SlideShare a Scribd company logo
1 of 11
People
Terminating
Unit
THE INTERNET OF PEOPLE
1
Securing the Internet of People
 The Internet is insecure
 All networks are insecure
 All devices are insecure
We can Secure People
2
Secure Identity
 Secure Identity Number
 100% decentralized Global Identity
 100% exclusive user control
 100% disposable (forgotten)
 Self generated inside FIPS-140-2 hardware
 Usable in any Global Block Chain Rail
 No hardware or software likability or tracking Identifier
 Dual use FIDO U2F technology, supports incrementally FREE secure
Identities
 I am a Human attestation, with no personal biometric leakage
3
Existing Insecure Clients
 Insecure general purpose computers
 Users can access firmware settings during device boot, this can
allow users or virus to make changes in how the platform boots as
well as enable and disable various device ports, functions, and
other potential security features available on the device
 Changing environment combined with human exploits leads to
insecure computing environments for any secure client applications
4
Secure Client Unit
 Ensuring use of locked-down firmware in any unit.
 Secure boot
 Implement Unified Extensible Firmware Interface (UEFI).
 This allows a device to only boot trusted software by restricting the system to only allow
execution of binaries signed by a specified authority.
 UEFI Secure Boot checks the signature of each piece of boot software, including
firmware drivers and the OS. If the signatures do not match (e.g. if an attacker were to
replace the original image with a compromised OS) the platform will not boot.
 Mandatory hardware chip level Trusted Computing Module
 a cryptographic coprocessor including capabilities for random number generation,
secure generation of cryptographic keys and limitation of their use.
 includes capabilities such as remote attestation and sealed storage.
 Mandatory data encryption at rest and transit
 No User accounts
5
Functionality
 Securely implements our Block Chain Ledger Inter-ledger” protocols
within the Unit some functions with TPM only.
 Generates and stores key material within TPM, and registers each
unit to any number of Public Ledgers
 Supports direct FIDO ECDSA P256 Digital Signatures, with “I am
human” proof.
 Data is wrapped inside TPM, and certified by Human via FIDO
hardware token
 Mandatory online security core OS updates via Secure Boot and
TPM attestation
6
Trusted Computing
 TPM can create cryptographic keys and encrypt them so that they can only be
decrypted by the same TPM instance.
 TPM has a master “wrapping” key, called the storage root key, which is stored
within the TPM itself. The private portion of a key created in a TPM is never
exposed to any other component, software, process, or person.
 TPM can create a key (sealing) that has not only been wrapped but is also tied
to, and can only be utilized by, the Block Chain Ledger Rails.
 TPM, private portions of key pairs are kept separate from the memory controlled
by the operating system. Keys can be sealed to the TPM, and certain
assurances about the state of a system (assurances that define the
“trustworthiness” of a system) can be made before the keys are unsealed and
released for use.
 TPM uses its own internal firmware and logic circuits for processing instructions, it
does not rely on the operating system and is not exposed to vulnerabilities that
might exist in the operating system or application software.
7
The Trusted Block Chain Ledger
 The PTU are built as fixed-function devices. This implies that device knows exactly
which firmware, operating system, drivers and applications should be running on
each PTU device.
 This information can be used to fully lockdown an each PTU device by only
allowing execution of known and trusted code. Device lockdown can help
protect PTU devices by ensuring that unknown or untrusted executable code
cannot be “run” on a locked-down PTU devices.
 In order to leverage Device lockdown capabilities, it is necessary to ensure that
the boot binaries and UEFI firmware are signed and cannot be tampered with.
UEFI Secure Boot is the first policy enforcement point, located in UEFI. It prevents
tampering by restricting the system to only allow execution of boot binaries
signed by a specified authority.
 Code Integrity improves the security of the operating system by validating the
integrity of a driver or Block Chain Ledger DLL or application each time it is
loaded into memory.
 All devices have a mandatory online “trusted update” policy
8
The People Terminating Unit
 Right Hand Port => FIDO Token
 Left Hand Port => User device interface
 2x16 Trusted path HMI
 5G WiFi
 GPS for locational restrictions
9
Typical interface devices
 Physical interface
 Traders workstation
 Payment terminals
 Wireless
 Insecure Mobile devices
 FIDO token can be used via NFC and Mobile devices
People Terminating Unit, removes need to trust insecure devices and things.
10
The Secure Internet of People 11

More Related Content

What's hot

Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Syed Ubaid Ali Jafri
 
ACR120 product presentation by Advanced Card Systems Ltd.
ACR120 product presentation by Advanced Card Systems Ltd.ACR120 product presentation by Advanced Card Systems Ltd.
ACR120 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheetMariusEnescu3
 
Sierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftSierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftAVEVA
 
YubiKey 5 NFC
YubiKey 5 NFCYubiKey 5 NFC
YubiKey 5 NFCWJN
 
The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architectureG Prachi
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Fullnoelheng
 

What's hot (11)

Demo
DemoDemo
Demo
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
ACR120 product presentation by Advanced Card Systems Ltd.
ACR120 product presentation by Advanced Card Systems Ltd.ACR120 product presentation by Advanced Card Systems Ltd.
ACR120 product presentation by Advanced Card Systems Ltd.
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheet
 
Mobile security-user-guide-en
Mobile security-user-guide-enMobile security-user-guide-en
Mobile security-user-guide-en
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Sierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoftSierra Access and Door Control with InduSoft
Sierra Access and Door Control with InduSoft
 
YubiKey 5 NFC
YubiKey 5 NFCYubiKey 5 NFC
YubiKey 5 NFC
 
The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
 
Week13
Week13Week13
Week13
 
Signature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 FullSignature Presentation(10062011) Vc 3 Full
Signature Presentation(10062011) Vc 3 Full
 

Similar to The People Terminating Unit

Arch overview
Arch overviewArch overview
Arch overviewmaojunjie
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesJavier González
 
Win10 comparetable fy17
Win10 comparetable fy17Win10 comparetable fy17
Win10 comparetable fy17namprince187
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
A Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity ComputersA Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity ComputersEditor IJCATR
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013Matthew Rosenquist
 
An IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdfAn IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdfsooryasalini
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.pptnaghamallella
 
Check point nerc cip compliance
Check point nerc cip complianceCheck point nerc cip compliance
Check point nerc cip complianceIvan Carmona
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.pptnaghamallella
 

Similar to The People Terminating Unit (20)

Arch overview
Arch overviewArch overview
Arch overview
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
Win10 comparetable fy17
Win10 comparetable fy17Win10 comparetable fy17
Win10 comparetable fy17
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
A Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity ComputersA Trusted Integrity verification Architecture for Commodity Computers
A Trusted Integrity verification Architecture for Commodity Computers
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
 
An IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdfAn IO sub system comprises of IO devices and their corresponding d.pdf
An IO sub system comprises of IO devices and their corresponding d.pdf
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
Ht w25
Ht w25Ht w25
Ht w25
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
Check point nerc cip compliance
Check point nerc cip complianceCheck point nerc cip compliance
Check point nerc cip compliance
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.ppt
 

More from Charles Moore

Global Block Chain Ledger, Supply Chain, Done right..
Global Block Chain Ledger, Supply Chain, Done right..Global Block Chain Ledger, Supply Chain, Done right..
Global Block Chain Ledger, Supply Chain, Done right..Charles Moore
 
Initial Public Offer
Initial Public OfferInitial Public Offer
Initial Public OfferCharles Moore
 
Block chain health record
Block chain health recordBlock chain health record
Block chain health recordCharles Moore
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record ManagementCharles Moore
 

More from Charles Moore (6)

Its money slides
Its money slidesIts money slides
Its money slides
 
Global Block Chain Ledger, Supply Chain, Done right..
Global Block Chain Ledger, Supply Chain, Done right..Global Block Chain Ledger, Supply Chain, Done right..
Global Block Chain Ledger, Supply Chain, Done right..
 
Initial Public Offer
Initial Public OfferInitial Public Offer
Initial Public Offer
 
The Future Exchange
The Future ExchangeThe Future Exchange
The Future Exchange
 
Block chain health record
Block chain health recordBlock chain health record
Block chain health record
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
 

Recently uploaded

NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...Amil baba
 
Liquidity Decisions in Financial management
Liquidity Decisions in Financial managementLiquidity Decisions in Financial management
Liquidity Decisions in Financial managementshrutisingh143670
 
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...Amil baba
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...AES International
 
Guard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdfGuard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdfJasper Colin
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Unit 4.1 financial markets operations .pdf
Unit 4.1 financial markets operations .pdfUnit 4.1 financial markets operations .pdf
Unit 4.1 financial markets operations .pdfSatyamSinghParihar2
 
AnyConv.com__FSS Advance Retail & Distribution - 15.06.17.ppt
AnyConv.com__FSS Advance Retail & Distribution - 15.06.17.pptAnyConv.com__FSS Advance Retail & Distribution - 15.06.17.ppt
AnyConv.com__FSS Advance Retail & Distribution - 15.06.17.pptPriyankaSharma89719
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...Amil baba
 
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Amil baba
 
Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward
 
cost of capital questions financial management
cost of capital questions financial managementcost of capital questions financial management
cost of capital questions financial managementtanmayarora23
 
2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptxHenry Tapper
 
Banking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxBanking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxANTHONYAKINYOSOYE1
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdfglobusfinanza
 
『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书
『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书
『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书rnrncn29
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
Financial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.pptFinancial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.ppttadegebreyesus
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderArianna Varetto
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 

Recently uploaded (20)

NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
 
Liquidity Decisions in Financial management
Liquidity Decisions in Financial managementLiquidity Decisions in Financial management
Liquidity Decisions in Financial management
 
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...
 
Guard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdfGuard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdf
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Unit 4.1 financial markets operations .pdf
Unit 4.1 financial markets operations .pdfUnit 4.1 financial markets operations .pdf
Unit 4.1 financial markets operations .pdf
 
AnyConv.com__FSS Advance Retail & Distribution - 15.06.17.ppt
AnyConv.com__FSS Advance Retail & Distribution - 15.06.17.pptAnyConv.com__FSS Advance Retail & Distribution - 15.06.17.ppt
AnyConv.com__FSS Advance Retail & Distribution - 15.06.17.ppt
 
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
NO1 Certified kala jadu karne wale ka contact number kala jadu karne wale bab...
 
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
 
Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024
 
cost of capital questions financial management
cost of capital questions financial managementcost of capital questions financial management
cost of capital questions financial management
 
2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx
 
Banking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxBanking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptx
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf
 
『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书
『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书
『澳洲文凭』买科廷大学毕业证书成绩单办理澳洲Curtin文凭学位证书
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
Financial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.pptFinancial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.ppt
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 

The People Terminating Unit

  • 2. Securing the Internet of People  The Internet is insecure  All networks are insecure  All devices are insecure We can Secure People 2
  • 3. Secure Identity  Secure Identity Number  100% decentralized Global Identity  100% exclusive user control  100% disposable (forgotten)  Self generated inside FIPS-140-2 hardware  Usable in any Global Block Chain Rail  No hardware or software likability or tracking Identifier  Dual use FIDO U2F technology, supports incrementally FREE secure Identities  I am a Human attestation, with no personal biometric leakage 3
  • 4. Existing Insecure Clients  Insecure general purpose computers  Users can access firmware settings during device boot, this can allow users or virus to make changes in how the platform boots as well as enable and disable various device ports, functions, and other potential security features available on the device  Changing environment combined with human exploits leads to insecure computing environments for any secure client applications 4
  • 5. Secure Client Unit  Ensuring use of locked-down firmware in any unit.  Secure boot  Implement Unified Extensible Firmware Interface (UEFI).  This allows a device to only boot trusted software by restricting the system to only allow execution of binaries signed by a specified authority.  UEFI Secure Boot checks the signature of each piece of boot software, including firmware drivers and the OS. If the signatures do not match (e.g. if an attacker were to replace the original image with a compromised OS) the platform will not boot.  Mandatory hardware chip level Trusted Computing Module  a cryptographic coprocessor including capabilities for random number generation, secure generation of cryptographic keys and limitation of their use.  includes capabilities such as remote attestation and sealed storage.  Mandatory data encryption at rest and transit  No User accounts 5
  • 6. Functionality  Securely implements our Block Chain Ledger Inter-ledger” protocols within the Unit some functions with TPM only.  Generates and stores key material within TPM, and registers each unit to any number of Public Ledgers  Supports direct FIDO ECDSA P256 Digital Signatures, with “I am human” proof.  Data is wrapped inside TPM, and certified by Human via FIDO hardware token  Mandatory online security core OS updates via Secure Boot and TPM attestation 6
  • 7. Trusted Computing  TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the same TPM instance.  TPM has a master “wrapping” key, called the storage root key, which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person.  TPM can create a key (sealing) that has not only been wrapped but is also tied to, and can only be utilized by, the Block Chain Ledger Rails.  TPM, private portions of key pairs are kept separate from the memory controlled by the operating system. Keys can be sealed to the TPM, and certain assurances about the state of a system (assurances that define the “trustworthiness” of a system) can be made before the keys are unsealed and released for use.  TPM uses its own internal firmware and logic circuits for processing instructions, it does not rely on the operating system and is not exposed to vulnerabilities that might exist in the operating system or application software. 7
  • 8. The Trusted Block Chain Ledger  The PTU are built as fixed-function devices. This implies that device knows exactly which firmware, operating system, drivers and applications should be running on each PTU device.  This information can be used to fully lockdown an each PTU device by only allowing execution of known and trusted code. Device lockdown can help protect PTU devices by ensuring that unknown or untrusted executable code cannot be “run” on a locked-down PTU devices.  In order to leverage Device lockdown capabilities, it is necessary to ensure that the boot binaries and UEFI firmware are signed and cannot be tampered with. UEFI Secure Boot is the first policy enforcement point, located in UEFI. It prevents tampering by restricting the system to only allow execution of boot binaries signed by a specified authority.  Code Integrity improves the security of the operating system by validating the integrity of a driver or Block Chain Ledger DLL or application each time it is loaded into memory.  All devices have a mandatory online “trusted update” policy 8
  • 9. The People Terminating Unit  Right Hand Port => FIDO Token  Left Hand Port => User device interface  2x16 Trusted path HMI  5G WiFi  GPS for locational restrictions 9
  • 10. Typical interface devices  Physical interface  Traders workstation  Payment terminals  Wireless  Insecure Mobile devices  FIDO token can be used via NFC and Mobile devices People Terminating Unit, removes need to trust insecure devices and things. 10
  • 11. The Secure Internet of People 11