39. Complementary (logical)
protection schemes
during every new session the user proves the legitimacy
of the previous one;
the user is notified about all major activities from
independent channels chosen by him- or herself;
for the conduction of important operations a quarantine
period is introduced between the moment of giving the
command and its implementation (during this time the
users in question can get all the information about the
forthcoming operation through other independent
channels and if necessary can block its implementation);
40. Complementary (logical)
protection schemes
the used banking accounts have a limited list of payment
addressees (therefore the intruder to the system will be
unable to transfer money to his or her own account);
Consequence
The toolbox the user is provided with will make him or her
legally accountable for the operations conducted in the
electronic environment with the help of VVR.
42. Intermediate result
we generated a sterile communication area,
where communication subjects are represented
by their virtual robot-residents (VRR);
we gave users a convenient identifiable
assistant, which will perform many routine
operations for its owner;
we built a simple system of communications
between robots;
43. Intermediate result
we localized the human factor having excluded
any possibility to carry out illegal operations in
the sterile area;
we completely simplified user authentication
during his contact with his VRR.
we protected the user’s personal date in the
system