18C3 Logo
de   en

The attrACTIVE Domain -- die Zukunft der dahtlosen Konvergenz

Referenten: Manfred Berger, Heinz Kreft

Sprache: deutsch

Wo: Saal 3

Wann: Tag 1, 14:00

Dauer: 01:00h

Beschreibung

The attrACTIVE Domain -- a New Class of Products (sub-summing of Cell-Phones, PDAs, WEBpads, Infotainment consoles, navigation systems & personal health Monitors), based on a wireless cryptographic infrastructure including VoIP, Streaming Multimedia, Geographic Positioning & Navigation, enforced on Security & Privacy build on the law of physics.

Beschreibung:

Functions, services & applications of the [attrACTIVE]

Device:

- Wireless IP Transfers (including VoIP) with Cryptography, Privacy, Security, Secrecy through Encryption and Onion Routing,

- Real-time Multimedia Content Representation with Digital Rights Management,

- Voice communication,

- Multimedia Applications such as Streaming Audio and Video,

- Geographic Positioning,

- Networking with surrounding Devices,

- Pro-active Computing using ad-hoc WLANs,

- Digital Camera and A/V Camcorder Functionality,

- Expansion Slots,

- Voice Recognition for Navigation and Data Input,

- Location-based services,

- Tracking Mobile Resources (e.g. Trucking Fleets),

- Inventory Trackers with Back-end Enterprise Resource Planning (ERP) systems,

- Financial Services,

- Healthcare,

- Sales Force Automation (SFA),

- Field Force Automation (FFA),

- Enterprise Synchronization Technology.

Important will be the availability of the following features in our [attrACTIVE] Device:

- Wireless & Cryptography,

- Privacy & Encryption,

- Security & Secrecy.

It is the combination of

- a Smart Cell-Phone,

- a Real-Time Speech Translator,

- a PDA, Pocket PC, Handheld Computer,

- a WEB Pad,

- a INet Gaming Console,

- a Pocket Personal Entertainment Console,

- a GPS based Navigation System,

- a Personal Health Monitor for Biometric Sensors,

The most valuable features

- Protecting sensitive, proprietary business and personal information.

- Protection of banking, insurance, military and any other sensitive applications.

- Secure personalised data processing in hospitals, medical clinics, lawyer offices etc.

- Protected E-Mail, correspondence, testimony, acts of last will and contracts.

- Scrambling of Voice to protect telephony conversations (red crypto Phone).

- Secure Virtual Private Networks (VPN) tunneling.

- Secure Socket Layer (SSL) and link encryption protocols (LEP).

- Secure IPSec services and key management.

- Secure combination of asymmetrical (public key) and symmetrical block ciphers (std. key).

- Preventing of manipulation of digital signatures creating schemes.

- Blocking of unwanted investigation by a hard encryption process.

- Securing point to point or multipoint communication of data against wire tapping.

- Secure storage of sensitive files on remote devices (store and forward devices etc.).

- Encrypted backup facilities.

Valid HTML 4.01!Valid CSS!

Archived page - Impressum/Datenschutz