SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
BioSlimDisk
presentation v1.1

RiTech International Ltd
Product (Signature)
Website www.bioslimdisk.com
Marcus Chan
Date: 14th August 2009
Overview
    • Company Profile

    • Biometric Technology

    • Bioslimdisk Signature


2   © RiTech International Ltd, Confidential & Proprietary
COMPANY PROFILE
RiTech International Ltd
    • Ritech was established in 1994 as
      Designer, developer, manufacturer and
      distributor of innovative products,
      services & systems in the area of
      biometrics security and portable data
      storage.
    • Specializes in biometrics security
      technology with in-house R&D.
    • Overseas operation network: Malaysia,
      Hong Kong, China, India and Europe.
4   © RiTech International Ltd, Confidential & Proprietary
Vision
         First Choice Solution provider in the
         Biometric security industry
                                                             Biometric
                                                                         Process

                                                                         Algorithms

                                                                         Implementation knowledge

                                                                         Customised Solutions

                                                                         Ergonomics and desgin

                                                                         Sensors

5   © RiTech International Ltd, Confidential & Proprietary
Objectives
    Advanced Research and Development
    • Biometrics products for portable information
      storage and transportation
    • Biometrics products for Intellectual Property
      Protection
    • Biometrics products for secure identification
      over networks
    • Biometrics products for as a secure
      replacement over existing keys, cards,
      password which tend to be a burden

6   © RiTech International Ltd, Confidential & Proprietary
BIOMETRIC TECHNOLOGY
What is Biometric?

         The Science of measuring

         and statistically analyzing

         biological data

8   © RiTech International Ltd, Confidential & Proprietary
What is Biometric?
    Biometric Technology

         Authentication can be divided into three
         different factors:

    • something you know
    • something you have
    • something you are




9   © RiTech International Ltd, Confidential & Proprietary
Something you know
     Common
     • Pin Numbers/Code
     • Learn it , You have to remember the
       Code Number
     • Forced to memorize passwords

     Disadvantage:-
        Software hacking tools via
        internet, easy to steal by
        anyone. (e.g. Keylogger)
10   © RiTech International Ltd, Confidential & Proprietary
Something you have
     Example Smart cards
     • Cash Card
     • ATM Card
     • Visa/Master Card
     • Door/Building Access Card

     Disadvantage:-
        If picked up by anyone, it can still be
        used. (e.g. Paying at a Petrol Station)
11   © RiTech International Ltd, Confidential & Proprietary
Something you are
     Biometrics is what you are!

     What you have:
     1. Your Finger > Fingerprint
     2. You cannot loose it
     3. You cannot give it away

     You cannot tell a friend to use your prints.

12   © RiTech International Ltd, Confidential & Proprietary
Types of Biometric
     1. BEHAVIOURAL
                     – Voice Patterns
                     – Signature Verification
                     – Key Stroke Patterns (Signatures)

     2. PHYSIOLOGICAL
                     –      Fingerprints
                     –      Hand Geometry
                     –      Retinal & Iris Scanning
                     –      Facial Recognition
                     –      DNA Fingerprinting
13   © RiTech International Ltd, Confidential & Proprietary
Biometric Comparison
          Comparison of various biometric
          technologies
          It is possible to understand if a human characteristic can be
          used for biometrics in terms of the following parameters:
     •    Universality => each person should have the characteristic
     •    Uniqueness => is how well the biometric separates individually
          from another.
     •    Permanence => measures how well a biometric resists aging.
     •    Collectability => ease of acquisition for measurement.
     •    Performance => accuracy, speed, and robustness of
          technology used.
     •    Acceptability => degree of approval of a technology.
     •    Circumvention => ease of use of a substitute.

14   © RiTech International Ltd, Confidential & Proprietary
Biometric Comparison
              Comparison of existing biometric systems
                     Comparison of various biometric technologies, modified from Jain et al.,
                                       2004 (H=High, M=Medium, L=Low)

Biometrics:       Universality          Uniqueness           Permanence   Collectability Performance Acceptability Circumvention

Face                      H                     L                    M         H             L            H             L
Fingerprint               M                     H                    H         M             H            M             H
Hand geometry             M                     M                    M         H             M            M             M
Keystrokes                L                     L                    L         M             L            M             M
Hand veins                M                     M                    M         M             M            M             H
Iris                      H                     H                    H         M             H            L             H
Retinal scan              H                     H                    M         L             H            L             H
Signature                 L                     L                    L         H             L            H             L
Voice                     M                     L                    L         M             L            H             L
Facial
                          H                     H                    L         H             M             H            H
thermograph
Odor                      H                     H                    H         L             L            M             L
DNA                       H                     H                    H         L             H             L            L
Gait                      M                     L                    L         H             L             H            M
Ear Canal                 M                     M                    H         M             M             H            M
      15    © RiTech International Ltd, Confidential & Proprietary
Fingerprint Identification
                                                              Minutiae Definition
                                                              • Form of Fingerprint

                                                              • Number of Lines

                                                              • Distance Between Marks



16   © RiTech International Ltd, Confidential & Proprietary
Processing & Identification
     Fingerprint
       How many minutiae are needed for
       comparison?
     –Generally,     a complete
        fingerprint is made up
        of up to 100 minutiae
     –Fingerprint   recognition
        normally requires 20~30
        minutiae for processing
17   © RiTech International Ltd, Confidential & Proprietary
The Biometrics’ Dilemma




18   © RiTech International Ltd, Confidential & Proprietary
Biometric Advantages
     Advantages of Biometrics
     for Access Control
                                          Copy                Theft   Forgotten   Lost
     Key
                                           X                  X         X         X
     Badge
                                             -
                                                              X         X         X
     PIN Code
                                           X                   -
                                                                        X         -

     Biometric
                                             -                 -         -        -
     Feature


19   © RiTech International Ltd, Confidential & Proprietary
BIOSLIMDISK SIGNATURE
WHY?
     • Threat of data theft is real and costly
     • Affects employees negatively
     • Affects company negatively
     • Loss of productivity and credibility
     • Loss of profits and sustainability




21   © RiTech International Ltd, Confidential & Proprietary
HOW?
     • Physical theft and hacking
       Actual device is stolen and tapped for data
     • Social engineering
       Passwords or access keys can be coaxed
     • Virtual hacking and theft
       Popular method of data theft
     • Man-in-the-Middle attacks
       Spying and snooping on communications


22   © RiTech International Ltd, Confidential & Proprietary
Securing Data
                                          Signature can meet security
                                            challenges with
                                          Tamper-proof with self-destruct
                                           function
                                          Fingerprint recognition
                                           (biometric)
                                          Built-in AES-128 bit data
                                           encryption
                                          Features to protect user
                                           identification
23
                                          No passwords during usage
     © RiTech International Ltd, Confidential & Proprietary
Safekeeping
     Self Destruct Feature
      Activated  when tampering is detected
      All data drive is destroyed
      Keeps confidential data out of reach


     No backdoor access
      No password or function to reset security
      Only valid fingerprints are allowed access




24   © RiTech International Ltd, Confidential & Proprietary
Hardware Benefits
     AES-128bit hardware encryption
      Keys  never leave Signature
      Avoids tapping/snooping of keys
      All data on drive is encrypted
      On the fly encrypt and decrypt


     Totally hardware-based
      Resistant to software-based attacks
      Security methods are encapsulated in
       hardware
25   © RiTech International Ltd, Confidential & Proprietary
Protecting Fingerprints
      Dual-finger authentication
            Reduces latent fingerprint
             copy
            Intruder requires 2 unique
             fingerprints

      Limiting fingerprint retries
            Intruder has less time to guess correct
             fingerprint
            Limits tries and time for correct fingerprint

26   © RiTech International Ltd, Confidential & Proprietary
Convenience
     • Anti-static rubberized casing
      Hard to copy fingerprints on device
      Less dust attraction to protect sensor


     • Cross platform compatibility
      Nofurther software or software needed
      Works in Windows, MAC, Linux, Solaris, etc.




27   © RiTech International Ltd, Confidential & Proprietary
Unique Service
     • Our technology is mature and
       battletested
        Our company is the leader in this field
     • Quick response to security breaches
        Product is constantly updated
     • Customization to end users
        Security tokens, 3rd party software



28   © RiTech International Ltd, Confidential & Proprietary
Summary of Features

     1) Dual-Finger Authentication

     2) Unique Self Destruct

     3) Hardware Crypto AES-128bit

     4) Worldwide Patents Awarded
        United Kingdom, Netherlands, Germany, France, China, Hong
        Kong, Singapore, Malaysia and many more.
29   © RiTech International Ltd, Confidential & Proprietary
END

Más contenido relacionado

Similar a Bioslimdisk Presentation V1.1

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
Inttelix
 
Providing new customer_experience(final)
Providing new customer_experience(final)Providing new customer_experience(final)
Providing new customer_experience(final)
Tsukasa Makino
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
Inttelix
 

Similar a Bioslimdisk Presentation V1.1 (20)

Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart Identification
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Biometrics Final Visionics
Biometrics Final VisionicsBiometrics Final Visionics
Biometrics Final Visionics
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
IDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey SnapshotIDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey Snapshot
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biomatric
BiomatricBiomatric
Biomatric
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Providing new customer_experience(final)
Providing new customer_experience(final)Providing new customer_experience(final)
Providing new customer_experience(final)
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Bioslimdisk Presentation V1.1

  • 1. BioSlimDisk presentation v1.1 RiTech International Ltd Product (Signature) Website www.bioslimdisk.com Marcus Chan Date: 14th August 2009
  • 2. Overview • Company Profile • Biometric Technology • Bioslimdisk Signature 2 © RiTech International Ltd, Confidential & Proprietary
  • 4. RiTech International Ltd • Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage. • Specializes in biometrics security technology with in-house R&D. • Overseas operation network: Malaysia, Hong Kong, China, India and Europe. 4 © RiTech International Ltd, Confidential & Proprietary
  • 5. Vision First Choice Solution provider in the Biometric security industry Biometric Process Algorithms Implementation knowledge Customised Solutions Ergonomics and desgin Sensors 5 © RiTech International Ltd, Confidential & Proprietary
  • 6. Objectives Advanced Research and Development • Biometrics products for portable information storage and transportation • Biometrics products for Intellectual Property Protection • Biometrics products for secure identification over networks • Biometrics products for as a secure replacement over existing keys, cards, password which tend to be a burden 6 © RiTech International Ltd, Confidential & Proprietary
  • 8. What is Biometric? The Science of measuring and statistically analyzing biological data 8 © RiTech International Ltd, Confidential & Proprietary
  • 9. What is Biometric? Biometric Technology Authentication can be divided into three different factors: • something you know • something you have • something you are 9 © RiTech International Ltd, Confidential & Proprietary
  • 10. Something you know Common • Pin Numbers/Code • Learn it , You have to remember the Code Number • Forced to memorize passwords Disadvantage:- Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger) 10 © RiTech International Ltd, Confidential & Proprietary
  • 11. Something you have Example Smart cards • Cash Card • ATM Card • Visa/Master Card • Door/Building Access Card Disadvantage:- If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station) 11 © RiTech International Ltd, Confidential & Proprietary
  • 12. Something you are Biometrics is what you are! What you have: 1. Your Finger > Fingerprint 2. You cannot loose it 3. You cannot give it away You cannot tell a friend to use your prints. 12 © RiTech International Ltd, Confidential & Proprietary
  • 13. Types of Biometric 1. BEHAVIOURAL – Voice Patterns – Signature Verification – Key Stroke Patterns (Signatures) 2. PHYSIOLOGICAL – Fingerprints – Hand Geometry – Retinal & Iris Scanning – Facial Recognition – DNA Fingerprinting 13 © RiTech International Ltd, Confidential & Proprietary
  • 14. Biometric Comparison Comparison of various biometric technologies It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters: • Universality => each person should have the characteristic • Uniqueness => is how well the biometric separates individually from another. • Permanence => measures how well a biometric resists aging. • Collectability => ease of acquisition for measurement. • Performance => accuracy, speed, and robustness of technology used. • Acceptability => degree of approval of a technology. • Circumvention => ease of use of a substitute. 14 © RiTech International Ltd, Confidential & Proprietary
  • 15. Biometric Comparison Comparison of existing biometric systems Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low) Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention Face H L M H L H L Fingerprint M H H M H M H Hand geometry M M M H M M M Keystrokes L L L M L M M Hand veins M M M M M M H Iris H H H M H L H Retinal scan H H M L H L H Signature L L L H L H L Voice M L L M L H L Facial H H L H M H H thermograph Odor H H H L L M L DNA H H H L H L L Gait M L L H L H M Ear Canal M M H M M H M 15 © RiTech International Ltd, Confidential & Proprietary
  • 16. Fingerprint Identification Minutiae Definition • Form of Fingerprint • Number of Lines • Distance Between Marks 16 © RiTech International Ltd, Confidential & Proprietary
  • 17. Processing & Identification Fingerprint How many minutiae are needed for comparison? –Generally, a complete fingerprint is made up of up to 100 minutiae –Fingerprint recognition normally requires 20~30 minutiae for processing 17 © RiTech International Ltd, Confidential & Proprietary
  • 18. The Biometrics’ Dilemma 18 © RiTech International Ltd, Confidential & Proprietary
  • 19. Biometric Advantages Advantages of Biometrics for Access Control Copy Theft Forgotten Lost Key X X X X Badge - X X X PIN Code X - X - Biometric - - - - Feature 19 © RiTech International Ltd, Confidential & Proprietary
  • 21. WHY? • Threat of data theft is real and costly • Affects employees negatively • Affects company negatively • Loss of productivity and credibility • Loss of profits and sustainability 21 © RiTech International Ltd, Confidential & Proprietary
  • 22. HOW? • Physical theft and hacking Actual device is stolen and tapped for data • Social engineering Passwords or access keys can be coaxed • Virtual hacking and theft Popular method of data theft • Man-in-the-Middle attacks Spying and snooping on communications 22 © RiTech International Ltd, Confidential & Proprietary
  • 23. Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification 23 No passwords during usage © RiTech International Ltd, Confidential & Proprietary
  • 24. Safekeeping Self Destruct Feature  Activated when tampering is detected  All data drive is destroyed  Keeps confidential data out of reach No backdoor access  No password or function to reset security  Only valid fingerprints are allowed access 24 © RiTech International Ltd, Confidential & Proprietary
  • 25. Hardware Benefits AES-128bit hardware encryption  Keys never leave Signature  Avoids tapping/snooping of keys  All data on drive is encrypted  On the fly encrypt and decrypt Totally hardware-based  Resistant to software-based attacks  Security methods are encapsulated in hardware 25 © RiTech International Ltd, Confidential & Proprietary
  • 26. Protecting Fingerprints  Dual-finger authentication  Reduces latent fingerprint copy  Intruder requires 2 unique fingerprints  Limiting fingerprint retries  Intruder has less time to guess correct fingerprint  Limits tries and time for correct fingerprint 26 © RiTech International Ltd, Confidential & Proprietary
  • 27. Convenience • Anti-static rubberized casing  Hard to copy fingerprints on device  Less dust attraction to protect sensor • Cross platform compatibility  Nofurther software or software needed  Works in Windows, MAC, Linux, Solaris, etc. 27 © RiTech International Ltd, Confidential & Proprietary
  • 28. Unique Service • Our technology is mature and battletested Our company is the leader in this field • Quick response to security breaches Product is constantly updated • Customization to end users Security tokens, 3rd party software 28 © RiTech International Ltd, Confidential & Proprietary
  • 29. Summary of Features 1) Dual-Finger Authentication 2) Unique Self Destruct 3) Hardware Crypto AES-128bit 4) Worldwide Patents Awarded United Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more. 29 © RiTech International Ltd, Confidential & Proprietary
  • 30. END