Towardsa next generation secure internet

erosjellySécurité

23 févr. 2014 (il y a 3 années et 5 mois)

77 vue(s)

Innovation

Towards

a next generation secure
internet

Private
Application
Ecosystems

Sanjay
Deshpande

CEO and Chief Innovation Officer

Center

So what’s wrong with the Internet!! (Nothing???)

It’s
almost free!


Anyone can use it (no permissions required for accessing it!)


It’s available and pervasive (almost everywhere now)


Anyone can create any website, put any content, on
any
server, with
any
IP address with
absolutely NO GOVERNMENT CONTROL!


Its freedom and democracy at its best!

www.u n i ke n.c o m

The Inter
-
network


A US Defense (DARPA) initiative that was commercialized and adopted
(blindly) by the mainstream enterprises

Source: Wikipedia

4

© Copyright 2010 UNIKEN Inc. All rights reserved

www.uniken.com

The Trust (?) Model

Hardware

[PC/Mobile/Tablets]

Operating Systems

Browsers

[APP
-
Viewers]

DNS

[Server Location]

Certification Authority Ecosystem

[Server Identity]

TCP/IP {or UDP}

[Data Transport]

User Identity

[
Login/Password
/

OTP/Biometric
]

Service and User Categorization on the Internet

www.uniken.com

Services that DO NOT
require
security and
privacy/secrecy

Users who do not care for
privacy or security

Services
that require
security and privacy

Users who CARE about
Privacy and Secrecy

The current Internet Application Model is Broken.

Period.



No matter what you do on top of it, it will remain
vulnerable to attacks if it is used for services that it
was never designed for!

THE FUNDAMENTAL PROBLEM






The

current

internet/intranet

(TCP/IP

or

UDP)

based

client
-
server

application

model

does

not

provide

a

trusted

ecosystem

for

authenticated

communication

between

the

client

and

server

(or

Application

to

Application

authentication

and

secrecy)


IS IT TIME TO RELOOK AT THE BASIC COMPUTING
TECHNOLOGIES THAT CAN CATER TO SPECIFIC NEEDS
ARISING OUT OF HIGH SECURITY COMPUTING
APPLICATIONS?




DO WE NEED A RADICALLY NEW APPROACH TO CREATE A
NEXT GENERATION

HIGH
-
SECURITY COMPUTING INFRASTUCTURE?



What if there was a way to create a

Private Application Ecosystem
which enabled

hi
-
touch and ubiquitous user experience across devices
over a
massively scalable

Private Communication Channels/Circuits
with

End
-
to
-
End Military Grade Security
?

REL
-
ID ECO: A SECURE PRIVATE APPLICATION ECOSYSTEM

The REL
-
ID ECO
-

Secure Private Application Ecosystem
-

is

a
closed ecosystem
wherein the
applications (services),
enterprise
data, devices
and
underlying
communication
within this ecosystem

are
completely private
, secure and
not
accessible (or even visible) to the outside
world.


Only authorized users, applications and devices can have access to this Private
Application Ecosystem.


[Note: This break
-
through technology has been developed and patented, over several years of R&D in the UNIKEN INNOVATION CENTER]
.

Private Application
Ecosystem

Private Communication Circuit

App
-
Viewer

Desktop/Laptop

APPS/Widgets

Enterprise

HTML5

Quick Apps

HYBRID

APP

TECHNOLOGY


Tablets/Smart
Phones


Device Binding

2
-
Factor Authentication

Containerization

Always On

Mutual Authentication

MITM Proof

Encrypted Channels

Location Based Services


DATE | 03042013

TIME | 0030HRS

Special Purpose

Secure Enterprise Computing

Appliance

Biometric Authentication

(optional)

Additional Smart Card

Authentication (optional)

Memory device with an invisible secure space. Secure data storage
. With
the rise in security threats related to theft of critical enterprise
information the need for a high
-
performance portable secure
memory device
is quite evident. Uniken’s innovation center has developed a secure
memory device which ensures that sensitive high
-
value data

and
applications are protected.

REL
-
ID SECURE PORTABLE MEMORY
DEVICE

INDIA PRIVATE (SECURE) INTERNET!

A CLOSED PRIVATE APPLICATION ECOSYSTEM FOR CRITICAL NATIONAL

ASSETS AND ENTERPRISES

MEET US AT THE
UNIKEN

BOOTH IF YOU WANT TO KNOW
MORE,
OR EVEN IF YOU DISAGREE WITH US!


IN EITHER CASE WE WOULD LIKE TO TALK TO YOU.





THANK YOU!

Secure Private Application Ecosystem

Container

Secure App
-
Viewer

Mutually
-
Authenticated, Encrypted & Tunneled Pipe

Secure

Data Store

Device Signature

Device

3
rd

Party Apps

OS

2FA/3FA

R
E
L

I
D


G
A
T
E

REL
-
ID

ECO

PLATFORM

Enterprise

Application

Data

Center

Desktops/Laptops/Tablets/
SmartPhones

[Windows,
iOS
, Android,
MacOS
, Linux]

Command Center

Private Communication Channel/Circuit

[Internet/Intranet]

REL
-
ID Private Communication Channel
(R
-
PCC)

Mutually

Authenticated

Communication

Handshake

(MITM

Proof)


Encrypted

Communication

(optional),

High
-
Speed

and

Concurrent


Horizontally

Scalable

(
Millions

of

End
-
Points
)


Assets

behind

R
-
PCC

are

not

visible

to

the

Internet

and

hence

protected

from

various

attacks


Requires

zero

admin

privileges

on

end
-
user

devices


Is

created

ON
-
DEMAND


Is

agnostic

to

the

underlying

NETWORK

(Internet

or

Intranet)


RPCC

Agent

can

be

embedded

in

any

third

party

application

stack

(both

software

and

firmware)



Network





Application

Application

REL
-
ID PCC

Agent

R
-
PCC (REL
-
ID Mutually Authenticated

and Encrypted Channel)

Internet or Intranet

Secure Private
Communication
Circuit/Channel

(Internet and Intranet)

R
E
L
I
D

G
A
T
E

Massively
Scalable

Secure Private
Communication
Circuit/Channel


Applications/Services on
this channel are NOT visible
and accessible outside of
this channel/circuit


The end
-
users could be
customers, employees and
partners


The devices could be
laptops/desktops, mobile
phones, tablets


This
enables a closed,
controlled, highly secure
private ecosystem




Enterprise
Services

Third Party

Services

REL
-
ID

ECO

PLATFORM

Command Center

Device

REL
-
ID
GATE

REL
-
ID
GATE

App

Management

Identity Management

Device Management

Authentication

(2FA/3FA)

Access Management

R
-
PCC* Over Intranet

R
-
PCC* Over Internet

Secure

Channel

Enterprise Web
-
Apps

[
Virtual Image
]

Enterprise Mobile Apps

3
rd

Party Web
-
Apps

[Virtual Image]

3
rd

Party

Mobile Apps


Command Center

Secure


Channel

Employee

Partner

Customer

REL
-
ID Widget

(Secure Client

App Container)

Mobile
Phones,

Tablets,

Desktops and

Laptops

*R
-
PCC:

R
EL
-
ID
P
rivate
C
ommunication
C
hannel (Encrypted)

THE REL
-
ID ECO
TM

Internet

Private

Data

Center