The attrACTIVE Domain -- die Zukunft der dahtlosen Konvergenz
Referenten: Manfred Berger, Heinz Kreft
Sprache: deutsch
Wo: Saal 3
Wann: Tag 1, 14:00
Dauer: 01:00h
Beschreibung
The attrACTIVE Domain -- a New Class of Products (sub-summing of Cell-Phones, PDAs, WEBpads, Infotainment consoles, navigation systems & personal health Monitors), based on a wireless cryptographic infrastructure including VoIP, Streaming Multimedia, Geographic Positioning & Navigation, enforced on Security & Privacy build on the law of physics.
Beschreibung:
Functions, services & applications of the [attrACTIVE]
Device:
- Wireless IP Transfers (including VoIP) with Cryptography, Privacy, Security, Secrecy through Encryption and Onion Routing,
- Real-time Multimedia Content Representation with Digital Rights Management,
- Voice communication,
- Multimedia Applications such as Streaming Audio and Video,
- Geographic Positioning,
- Networking with surrounding Devices,
- Pro-active Computing using ad-hoc WLANs,
- Digital Camera and A/V Camcorder Functionality,
- Expansion Slots,
- Voice Recognition for Navigation and Data Input,
- Location-based services,
- Tracking Mobile Resources (e.g. Trucking Fleets),
- Inventory Trackers with Back-end Enterprise Resource Planning (ERP) systems,
- Financial Services,
- Healthcare,
- Sales Force Automation (SFA),
- Field Force Automation (FFA),
- Enterprise Synchronization Technology.
Important will be the availability of the following features in our [attrACTIVE] Device:
- Wireless & Cryptography,
- Privacy & Encryption,
- Security & Secrecy.
It is the combination of
- a Smart Cell-Phone,
- a Real-Time Speech Translator,
- a PDA, Pocket PC, Handheld Computer,
- a WEB Pad,
- a INet Gaming Console,
- a Pocket Personal Entertainment Console,
- a GPS based Navigation System,
- a Personal Health Monitor for Biometric Sensors,
The most valuable features
- Protecting sensitive, proprietary business and personal information.
- Protection of banking, insurance, military and any other sensitive applications.
- Secure personalised data processing in hospitals, medical clinics, lawyer offices etc.
- Protected E-Mail, correspondence, testimony, acts of last will and contracts.
- Scrambling of Voice to protect telephony conversations (red crypto Phone).
- Secure Virtual Private Networks (VPN) tunneling.
- Secure Socket Layer (SSL) and link encryption protocols (LEP).
- Secure IPSec services and key management.
- Secure combination of asymmetrical (public key) and symmetrical block ciphers (std. key).
- Preventing of manipulation of digital signatures creating schemes.
- Blocking of unwanted investigation by a hard encryption process.
- Securing point to point or multipoint communication of data against wire tapping.
- Secure storage of sensitive files on remote devices (store and forward devices etc.).
- Encrypted backup facilities.