Title: Corporate Overview
1Corporate Overview
PROTEXX Inc. - A Joint Venture of Dynamic
Encryption Inc, NXCONN Wireless LLC, and Horizon
Wi-Fi.com LLC Our Network Operations Center NOC
is located in Plainview New York with additional
offices in Florida and Connecticut For
information Call 561 306 0605
2 The Management Team
Peter Letizia Director Founder Dynamic
Encryption Tunnel Inc Bill Tabor Director CTO
Dynamic Encryption Tunnel Inc Don Bonafazio
Director President NXCONN Wireless LLC Mark L
Myers Director Partner Horizon Wi-Fi Gene
Feher Director Partner Horizon Wi-Fi Ken
McClenithan Director Partner Horizon Wi-Fi
3Problem Statement
- Dramatic Issues Facing our World Successful and
Costly attacks upon life, property and
information!! - These attacks include
- Terrorism
- Theft of data
- Identity theft
- Denial of service
- Transaction redirection
- Misuse of data
- Fraud
- Theft of service
4These issues resulted from
- Absence of positive, persistent identification
of an - individual due to
- Weak, poorly designed or absence of
authentication - (identification) systems
- Inadequate local operating system/distributed
server - protection of user names, key files and
password files - Inadequate application and data security due to
- Inadequate authorization controls (local and
remote) - protecting corporate assets
- Local information sitting unprotected in text
files and - database records (tables)
5Our Vision
- Enable our customers to be absolutely sure of
three things - To whom they grant access (positive
identification of the - requestor)
- The services permitted once access is granted
(exactly those - services required by the requestor to
complete a task no - more, no less)
- Application, infrastructure and data security
6Our Approach
- VMS For Outward Facing Systems
- VMS with DCE For Integration Connectivity
- Apache Pass-through Sign-in to DCE
- DCE Single Sign On
- DCE GUI Administration Terminal (Under
Development)
7Single Site Secure Access
8Multiple Site Security
9Secure System Provider
- Biometric Secure Identification
- Secure Instant Messaging and File Transfer
- Public Key Infrastructure (PKI) Services
- Custom Software Services
- Consulting Services
- Educational Services
10Partner with Compaq
- CSA Partner
- Global Systems Reseller (PCs and Alpha)
- Value Added Reseller
- Technology Partner
- Consulting Partner
- OpenVMS Systems Integrator
11Following Markets Focus
- Medical/Pharmaceutical/Healthcare
- Telecommunications Service Providers
- Government (DOD)
- Financial
- Security
- Legal
12Enterprise Security Perspective
- Secure the Computing and Facilities Perimeters
- Secure Information at Rest
- Secure Information in Transit
- Enable Digital Rights Management of Information
13Value Add for Partners
- Senior Staff Member Expertise
- Secure Software Architecture, Design and
Development - Network Configuration and Management
- Biometric Engineering
- Systems Integration and Consulting
- SyntheSys Products Built on or Ported to Compaq
Platforms - Exceptionally Strong OpenVMS Base
- Exceptionally Strong Compaq Hardware Base
- One of Twelve OpenVMS System Integrators
- CSA Partner
14PROTEXX Secure Products
- Biometric Fingerprint Authentication Card
- JabCast Secure Realtime Communications (SRC)
Suite - JabCast Low Bandwidth Monitoring
- PKI Trust Centers (idTRUST)
Generate a Public/Private Key Pair
15Biometric Secure ID
Protexx Biometric Card Features and
Characteristics
- Credit card sized Smart Card with on-card
crypto processor - Maintains protected storage for public/private
keys, Digital - Certificates and Digital Signatures to be used
during - authentication process
- Executes Cryptographic Operations on Card
(verifies fingerprint) - works in conjunction with Card
- Operating System (COS)
16Biometric Secure ID Card
Biometric On-Card Components
32-bit Microprocessor (Microcontroller)
ISO 7816 Family of Smart/Crypto Card Standards,
i.e., power, Clock I/O Bus
RAM 2K Bytes
Crypto Accelerator (Processor)
ROM 32K Bytes
EEPROM 64K Bytes
17Biometric Secure ID Card
The Biometric Card Process
- User enrolls in the Biometric process
- Card maintains encrypted hash copy of users
fingerprint in - EEPROM
- To authenticate user places the correct finger
on the optical reader - The fingerprint is scanned, hashed and encrypted
- The crypto processor compares the fingerprint
sample to the stored value - Card will return success or failure status to
system
18Biometric Secure ID Card
Immediate Uses for Biometric Smart Card
Authenticate and Prove Absolute Identity of Card
Holder
Potential Future Biometric Smart Card Uses
- Passports (via Distributed Information
Databases) - Credit Card Verification Approval
- Storage of Loyalty Points (frequent flyer, etc.)
- Pharmaceutical/Medical History
- Credit or Debit Bankcard
- Drivers License
19Biometric Secure Identity Card
Example
Control signal Open door/authorization failure
Secured testing room door
Authentication information
door controller
authorization database
20Biometric Secure Identity Card
Card Customization Capabilities
- Multiple processors (4, 6, 8, etc.)
- Mix and match 8, 16 and 32 bit processors for
- focused tasks
- Memory (Inter-processor and processor specific)
- Multiple custom data structure (application and
- processor)
- Potentially contact-based and contact-less cards
21JabCast SRC Product Features
- Secure realtime communications protocol IP
based - Secure realtime instant message delivery
- Secure realtime file delivery
- Senders address hidden from view path hiding
- Presence management (follow the user approach)
- Architected on XML/Open Source Jabber protocol
- Integration of JabCast protocol into application
- infrastructures
22JabCast SRC Product Features
- Multi-platform support Compaq servers
- ProLiant
- OpenVMS
- TRU64 UNIX
- Full range of client devices
- Desktops ? Laptops
- Hand Helds
- Cell Phones
- Installation and technical support services
- Training and documentation services
23JabCast SRC Implementation Example
24Protexx PKI Product Suite
- idTRUST (PKI) suite of applications required
to securely - manage business processes
- idSEND verifies receipt and successful
delivery of - messages
- idSIGN XML based secure application ensuring
- immutability of e-documents and forms through
use of - digital signatures
- idDOC work flow management tool enabling
creation, - access and tracking of e-documents
25Protexx PKI Product Suite
- idSAFE platform to ensure transport and
management - of data in transit (VPN)
- idVOTE a product enabling Internet voting via
secure - voter authentication
- idSEAL smart encryption tool enabling the user
to - encrypt and decrypt individual files
26Why Use Cryptography?
- Cryptography can be applied to the following
information categories - Information at Rest
- Information in Transit
- Cryptography is used to enable information
- Privacy information cannot be read
- Integrity information cannot be modified
- Authentication information proof of ownership
- Non-repudiation cannot deny involvement in
- transaction
27Asymmetric Key Cryptography
Different keys (secrets) are used for both the
encryption and decryption processes
Asymmetric key cryptography is characterized by
the use of two independent but mathematically
related keys
28Public/Private Key Generation
Local Application Browser Remote Server
29idTRUST PKI Infrastructure
Why is a PKI Infrastructure Necessary?
- Optional key generation
- Validate initial identities
- Issuance, renewal and termination of
certificates - Certificate validation
- Distribution of certificates
- Secure archival and key recovery
- Generation of signatures and timestamps
- Establish and manage trust relationships
30idTRUST PKI Infrastructure
What has blocked PKI from global use?
- Cost
- PKI Integration with vertical application base
- CA portability and interoperability
31Trust Center Hierarchy
32idTRUST Customer Options
- On-Site Purchase
- On-Site Lease
- Service Agreement (Application Service Provider
- Model)
33Protexx Professional Services
- Biometric Smart Card, Trust Center and PKI
Integration - Secure Application Design, Development and
Implementation - Enterprise Security Services
- Custom Software and Consulting Services
- Technical Support (Hotline and On-site)
- Project Management
- Training and Education
34Security Services
- Security Inventory Service
- Security Policies and Procedures Guide
Development - Security Audit/Assessment Service
- Security Vulnerability Service
- Security Implementation Service
- Disaster Recovery Services
35Security Audit Service
Task
Review existing corporate security practices
pertaining to
- Day-to-day enterprise computing
- Perimeter security (authentication, identity and
authorization) - Information at rest
- Information in transit (distributed computing,
file transfer, etc.) - Business applications software and email usage
- mobile computing
- Management security directives
- Corporate security policy and procedure
guidelines - Compliance with appropriate legislation
36Security Audit Service
Deliverables
Deliver documents declaring existing security
preparedness
- An inventory document defining the current sate
of - enterprise security methods, techniques,
corporate - compliance and usage
- A document defining next steps in the overall
process of - defining a current corporate security strategy
and - implementation plan
- Requirements Analysis document
- Security Architecture document
- Security Products and Implementation plan
37Educational Services Tech Training
- Modern Security Practices
- Authentication/Perimeter Security
- Trust Center and PKI Integration
- Secure Distributed Architectures
- Secure Middleware Integration
- CORBA
- DCE
- Programming Languages
- C
- Java/JavaScript
- Perl
38Protexx Inc.
Concerned ! Dedicated ! Confident !
Thank You!
www.ProtexxInc.com 203 559 9860