SlideShare a Scribd company logo
1 of 30
WELCOME TO


                 A Presentation by Pitney Bowes



introducing
pbSecure TM
Tamper Evident Degrees & Marksheets




                             .
We will cover


        Knowing               Identifying             Solving These
         Pitney                Current                 Challenges

        Bowes                Challenges               pbSecure TM


         5 Minutes             10 Minutes                  10 Minutes


We take care of Data Security, so that your focus remains on Educating



                                                 December 17, 2012   PBI Internal use only   3
Who we are?
Governments, Corporates & Educational Institutions
      across the World Rely on us, for their
Data Security & Document Evidencing Needs
                                     December 17, 2012   PBI Internal use only   5
BILLIONGovernmentsince 1957Globally
                                         BILLION Software Aprilcompany of the
                                                        $5.4 billion member
                                                         Continuous
                                                      Securely Magazine’s (2009)
                                                            on Handle 1920
                                         92$2
                                        RANK
                                        $25 $2    Founded acquisitions USA
                                                        in Customers 23,
                                                         S&P of world’s
                                                              500 Revenue
                                                        Stamford, Connecticut,
                                                     ranking on NYSE
                                                         Listed

                                        $5.4Software & Service Providers
                                                  Arthur(one of the other 87, existing)
                                                        >28,000 2000 Bowes
                                                          Pitney employees
                                                                  & Walter
                                                            in more than
                                         YEARSth patent goes back to 1902
                                        107 businesses in >100 countries
                                              BILLION since Countries
                                                     500since Year
                                                      … Every 1950
                                                  First
                                                          Largest
                                                  MILLION 130




 Founded on April 23, 1920 by Arthur Pitney & Walter Bowes (First patent in 1902)
 $5.4B company, Stamford, Connecticut, USA, >28,000 employees (>100 countries)
 2Million Customers in more than 130 Countries
 Listed on NYSE since 1950
 Continuous member of the S&P 500 since 1957 (one of the other 87 existing)
 $25B - Securely Handle Government Revenue Globally … Every Year
 107th in Software Magazine (2009) world’s 500 Largest Software & Service Providers
 $ 2B in acquisitions since 2000


                                                               December 17, 2012   PBI Internal use only   6
Unlike currency, Degrees & Marksheets
   can be used (are used) in duplicates/photocopies
   do not have one single standard universal format

                                            December 17, 2012   PBI Internal use only   8
Paper-based security methods lose effectiveness as copies are made
                                                                (Illustrative Example only)
             Original                                         Photocopy
                                               (No longer carries security features)


                                    Special
                                    Inks in
                                     Logo


                                    Security
                                    Threads




  Hologram      Seal    RFID Chip

                                                    December 17, 2012   PBI Internal use only   9
                                      -
VULNERABILITY
Document Security Vs. Data Security
Which one eventually matters ?




                    The Security Risks



   Duplication    Data Tampering      Forgery                       External/Internal
                                                                        Hacking
                                                December 17, 2012    PBI Internal use only   10
MENACE!



To the Law, the Society & The Industrious Education Fraternity

          There seems to be no end to this …
BUT, this needs to be ended, NOW!
                                          December 17, 2012   PBI Internal use only   11
Inability to secure Data & Documents may lead to
Economic, Legal & Social Consequences




                                December 17, 2012   PBI Internal use only   12
LOSS of REVENUE


   as documents are
   Copied & Sold
   December 17, 2012   PBI Internal use only   13
Risk of Loss of Reputation




               December 17, 2012   PBI Internal use only   14
LEGAL CONSEQUENCES
   answering to & assisting Judiciary




             December 17, 2012   PBI Internal use only   15
SOCIAL CONSEQUENCES
     In-appropriate benefits




           December 17, 2012   PBI Internal use only   16
In a world of
ever-evolving
                         How assured you feel to trust



                                                                       ?
IT Tools & Softwares …
                         someone with your life &
                         that of your loved ones’

                                     December 17, 2012   PBI Internal use only   17
the SOLUTION




  Document Evidencing & Verification Solution
Document Evidencing & Verification Solution




Duplication   Data Tampering       Forgery                  External/Internal
                                                                Hacking




                                             December 17, 2012   PBI Internal use only   19
Document Evidencing & Verification Solution

                   U n i q u e            H y b r i d           S o l u t i o n
                  exclusive patented hardware technology, driven by an application


                  It achieves (for the university)
   Secure data from the point of origination
   Convert Raw Data into an Secured Encrypted Format
   Secure data from external/internal threats of misappropriate modifications
   Creating Secured Tamper Evident & Verifiable – Degrees/Marksheets
    in both digital and physical format
   Network Independent & Originator Independent Verification Process
    Offline, Online & SmartPhones

                                                        December 17, 2012   PBI Internal use only   20
Enabling Security
                           of Physical & Online Information

Once the asset is secured, right at the Point of Origination
             Verification Process can be made
                 Unique         |    Inventive           | Really Simple

  
                        Network
                                                &
                  the(works offline) the SOLUTION is …
                       KEY to
                     Independent
                                                          Originator
                                                        Independent
          it serves as an evidence, authenticating its Origination from a Valid Entity .

Processed & Valid Data Points                Along with ‘Security-Critical’ data
    any tampering from this point onward is detectable – Thus Tamper Evident!
       Education Performance Data                             Date & Time Stamping
                University Identity                           Unique hardware (CAM) ID
                  Student Identity                           Digital Signature
          its easily & quickly verifiable with respect to ‘Point TM Origination’
                                                                  of
                                                              (pbSecure     Encryption)


Captured Pitney Bowes’
  Based on                       pbSecureTM allows an                               at the
                      Encryptedentity to protect Digital or
 Proven Core Technologies                   Coded &
                                  Physical Asset/Data                 Point of Origination
                                                                       Printed on the Document
                         Right at the ‘Point of Origination’
                                                                     December 17, 2012   PBI Internal use only   21
‘known to all’ verification process
       Scan OR Verify online at www.jnu.ac.in




        764681325348625645216752177658235432564275




                        - 22 -                  December 17, 2012   PBI Internal use only   22
03-Easy Steps to Secure Documents
no complex technology change needed              Issuance can be done offline or online.




   Prepare Data                                                                Print Secure
                                 Process Data
                                                                                Document
 Convert     data   to      Software processes data                 Continue using current
  standardized format (       and generates secure                     printing process to print
  any tools or software       barcode                                  secured document
  provided by PB)
                             Send data to central
 Check      Data   for       server       for    online
  correctness                 verification (optional)

                                                           December 17, 2012    PBI Internal use only   23
                                       -
pbSecure™ Platform - Architectural Overview
                                          pbSecure PLATFORM
                  Creation                          Repository                           Verification

                                                                  Send &
Certifying
                                                                  Receive
Authority
                             Encryption   Online
    +
                                          Storage
                                                      Secured                    Access
                                                     Repository               online/offline
                                                                               verification
    Data
Integration

                             Storage
                                                                                                           QR Code

  Print &
Certification

                                                                                Verified




               Certification /
              Documentation


                                                                            December 17, 2012   PBI Internal use only   24
Need to make it
             Only a ZERO (Minimal) Lag-Time
   Will shut down every single Scamster/Fraudster
                                    December 17, 2012   PBI Internal use only   26
Manual                 Time Consuming                              Effort
                                                                          Extensive

 Most employers outsource the education records verification to 3rd parties

 Process can take up to few weeks & can be expensive

 Some universities have online verification systems. However, since no central

    database exists many verifications are still manual

                                                          December 17, 2012   PBI Internal use only   27
PEACE OF MIND
 A solution to eliminate costs & Efforts spent on verification
 Cut down the investment on Time, Cost & Effort to verify degrees
 Ability to Swiftly Verify – even if verification requests increase exponentially
 A system which can boost the number of verification request
 Solution should be able to work without upfront cost to university

                                                         December 17, 2012   PBI Internal use only   28
DEMO
™
Every connection is a new opportunity™




                 - 30 -    December 17, 2012   PBI Internal use only   30

More Related Content

Similar to Presentation on pbSecure (Ver2.0)

Presentation on pbSecure (Ver1.0)
Presentation on pbSecure (Ver1.0)Presentation on pbSecure (Ver1.0)
Presentation on pbSecure (Ver1.0)pbsecure
 
BT & Adobe EchoSign: One Million E-Signed Contracts and Counting
BT & Adobe EchoSign:  One Million E-Signed Contracts and CountingBT & Adobe EchoSign:  One Million E-Signed Contracts and Counting
BT & Adobe EchoSign: One Million E-Signed Contracts and CountingJason M. Lemkin
 
Webinar On-Demand: Success with Mobile Loyalty
Webinar On-Demand: Success with Mobile LoyaltyWebinar On-Demand: Success with Mobile Loyalty
Webinar On-Demand: Success with Mobile LoyaltyTIBCO Loyalty Lab
 
Fighting counterfeit motion pictures
Fighting counterfeit motion picturesFighting counterfeit motion pictures
Fighting counterfeit motion picturesKenny Nguyen
 
Graphene frontiers lecture 8 resources
Graphene frontiers lecture 8 resourcesGraphene frontiers lecture 8 resources
Graphene frontiers lecture 8 resourcesStanford University
 
Youngbloods - 50 Shades of Data
Youngbloods - 50 Shades of DataYoungbloods - 50 Shades of Data
Youngbloods - 50 Shades of DataGual Barwell
 
Bin3 Open Source BI, overhyped or undervalued?
Bin3 Open Source BI, overhyped or undervalued?Bin3 Open Source BI, overhyped or undervalued?
Bin3 Open Source BI, overhyped or undervalued?Jos van Dongen
 
Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...
Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...
Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...HR Network marcus evans
 
UPA Arizona Presentation: Designing web content to engage customers and incre...
UPA Arizona Presentation: Designing web content to engage customers and incre...UPA Arizona Presentation: Designing web content to engage customers and incre...
UPA Arizona Presentation: Designing web content to engage customers and incre...Kath Straub
 
Scenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativiScenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativiFondazione CUOA
 
Communication Tools for Entrepreneurs: How to make your idea credible and und...
Communication Tools for Entrepreneurs: How to make your idea credible and und...Communication Tools for Entrepreneurs: How to make your idea credible and und...
Communication Tools for Entrepreneurs: How to make your idea credible and und...MaRS Discovery District
 
Final gflyer ppt4 july
Final gflyer ppt4 julyFinal gflyer ppt4 july
Final gflyer ppt4 julyRajendra Patil
 

Similar to Presentation on pbSecure (Ver2.0) (15)

Presentation on pbSecure (Ver1.0)
Presentation on pbSecure (Ver1.0)Presentation on pbSecure (Ver1.0)
Presentation on pbSecure (Ver1.0)
 
BT & Adobe EchoSign: One Million E-Signed Contracts and Counting
BT & Adobe EchoSign:  One Million E-Signed Contracts and CountingBT & Adobe EchoSign:  One Million E-Signed Contracts and Counting
BT & Adobe EchoSign: One Million E-Signed Contracts and Counting
 
Webinar On-Demand: Success with Mobile Loyalty
Webinar On-Demand: Success with Mobile LoyaltyWebinar On-Demand: Success with Mobile Loyalty
Webinar On-Demand: Success with Mobile Loyalty
 
Fighting counterfeit motion pictures
Fighting counterfeit motion picturesFighting counterfeit motion pictures
Fighting counterfeit motion pictures
 
Graphene frontiers lecture 8 resources
Graphene frontiers lecture 8 resourcesGraphene frontiers lecture 8 resources
Graphene frontiers lecture 8 resources
 
Youngbloods - 50 Shades of Data
Youngbloods - 50 Shades of DataYoungbloods - 50 Shades of Data
Youngbloods - 50 Shades of Data
 
Btic2012
Btic2012Btic2012
Btic2012
 
Bin3 Open Source BI, overhyped or undervalued?
Bin3 Open Source BI, overhyped or undervalued?Bin3 Open Source BI, overhyped or undervalued?
Bin3 Open Source BI, overhyped or undervalued?
 
Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...
Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...
Why Employee Engagement Matters in Kodak’s Diversity and Inclusion Worldwide ...
 
UPA Arizona Presentation: Designing web content to engage customers and incre...
UPA Arizona Presentation: Designing web content to engage customers and incre...UPA Arizona Presentation: Designing web content to engage customers and incre...
UPA Arizona Presentation: Designing web content to engage customers and incre...
 
Cs207 9
Cs207 9Cs207 9
Cs207 9
 
Scenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativiScenari evolutivi nello snellimento dei sistemi informativi
Scenari evolutivi nello snellimento dei sistemi informativi
 
Communication Tools for Entrepreneurs: How to make your idea credible and und...
Communication Tools for Entrepreneurs: How to make your idea credible and und...Communication Tools for Entrepreneurs: How to make your idea credible and und...
Communication Tools for Entrepreneurs: How to make your idea credible and und...
 
Btic2012
Btic2012Btic2012
Btic2012
 
Final gflyer ppt4 july
Final gflyer ppt4 julyFinal gflyer ppt4 july
Final gflyer ppt4 july
 

Presentation on pbSecure (Ver2.0)

  • 1. WELCOME TO A Presentation by Pitney Bowes introducing pbSecure TM
  • 2. Tamper Evident Degrees & Marksheets .
  • 3. We will cover Knowing Identifying Solving These Pitney Current Challenges Bowes Challenges pbSecure TM 5 Minutes 10 Minutes 10 Minutes We take care of Data Security, so that your focus remains on Educating December 17, 2012 PBI Internal use only 3
  • 5. Governments, Corporates & Educational Institutions across the World Rely on us, for their Data Security & Document Evidencing Needs December 17, 2012 PBI Internal use only 5
  • 6. BILLIONGovernmentsince 1957Globally BILLION Software Aprilcompany of the $5.4 billion member Continuous Securely Magazine’s (2009) on Handle 1920 92$2 RANK $25 $2 Founded acquisitions USA in Customers 23, S&P of world’s 500 Revenue Stamford, Connecticut, ranking on NYSE Listed $5.4Software & Service Providers Arthur(one of the other 87, existing) >28,000 2000 Bowes Pitney employees & Walter in more than YEARSth patent goes back to 1902 107 businesses in >100 countries BILLION since Countries 500since Year … Every 1950 First Largest MILLION 130  Founded on April 23, 1920 by Arthur Pitney & Walter Bowes (First patent in 1902)  $5.4B company, Stamford, Connecticut, USA, >28,000 employees (>100 countries)  2Million Customers in more than 130 Countries  Listed on NYSE since 1950  Continuous member of the S&P 500 since 1957 (one of the other 87 existing)  $25B - Securely Handle Government Revenue Globally … Every Year  107th in Software Magazine (2009) world’s 500 Largest Software & Service Providers  $ 2B in acquisitions since 2000 December 17, 2012 PBI Internal use only 6
  • 7.
  • 8. Unlike currency, Degrees & Marksheets  can be used (are used) in duplicates/photocopies  do not have one single standard universal format December 17, 2012 PBI Internal use only 8
  • 9. Paper-based security methods lose effectiveness as copies are made (Illustrative Example only) Original Photocopy (No longer carries security features) Special Inks in Logo Security Threads Hologram Seal RFID Chip December 17, 2012 PBI Internal use only 9 -
  • 10. VULNERABILITY Document Security Vs. Data Security Which one eventually matters ? The Security Risks Duplication Data Tampering Forgery External/Internal Hacking December 17, 2012 PBI Internal use only 10
  • 11. MENACE! To the Law, the Society & The Industrious Education Fraternity There seems to be no end to this … BUT, this needs to be ended, NOW! December 17, 2012 PBI Internal use only 11
  • 12. Inability to secure Data & Documents may lead to Economic, Legal & Social Consequences December 17, 2012 PBI Internal use only 12
  • 13. LOSS of REVENUE as documents are Copied & Sold December 17, 2012 PBI Internal use only 13
  • 14. Risk of Loss of Reputation December 17, 2012 PBI Internal use only 14
  • 15. LEGAL CONSEQUENCES answering to & assisting Judiciary December 17, 2012 PBI Internal use only 15
  • 16. SOCIAL CONSEQUENCES In-appropriate benefits December 17, 2012 PBI Internal use only 16
  • 17. In a world of ever-evolving How assured you feel to trust ? IT Tools & Softwares … someone with your life & that of your loved ones’ December 17, 2012 PBI Internal use only 17
  • 18. the SOLUTION Document Evidencing & Verification Solution
  • 19. Document Evidencing & Verification Solution Duplication Data Tampering Forgery External/Internal Hacking December 17, 2012 PBI Internal use only 19
  • 20. Document Evidencing & Verification Solution U n i q u e H y b r i d S o l u t i o n exclusive patented hardware technology, driven by an application It achieves (for the university)  Secure data from the point of origination  Convert Raw Data into an Secured Encrypted Format  Secure data from external/internal threats of misappropriate modifications  Creating Secured Tamper Evident & Verifiable – Degrees/Marksheets in both digital and physical format  Network Independent & Originator Independent Verification Process Offline, Online & SmartPhones December 17, 2012 PBI Internal use only 20
  • 21. Enabling Security of Physical & Online Information Once the asset is secured, right at the Point of Origination Verification Process can be made Unique | Inventive | Really Simple  Network & the(works offline) the SOLUTION is … KEY to Independent Originator Independent it serves as an evidence, authenticating its Origination from a Valid Entity . Processed & Valid Data Points Along with ‘Security-Critical’ data  any tampering from this point onward is detectable – Thus Tamper Evident! Education Performance Data Date & Time Stamping University Identity Unique hardware (CAM) ID  Student Identity Digital Signature its easily & quickly verifiable with respect to ‘Point TM Origination’ of (pbSecure Encryption) Captured Pitney Bowes’ Based on pbSecureTM allows an at the Encryptedentity to protect Digital or Proven Core Technologies Coded & Physical Asset/Data Point of Origination Printed on the Document Right at the ‘Point of Origination’ December 17, 2012 PBI Internal use only 21
  • 22. ‘known to all’ verification process Scan OR Verify online at www.jnu.ac.in 764681325348625645216752177658235432564275 - 22 - December 17, 2012 PBI Internal use only 22
  • 23. 03-Easy Steps to Secure Documents no complex technology change needed Issuance can be done offline or online. Prepare Data Print Secure Process Data Document  Convert data to  Software processes data  Continue using current standardized format ( and generates secure printing process to print any tools or software barcode secured document provided by PB)  Send data to central  Check Data for server for online correctness verification (optional) December 17, 2012 PBI Internal use only 23 -
  • 24. pbSecure™ Platform - Architectural Overview pbSecure PLATFORM Creation Repository Verification Send & Certifying Receive Authority Encryption Online + Storage Secured Access Repository online/offline verification Data Integration Storage QR Code Print & Certification Verified Certification / Documentation December 17, 2012 PBI Internal use only 24
  • 25.
  • 26. Need to make it Only a ZERO (Minimal) Lag-Time Will shut down every single Scamster/Fraudster December 17, 2012 PBI Internal use only 26
  • 27. Manual Time Consuming Effort Extensive  Most employers outsource the education records verification to 3rd parties  Process can take up to few weeks & can be expensive  Some universities have online verification systems. However, since no central database exists many verifications are still manual December 17, 2012 PBI Internal use only 27
  • 28. PEACE OF MIND  A solution to eliminate costs & Efforts spent on verification  Cut down the investment on Time, Cost & Effort to verify degrees  Ability to Swiftly Verify – even if verification requests increase exponentially  A system which can boost the number of verification request  Solution should be able to work without upfront cost to university December 17, 2012 PBI Internal use only 28
  • 29. DEMO
  • 30. ™ Every connection is a new opportunity™ - 30 - December 17, 2012 PBI Internal use only 30

Editor's Notes

  1. This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010!For more sample templates, click the File tab, and then on the New tab, click Sample Templates.