Almere, Netherlands, October 11, 2011 --(PR.com
)-- BioSlimDisk offers physical identity credentials for the host or users which comprises some characteristics that are different from those of electronic credentials products. Identity credentials may have both logical and physical structures that operate either independently or together to validate the credential holder’s identity. A logical credential, in order to exist must be presented in some physical form.
Physical Identity credentials are any form of physical contact with a secured device by authenticating successfully or unsuccessfully and retrieving the confidential documents within that include, reference, or substantiate identity information. A key, passport or driver license is an example of a physical identity credential.
In the future, the transition from physical to electronic credentials will still require preservation of the good qualities and a reduction of the bad qualities of physical identity credentials.
One of the biggest rising security issues of today is the ubiquity of identity credentials, which users either misplaced or forget their credentials. To counter this issue BioSlimDisk has partnered with Imprivata Single Sign On to provide the latest integrated solution researched by BioSlimDisk which provides both logical and physical identity credentials.
2011 is only half way through and there is a growing amount of cyber threat stories to recount already, including data security breaches, encryption breaches and e-mail /credit card theft incidents. Cyber criminals have been shaking the security world with attacks like never before. We have seen the rise and fall of groups like Anonymous and LulzSec, who have carried out some very high profile cyber-attacks on companies like Sony, large banks, the IMF, government agencies like the FBI.
Even the highly regarded security firm RSA had experienced a sophisticated cyber-attack that came through a security breach within the organisation. The attack that brought RSA to its knees originated from one spear phishing email that contained a malicious excel file which preyed on vulnerability within Adobe Flash. The phishing emails tricked users into opening a file, which installed a backdoor through the vulnerability in Flash. Due to the sensitive nature of RSA’s work, most details about what data was stolen have been withheld.
Perhaps the most publicized breach of all was the Sony PlayStation Network hacks in April, which ended up compromising over 100 million customer accounts, and had Sony shut down its services for over six weeks. Initially Sony said that 77 million accounts had been compromised, but later the company admitted another 25 million accounts had been breached. The stolen information entailed customer’s user names and passwords, email addresses, home addresses, birthdays, billing information and security questions. This kind of information is the ideal ammunition for identity theft and data security threats through phishing.
These are just some of the serious data breaches that have taken place in 2011 so far. What does the second half of the year have in store for the data security industry? To mitigate data breaches from attackers, accessing of all stored personal details and confidential information, must be authenticated physically by the relevant and authorised personnel to prevent any unauthorized entry. BioSlimDisk advises all of its partners and customers to implement the latest security solution in Fingerprint encrypted storage with features that provides no backdoor to intruders protecting organizations from data security breaches.
BioSlimDisk Signature Enterprise is a new solution by Ritech International Ltd, manufacturer of BioSlimDisk’s range of products collaborating with Imprivata Single Sign On. Signature Enterprise is not your average USB storage device, it consist of security layers from the exterior to interior of the device. Exterior features are the embedded fingerprint sensor allowing users to enrol and authenticate their fingerprints and other features using complex hardware-based encrypted algorithm.
Unique Self-Destruct feature
One of the several key product differentiation is our international patented cryptographic design
How are the keys generated & destroyed?
Our key management schedule is randomly generated via an initial random pseudo number within the system controller, where a random initial number sequence is generated from the first fingerprint enrolled onto the device to generate a key. This unique key is randomly generated each time a new administrator fingerprint is enrolled. In the case where administrator fingerprints are unregistered, the keys are destroyed.
The initial key would then be in-combination with the first fingerprint pointer to a random address location for selecting the random 128bit key sequence from an “N” length of random generated bit sequence. Hence under such design, if user attempt to make any illegal usage or tampering of Signature™ solution, it may result into loss of the internal AES key, and hence loss of storage information and database including the fingerprints enrolled in the device.
Interior security features are commonly used as a second layer of defence with password and customize security setting enabling users to configure their authentication structure. Signature Enterprise functions as a Single Sign On device which will automatically launch all wanted network or enterprise applications after successful attempt to access the device.