Prevention of Fakes, Firgery & Tampering in Valuable documents like - degrees, certificates, Marks Sheets & various HR issued documents like Appointment Letters, Experience Letters, Salary Slips & also Government issued certificates like - Birth certificates, Caste certificate, Income certificate etc.
3. We will cover
Knowing Identifying Solving These
Pitney Current Challenges
Bowes Challenges pbSecure TM
5 Minutes 10 Minutes 10 Minutes
We take care of Data Security, so that your focus remains on Educating
December 17, 2012 PBI Internal use only 3
5. Governments, Corporates & Educational Institutions
across the World Rely on us, for their
Data Security & Document Evidencing Needs
December 17, 2012 PBI Internal use only 5
6. BILLIONGovernmentsince 1957Globally
BILLION Software Aprilcompany of the
$5.4 billion member
Continuous
Securely Magazine’s (2009)
on Handle 1920
92$2
RANK
$25 $2 Founded acquisitions USA
in Customers 23,
S&P of world’s
500 Revenue
Stamford, Connecticut,
ranking on NYSE
Listed
$5.4Software & Service Providers
Arthur(one of the other 87, existing)
>28,000 2000 Bowes
Pitney employees
& Walter
in more than
YEARSth patent goes back to 1902
107 businesses in >100 countries
BILLION since Countries
500since Year
… Every 1950
First
Largest
MILLION 130
Founded on April 23, 1920 by Arthur Pitney & Walter Bowes (First patent in 1902)
$5.4B company, Stamford, Connecticut, USA, >28,000 employees (>100 countries)
2Million Customers in more than 130 Countries
Listed on NYSE since 1950
Continuous member of the S&P 500 since 1957 (one of the other 87 existing)
$25B - Securely Handle Government Revenue Globally … Every Year
107th in Software Magazine (2009) world’s 500 Largest Software & Service Providers
$ 2B in acquisitions since 2000
December 17, 2012 PBI Internal use only 6
7.
8. Unlike currency, Degrees & Marksheets
can be used (are used) in duplicates/photocopies
do not have one single standard universal format
December 17, 2012 PBI Internal use only 8
9. Paper-based security methods lose effectiveness as copies are made
(Illustrative Example only)
Original Photocopy
(No longer carries security features)
Special
Inks in
Logo
Security
Threads
Hologram Seal RFID Chip
December 17, 2012 PBI Internal use only 9
-
10. VULNERABILITY
Document Security Vs. Data Security
Which one eventually matters ?
The Security Risks
Duplication Data Tampering Forgery External/Internal
Hacking
December 17, 2012 PBI Internal use only 10
11. MENACE!
To the Law, the Society & The Industrious Education Fraternity
There seems to be no end to this …
BUT, this needs to be ended, NOW!
December 17, 2012 PBI Internal use only 11
12. Inability to secure Data & Documents may lead to
Economic, Legal & Social Consequences
December 17, 2012 PBI Internal use only 12
13. LOSS of REVENUE
as documents are
Copied & Sold
December 17, 2012 PBI Internal use only 13
14. Risk of Loss of Reputation
December 17, 2012 PBI Internal use only 14
15. LEGAL CONSEQUENCES
answering to & assisting Judiciary
December 17, 2012 PBI Internal use only 15
16. SOCIAL CONSEQUENCES
In-appropriate benefits
December 17, 2012 PBI Internal use only 16
17. In a world of
ever-evolving
How assured you feel to trust
?
IT Tools & Softwares …
someone with your life &
that of your loved ones’
December 17, 2012 PBI Internal use only 17
18. the SOLUTION
Document Evidencing & Verification Solution
19. Document Evidencing & Verification Solution
Duplication Data Tampering Forgery External/Internal
Hacking
December 17, 2012 PBI Internal use only 19
20. Document Evidencing & Verification Solution
U n i q u e H y b r i d S o l u t i o n
exclusive patented hardware technology, driven by an application
It achieves (for the university)
Secure data from the point of origination
Convert Raw Data into an Secured Encrypted Format
Secure data from external/internal threats of misappropriate modifications
Creating Secured Tamper Evident & Verifiable – Degrees/Marksheets
in both digital and physical format
Network Independent & Originator Independent Verification Process
Offline, Online & SmartPhones
December 17, 2012 PBI Internal use only 20
21. Enabling Security
of Physical & Online Information
Once the asset is secured, right at the Point of Origination
Verification Process can be made
Unique | Inventive | Really Simple
Network
&
the(works offline) the SOLUTION is …
KEY to
Independent
Originator
Independent
it serves as an evidence, authenticating its Origination from a Valid Entity .
Processed & Valid Data Points Along with ‘Security-Critical’ data
any tampering from this point onward is detectable – Thus Tamper Evident!
Education Performance Data Date & Time Stamping
University Identity Unique hardware (CAM) ID
Student Identity Digital Signature
its easily & quickly verifiable with respect to ‘Point TM Origination’
of
(pbSecure Encryption)
Captured Pitney Bowes’
Based on pbSecureTM allows an at the
Encryptedentity to protect Digital or
Proven Core Technologies Coded &
Physical Asset/Data Point of Origination
Printed on the Document
Right at the ‘Point of Origination’
December 17, 2012 PBI Internal use only 21
22. ‘known to all’ verification process
Scan OR Verify online at www.jnu.ac.in
764681325348625645216752177658235432564275
- 22 - December 17, 2012 PBI Internal use only 22
23. 03-Easy Steps to Secure Documents
no complex technology change needed Issuance can be done offline or online.
Prepare Data Print Secure
Process Data
Document
Convert data to Software processes data Continue using current
standardized format ( and generates secure printing process to print
any tools or software barcode secured document
provided by PB)
Send data to central
Check Data for server for online
correctness verification (optional)
December 17, 2012 PBI Internal use only 23
-
24. pbSecure™ Platform - Architectural Overview
pbSecure PLATFORM
Creation Repository Verification
Send &
Certifying
Receive
Authority
Encryption Online
+
Storage
Secured Access
Repository online/offline
verification
Data
Integration
Storage
QR Code
Print &
Certification
Verified
Certification /
Documentation
December 17, 2012 PBI Internal use only 24
25.
26. Need to make it
Only a ZERO (Minimal) Lag-Time
Will shut down every single Scamster/Fraudster
December 17, 2012 PBI Internal use only 26
27. Manual Time Consuming Effort
Extensive
Most employers outsource the education records verification to 3rd parties
Process can take up to few weeks & can be expensive
Some universities have online verification systems. However, since no central
database exists many verifications are still manual
December 17, 2012 PBI Internal use only 27
28. PEACE OF MIND
A solution to eliminate costs & Efforts spent on verification
Cut down the investment on Time, Cost & Effort to verify degrees
Ability to Swiftly Verify – even if verification requests increase exponentially
A system which can boost the number of verification request
Solution should be able to work without upfront cost to university
December 17, 2012 PBI Internal use only 28
30. ™
Every connection is a new opportunity™
- 30 - December 17, 2012 PBI Internal use only 30
Editor's Notes
This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010!For more sample templates, click the File tab, and then on the New tab, click Sample Templates.