尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
mIDentity 3G Stay connected. Be secure. Be free. mIDentity 3G effortless end-point Security
Experience that can be trusted ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
m ID entity 3G Effortless End Point Security.
What is mIDentity 3G? High speed, secure network access Encrypted store Zero Footprint launch of application (e.g. Browser) and communications stack Separate SmartCard for PKI applications Policy based management enforced inside the device Remote management platform A  Secure Mobile Communications Platform  allowing confidential access to highly sensitive information, centrally managed and locally executed
m ID entity® 3G – flexible application scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Custom Applications - Guaranteed point to point encryption meeting the highest security expectations Be secure Stay connected
u CAN ®  Connect: Connection Manager
mIDentity 3G Technology H A R D W A R E  L A Y E R Hardened  Firefox-Browser Complete Java RTE CD-ROM image Secure Update client Middleware S O F T W A R E  L A Y E R smart card Smart card reader No installation on MacOS, Linux  and Windows USB form factor  and Plug & Play What you see is what you sign (WYSIWYS) KICKSTART  Technology
onboard applications  Software  Layer Hardware  Layer Smartcard Reader Smartcard USB Form Factor device No  Software- or  Driver Installation! Java Applet or  Browser Plug-in Card PKCS#11 Hardened browser local PC mIDentity 3G Update Client
mIDentity 3G smart security management
One concept makes the difference ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G – specific and individual solution for the customer Option Kobil Systems Integrator Operator Customer
One mutual solution – A benefit to both ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G Operator
One joint solution – Benefits for three ,[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G Systems Integrator Operator
One joint solution – Benefits for all ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],m ID entity® 3G Systems Integrator Operator Customer
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],mIDentity 3G
Thank you! Let’s create the future together!

More Related Content

What's hot

Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
Forest Interactive
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
Block Armour
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
IoT613
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
Elias Hasnat
 
IoT security
IoT securityIoT security
IoT security
YashKesharwani2
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
Eurotech
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
Block Armour
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
Leonardo De Moura Rocha Lima
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
Arpan Pal
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Block Armour
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
Priyanka Aash
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Block Armour
 
IoT Circuit Threats and Vulnerabilities
IoT Circuit Threats and VulnerabilitiesIoT Circuit Threats and Vulnerabilities
IoT Circuit Threats and Vulnerabilities
www.securekm.com; Secure Knowledge Management Inc.
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
Block Armour
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 

What's hot (20)

Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
IoT security
IoT securityIoT security
IoT security
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
IoT Circuit Threats and Vulnerabilities
IoT Circuit Threats and VulnerabilitiesIoT Circuit Threats and Vulnerabilities
IoT Circuit Threats and Vulnerabilities
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 

Viewers also liked

Option Overview
Option OverviewOption Overview
Option Overview
Jan Vekemans
 
Keynote Disco 15 - Learning
Keynote Disco 15 - LearningKeynote Disco 15 - Learning
Keynote Disco 15 - Learning
Sigi Jakob-Kuehn
 
Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011Sigi Jakob-Kuehn
 
Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15
Sigi Jakob-Kuehn
 
Learning together with Moodle and Mahara
Learning together with Moodle and MaharaLearning together with Moodle and Mahara
Learning together with Moodle and Mahara
Sigi Jakob-Kuehn
 
Präsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchenPräsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchen
Sigi Jakob-Kuehn
 
Conditional
ConditionalConditional
Conditional
Sigi Jakob-Kuehn
 
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
Sigi Jakob-Kuehn
 
Logarismes
LogarismesLogarismes
Logarismesslidario
 
Fongs Killer
Fongs KillerFongs Killer
Fongs Killerslidario
 
Negotiation
NegotiationNegotiation
Negotiation
Encrypted
 
Amarula in Canada
Amarula in CanadaAmarula in Canada
Amarula in Canada
Encrypted
 
Soc 03 Perriman Alyson
Soc 03 Perriman AlysonSoc 03 Perriman Alyson
Soc 03 Perriman Alyson
perrimana1
 
Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01
hdeknijff
 
Are you Environmentalist?
Are you Environmentalist?Are you Environmentalist?
Are you Environmentalist?
Encrypted
 
H&M in Canada
H&M in CanadaH&M in Canada
H&M in Canada
Encrypted
 
Valentine\'s Day
Valentine\'s DayValentine\'s Day
Valentine\'s Day
Encrypted
 

Viewers also liked (18)

Option Overview
Option OverviewOption Overview
Option Overview
 
Keynote Disco 15 - Learning
Keynote Disco 15 - LearningKeynote Disco 15 - Learning
Keynote Disco 15 - Learning
 
Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011Mahara Swiss Moodle Moot 2011
Mahara Swiss Moodle Moot 2011
 
Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15Mahara Granny goes MaharaHuiUK15
Mahara Granny goes MaharaHuiUK15
 
Learning together with Moodle and Mahara
Learning together with Moodle and MaharaLearning together with Moodle and Mahara
Learning together with Moodle and Mahara
 
Präsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchenPräsentation mahara moodle moot münchen
Präsentation mahara moodle moot münchen
 
Conditional
ConditionalConditional
Conditional
 
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
E Portfolio Mit Mahara Ort 09 (Pp Tminimizer)
 
Logarismes
LogarismesLogarismes
Logarismes
 
Fongs Killer
Fongs KillerFongs Killer
Fongs Killer
 
16.02.08
16.02.0816.02.08
16.02.08
 
Negotiation
NegotiationNegotiation
Negotiation
 
Amarula in Canada
Amarula in CanadaAmarula in Canada
Amarula in Canada
 
Soc 03 Perriman Alyson
Soc 03 Perriman AlysonSoc 03 Perriman Alyson
Soc 03 Perriman Alyson
 
Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01Grammatica Orientatie 2008 01
Grammatica Orientatie 2008 01
 
Are you Environmentalist?
Are you Environmentalist?Are you Environmentalist?
Are you Environmentalist?
 
H&M in Canada
H&M in CanadaH&M in Canada
H&M in Canada
 
Valentine\'s Day
Valentine\'s DayValentine\'s Day
Valentine\'s Day
 

Similar to M I Dentity 3 G 040111

The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
Smart Defend UK
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
Giovanni Maree
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
VASCO Data Security
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
PawachMetharattanara
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
ardexateam
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
FaberLab
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaos
Xylos
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
Wendy Murphy
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component Integration
Innodisk Corporation
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
Creus Moreira Carlos
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 

Similar to M I Dentity 3 G 040111 (20)

The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaos
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component Integration
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 

M I Dentity 3 G 040111

  • 1. mIDentity 3G Stay connected. Be secure. Be free. mIDentity 3G effortless end-point Security
  • 2.
  • 3. m ID entity 3G Effortless End Point Security.
  • 4. What is mIDentity 3G? High speed, secure network access Encrypted store Zero Footprint launch of application (e.g. Browser) and communications stack Separate SmartCard for PKI applications Policy based management enforced inside the device Remote management platform A Secure Mobile Communications Platform allowing confidential access to highly sensitive information, centrally managed and locally executed
  • 5.
  • 6. u CAN ® Connect: Connection Manager
  • 7. mIDentity 3G Technology H A R D W A R E L A Y E R Hardened Firefox-Browser Complete Java RTE CD-ROM image Secure Update client Middleware S O F T W A R E L A Y E R smart card Smart card reader No installation on MacOS, Linux and Windows USB form factor and Plug & Play What you see is what you sign (WYSIWYS) KICKSTART Technology
  • 8. onboard applications Software Layer Hardware Layer Smartcard Reader Smartcard USB Form Factor device No Software- or Driver Installation! Java Applet or Browser Plug-in Card PKCS#11 Hardened browser local PC mIDentity 3G Update Client
  • 9. mIDentity 3G smart security management
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Thank you! Let’s create the future together!
  翻译: