Más contenido relacionado Similar a Guard time connect_estonia 21.03.2012 (20) Más de connectestonia (9) Guard time connect_estonia 21.03.20121. © 2011. Copyright GuardTime. All Rights Reserved.
Raul.Vahisalu@GuardTime.com
General Manager Estonia
21.03.2012
2. GuardTime
Proof of time, origin and integrity for the world’s electronic data
Founded in Estonia in 2006
IP of Estonian scientists Ahto Buldas and Märt Saarepera
Accredited timestamping service provider in EU since 2007
Financed by ASI, Brother, Singaporean Government and Hong
Kong based Horizons Ventures
© 2011. Copyright GuardTime. All Rights Reserved.
Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San
Diego
3. Hash Functions
GuardTime’s technology is based on cryptographic hash functions
HASH VALUE
HASH AXSJ76SNWCRVRVL
INPUT DATA FFAONRDNZG4VUS
FUNCTION U2HAS7DJWZR2U
ONE-WAY ONLY
© 2011. Copyright GuardTime. All Rights Reserved.
REVERSE CALCULATION NOT POSSIBLE
3
4. When trust is not enough
4
© 2011. Copyright GuardTime. All Rights Reserved.
5. When trust is not enough
TIME
5
© 2011. Copyright GuardTime. All Rights Reserved.
6. Keyless Signatures: How It Works
Enable any Sign the event Signatures are
Receive a
system or logs, backups, mathematically
© 2011. Copyright GuardTime. All Rights Reserved.
signature for
environment to archives, other verifiable for
each data item
use Keyless data and the life of the
signed
Signatures applications data
When trust is not enough 6
7. When trust is not enough
7
© 2011. Copyright GuardTime. All Rights Reserved.
8. Prove This Didn’t Happen
Does your proof require that someone trust you?
• ‘Cleaning up’ the application and system logs
Accidental
• ‘Fixing’ the backups and archives
(admin) • Checking in untested applications
• Removing application and system log entries
Intentional
• Changing database records
(admin) • Adjusting application and system configurations
© 2011. Copyright GuardTime. All Rights Reserved.
• Removing log entries
Malicious
• Changing database records
(hacker) • Inserting new code into the operating environment
When trust is not enough 8
9. Use Case: Auditable Scan-To-Server
Signing capabilities are embedded directly into the multi-functional printer
Documents are signed after scanned and converted to PDF
The signature is embedded within the PDF
Signed PDF documents are stored on the server
Recipients of the documents
can verify the signature of the
documents from within the
scanned PDF
© 2011. Copyright GuardTime. All Rights Reserved.
Provides proof of origin (e.g.
which scanner), time and
content for the stored
documents
When trust is not enough 9
10. International team
Business is done by people! Our group CEO flight mileage last year - 250000
0900-1700 Tallinn time +9h/-8h
~10 different nationalities
Negotiation and communication style
Work ethic, command of languages
Politics, religion, women, alcohol
© 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough 10
11. Research & development
R&D is in Tallinn, Estonia
Top of the technology pyramid
Serendipity-led R&D
Can innovation be outsourced?
What is innovation?
Accountability to investors
© 2011. Copyright GuardTime. All Rights Reserved.
Test-site Estonia
When trust is not enough 11
12. Sales
What do you sell?
Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear
Naive, Pragmatic, Strategic
IP
Obstacles
Not invented here
Nice to have but not compulsory (through legislation)
© 2011. Copyright GuardTime. All Rights Reserved.
Too new, too disruptive for me
Technology push v. Market pull
„GuardTime is not a technology problem, its a marketing problem“
When trust is not enough 12
13. Business model
GuardTime is sold as a monthly subscription service based on volume
(Transactions/Second) shared with partners and downstream channel
Estonia as a test site for the world
Cooperation agreement with the Estonian Government for a service free of
charge
In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion...
© 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough 13
14. Orwell 1984
Big Brother
Doublethink
Thoughtcrime
Newspeak
© 2011. Copyright GuardTime. All Rights Reserved.
Memory hole
When trust is not enough 14
15. © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough
Thank You!
Email: raul.vahisalu@guardtime.com
Notas del editor Endast rääkida Financing process, 8mUSD in 2010 Ämbrite viisi teed joonudKazakhstan v. Saudi power games, äri teha endasugustegaMentaalne kaugus, ei usu ärisse kus ise kohal ei oleKiirus, vaeva nägemineFacilitors, facilitating Mida teeme? – eriliste toodete müük, eriprojektid, milles puudub konkurents