентация компании Siemens "Система контроля и управления доступом Aliro"
Презентация компании Siemens "Система контроля и управления доступом Aliro"
 
Smart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC PaymentSmart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC Payment
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
The Impact of HCE on NFC Adoption
The Impact of HCE on NFC AdoptionThe Impact of HCE on NFC Adoption
The Impact of HCE on NFC Adoption
 

En vedette

Windows Azure Platform - The Color of Cloud Computing
Windows Azure Platform - The Color of Cloud ComputingWindows Azure Platform - The Color of Cloud Computing
Windows Azure Platform - The Color of Cloud ComputingGeorge Kanellopoulos
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerGeorge Kanellopoulos
 
Windows Azure & How to Deploy Wordress
Windows Azure & How to Deploy WordressWindows Azure & How to Deploy Wordress
Windows Azure & How to Deploy WordressGeorge Kanellopoulos
 

En vedette (6)

Windows Azure Platform - The Color of Cloud Computing
Windows Azure Platform - The Color of Cloud ComputingWindows Azure Platform - The Color of Cloud Computing
Windows Azure Platform - The Color of Cloud Computing
 
Winner Never Quit
Winner Never QuitWinner Never Quit
Winner Never Quit
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform Installer
 
Leader
LeaderLeader
Leader
 
Ipcbu0903 B
Ipcbu0903 BIpcbu0903 B
Ipcbu0903 B
 
Windows Azure & How to Deploy Wordress
Windows Azure & How to Deploy WordressWindows Azure & How to Deploy Wordress
Windows Azure & How to Deploy Wordress
 

Similaire à Audio card - VoIP - Phonecard

Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 
Airtel IQ: Transforming customer engagement by embedding real-time communicat...
Airtel IQ: Transforming customer engagement by embedding real-time communicat...Airtel IQ: Transforming customer engagement by embedding real-time communicat...
Airtel IQ: Transforming customer engagement by embedding real-time communicat...Alan Quayle
 
Airtel IQ - Transforming customer engagement with omni-channel communications
Airtel IQ - Transforming customer engagement with omni-channel communicationsAirtel IQ - Transforming customer engagement with omni-channel communications
Airtel IQ - Transforming customer engagement with omni-channel communicationsIshan Bansal
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyCagdas Tanriover
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 
Elision profile
Elision profileElision profile
Elision profiledialshree
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber SecurityArtanContracting
 
VoIP4Cloud company brochure
VoIP4Cloud company brochureVoIP4Cloud company brochure
VoIP4Cloud company brochureVoIP4Cloud
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profilersaini12
 
Sanketik Proposal for Bangaladesh
Sanketik Proposal for BangaladeshSanketik Proposal for Bangaladesh
Sanketik Proposal for BangaladeshVijay kumar Gupta
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Sentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationSentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationVentureBeat
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths DebunkedJive Communications
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 

Similaire à Audio card - VoIP - Phonecard (20)

Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
Airtel IQ: Transforming customer engagement by embedding real-time communicat...
Airtel IQ: Transforming customer engagement by embedding real-time communicat...Airtel IQ: Transforming customer engagement by embedding real-time communicat...
Airtel IQ: Transforming customer engagement by embedding real-time communicat...
 
Airtel IQ - Transforming customer engagement with omni-channel communications
Airtel IQ - Transforming customer engagement with omni-channel communicationsAirtel IQ - Transforming customer engagement with omni-channel communications
Airtel IQ - Transforming customer engagement with omni-channel communications
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
Elision profile
Elision profileElision profile
Elision profile
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
VoIP4Cloud company brochure
VoIP4Cloud company brochureVoIP4Cloud company brochure
VoIP4Cloud company brochure
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
 
Sanketik Proposal for Bangaladesh
Sanketik Proposal for BangaladeshSanketik Proposal for Bangaladesh
Sanketik Proposal for Bangaladesh
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Sentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition PresentationSentegra MobileBeat 2010 Startup Competition Presentation
Sentegra MobileBeat 2010 Startup Competition Presentation
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Audio card - VoIP - Phonecard

  • 2. The IP Communications extensions The same IP technology that enables IP Communications solutions to: Boost productivity Increase mobility Enhance flexibility Also creates additional MANAGEABLE challenges for information security These new challenges exist : The Beepcard…
  • 3. Future ahead ……………... The Beepcard Calling/PrepaidCard
  • 4. A new customer experience
  • 5. Single Sign-OnUsing Smart CardAuthentication
  • 6. Comparison to PSTN In many ways PSTN is good with respect to toll fraud Still a very large amount of toll fraud on PSTN No voice crypto Person in wiring closet can listen to calls Anyone willing to poke around can listen to calls Caller ID is bogus Anyone can produce fake caller id for a few hundred dollars Is the security of the PSTN good enough? Will you give you credit card number over the telephone? Discuss a merger?
  • 7. The BeepcardA unique solution for vocal services The ideal tool for telephone reception programs Access to vocal services requires that the customer be identified upstream. This takes place either through the use of the buttons on the telephone for DTMF vocal applications or the use of voice for the voice recognition version. In order to facilitate and secure identification, Iwatel offers the Beepcard, the authenticator that generates a dynamic sound password : the sound sequences are simply carried over the telephone network.
  • 8. An authenticator for VoIP With voice over IP, the information and telephone systems come together, allowing companies to enrich the services that are provided on the vocal applications for their customers and/or employees. However, this opening into the outside world brings with it risks in terms of network security. The primary risk involves identity theft : hackers can get into a badly-protected network and gain access to confidential information pertaining to customers and employees. In order to secure vocal applications on IP, Iwatel offers a strong (double factor) authentication solution. The user that wants to access the vocal services prove this identity using the dynamic sound password produced by his Beepcardand an a code (authenticated by voice recognition). Security is ensured because the user is authenticated using an object that he alone has and using a code that only he knows.
  • 9. The strong authentication server Iwatel’s Server is an advanced security administration solution, offering a modular and extensible solution for centrally managing identities and rights, in compliance with the entire distributed security policies.
  • 10. Quick Return On Investment... ...pertaining to customer relations Costs pertaining to fraud are reduced thanks to secured access Portray an innovative image Opening up of new, richer services Quickly deployed thanks to its card format Multi-component card, able to incorporate several means of authentication Rechargeable cards actually render extra revenue from the recharge residual fees to retailers ... and for VoIP Reduce the risk of intrusion Enrich the services offered from telephone sets Provide mobile employees with access to their entire office Offer an ergonomic and attractive solution Preserve the company's image ... and from Iwatel IUCS side Reduction in the work load of "help desk" employees and administrators. 30% reduction in security system operating costs Economical, fast and safe deployment for a secure IT environment, which participates in increasing the overall level of competitiveness.
  • 11. Beepcard Simplify and secure multi-channel electronic exchanges Very simple operation The Beepcard is an authenticator, and its ISO banking card format allows it to be easily carried in a wallet. Containing a microprocessor, battery, speaker, mike and a button, the Beepcard is a real concentration of technologies. A simple press of the button generates a sound : this is the dynamic password that can be directly read by a microphone. The dynamic password, to which is added the card user's identifier, is then sent to the authentication server over the network to which the device (fixed telephone or cell phone, PC, PDA, etc.) equipped with a microphone is connected.
  • 12. Multiple Applications With its extremely high degree of security, it can open up access to many applications: identification and authentication at call centers, purchases over the phone or over the internet, financial transactions over the phone (bank wire transfers, payments, etc.), use of prepaid services (telephone communication, pay per view, gift cards, etc.), connection to a private company network, etc.
  • 13. Multiple Applications (cont’) Available as an option, software modules make implementing applications easy: Web : secure access to internet and intranet applications. Keys : the password safe for secure access to the internet and intranet, and access in Radius mode. Phone : authentication for vocal servers.
  • 14. How is it working 1Payment session 2 …Call IVR 1-800-xxx 4Press Card 5Press PIN 6Authentication 7OK…. Secured LAN DB 3Ask for ID &PIN Pay-card WEB Server IVR Server PHONE WEB
  • 15. SimulationMicrophone + Speaker + Knowledge Verification Knowledge Voiceover Telephone “Send Acoustic Signal” Authenticate Knowledge “User Speaks password” VoicePrints Data Center “Dial Access Number” Biometric Biometric Authenticate Voice Accept “Card is now active” Authorization acknowledged Enjoy your call!
  • 17. Schematic Start service End service Welcome announcement Input account voice password Input tour acoustic signal Origin & Destination screening Remaining credit/time Message Yes No Publicity Message (option) Follow-on call Present User Menu Remaining credit message To call To menu B-party release Message recording Call Setup BUSY/NO REPLY CONNECT CONVERSATION Real time credit check A-party release To menu choices Credit exhausted Enable/Disable possible
  • 19.
  • 20. Vulnerability of vocal applications, especially VoIP ones
  • 21. Strong authentication to secure application access
  • 22. Beepcard is both an authentificator and loyalty tool
  • 23.