Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Scorpio: Honestly, do you think Hardjono came over to Wave for the money and stock options? I dont believe so but I truly dont know? It's possible. I base my opinion on relationships i've had with people who have worked for very large IT companies. What I do know is that brilliant and talented people are typically driven by more than money. At least the one's worth building a company with. I know CM and others have a better perspective of guy's like Hardjono. I would love to hear their opinion on this point and I may change my mind. Jeff
I agree! I like being a part of 25% ownership of the company. I dont want to give that up until my bank account tells me it's ok. Jeff
Micro, RVP's in any major company make between 300K to 500K a year. RVP's aren't required to typically travel the world trying to secure partnerships and sell or are they publically accountable to the street and shareholders. I understand your angle in relation to Wave not generating rev's as of yet. But, if you and I didn't believe Wave would become a multi-billion $ company then we wouldn't be invested or posting on the ihub board. As far as i'm concerned SKS and his leadership team have earned every penny getting the company to this point. The Seagate deal alone is worthy of every penny spent on leadership salary IMO. Jeff
This has been an emotional investment over the last decade. Take a look at your own posts over the years and tell me you've been devoid of passion and emotion relating to Wave. Anybody here dictating proper levels of passion and emotion should look in the mirror and stare at themselves for awhile. Jeff
I'm sick and tired of hearing how SKS and others are overpaid! SKS and company are underpaid IMO in terms of travel and the day in and day out business obligations associated with building this company. Anybody who has any knowledge or sense of what business professionals are making in this day and age understand 1/2 million a year for what SKS does and is accountable for isn't out of line by any means in terms of compensation. On the other hand, if we're finally going to see our shares split and rise several times over the next couple years then the leadership and most of Wave's employees have plenty of shares. Believe that! I guarentee that if Wave does what we think it's going to do there MIGHT be a few Wave employees who wont be millionares. Very few if any. In relation to attracting new talent with these options.... The type of successful middle aged individuals Wave will be attempting to attract will be more interested in aligning themselves with a company like Wave (at this moment in the trusted computing age)for myriad of other reasons than just $$$$ IMPO. If it is about money for a specific individual than maybe that person isn't right for Wave? Lark is a perfect example of what type of individuals Wave should be recruiting. My last two cents... Nothing is about trust! Trusting management? Almost all of us are old enough to know that we're lucky to have one or two individuals that we can trust with our lives. Three if we're super lucky. Crazy world we live in with crazy things happening from poeple that you would never expect to be doing those crazy things. Forget about trusting management. Great guy's IMO but it's my families money i'm most concerned about here not theirs. The longs deserve to be rewarded here with a rise in share price, split and rise. Once we've all had a piece of the cake THEN bake another cake?!
The message from this proxy (to me) says that the company expects to grow and be around for quite some time. Terrific message! But the amount of options requested by the company for distribution tells me that we're at the low end of the hockey stick relative to share price growth over the next couple years. If I were a new investor I would be happy as hell with the message. A couple more years for me and my family blows.
Jeff
Weby:
To me personally, it's about controlling shares and proxy votes. It's been said that Wave longs control approximately 25% of the shares. 25% is substantial and gives me a good feeling when proxy's such as this one arise. I'm concerned about diluting Wavoid leverage to sway proxy voting in the future if needed. Jeff
Wash: "Why not now? Why not be able to reward the loyal, hard-working employees now, and still have plenty to attract new talent when the SP starts rising?"
For once, why not reward the the loyal, hard-working, long time share holders first? Wave employees wouldn't have a job if it wasn't for us.... Jeff
Vader: I think you're missing out on another SP rise above $3 before a PP. Anyhow, I see the reasoning in your trading approach. But someday, a whole bunch of traders gonna get caught with their pants down on this stock. Jeff
DRM
Hoping you're right brother! Anymore, I could care less who is right or wrong in the community. I just want to finally get paid. It's all about Wave making the paper at this point! Jeff
Gotta love Dateline!
DRM, the problem is nobody cares without numbers? You and I know Wave already has the corner of a huge market. To bad it's not the 90's and the market now demands proof or at least nearly perfect proof. Jeff
Why do you think an announcement from Hitachi will do anything to the long term share price? Unless the announcement includes a projected number of drives to be shipped in 2007 coupled with some $$$$ per drive then we should only expect a short term rise in SP of what? .50? Good for traders I suppose but for the rest of us just another day to get excited. Not being a downer here but letting history dictate my expectations. But I agree in that the FDE HD business will finally pay all of us Wavoids off in the next two years. Jeff
Nobody else could have said it better! Thank you! Jeff
Jakes-dad: The show was terrific for our cause! Looking forward to part two next week. Seagate FDE for consumer laptops soon? Jeff
Internet: That's my ONLY problem with SKS. Other than that, the guy has been amazing IMO. To have Wave in this position after all these years without any long term debt is incredible. Jeff
Posted on RB ARM Board:
http://ragingbull.quote.com/mboard/boards.cgi?board=ARMHY&read=14987
Tampa: I'll be following around Tiger from hole to hole at the Masters again this year. Maybe you'll see me and my drunk buddies on TV Tonic? Augusta's still serving $2 beers! Jeff
Vader: I have to disagree. Still gets me excited to see favorable remarks about Wave from leaders within the companies listed who were quoted. Especially considering Waves server tools were front and center within the very same PR. The ONLY server tools that will interoperate with the very same Trusted Computing products offered by the very same companies who provided the quotes. Jeff
Internet terrorism. Massive air time with an Army General. Jeff
Anybody watching 60 minutes tonight? Good for Wave. Jeff
I agree and like a few have said the article sets him up for the big one when this baby lands! Still a boring article much like the podcast. Jeff
Now that was simply boring. Hope his article provides better entertainment. Jeff
The OMAP strikes back
http://www.mtekk.com.au/Articles/tabid/54/articleType/ArticleView/articleId/779/3GSM-2007-Round-Up-P...
The OMAP strikes back:
Imagine this processor with the above GPU...
Texas Instruments the producer and designer of the OMAP processor have always seemingly opted for features and multi-threading chip architecture over raw MHz power, and whilst the new OMAP 3430's that will begin rolling out in 2007 are expected to be delivering more Mhz, the new features these processors will be delivering is nothing short of impressive. Without further ado the extract for the purpose of the new processor followed by a rundown of its features
"OMAP 3 application processors will power a new class of mobile phones that will improve entertainment and productivity features and integrate capabilities of cameras, gaming devices, portable video and music players, laptops and PDAs. TI's first OMAP 3-based device, the OMAP3430 processor, will be the industry's highest-performing application processor and is believed to be the first wireless processor to use 65-nanometer (nm) process technology". Source
New OMAP™ 3 architecture combines mobile entertainment with high performance productivity applications
Industry's first processor with advanced Superscalar ARM® Cortex™-A8 RISC core enabling 3x gain in performance
Industry's first processor designed in 65-nm CMOS process technology adds processing performance
IVA™ 2+ (Image Video Audio) accelerator enables multi-standard (MPEG4, WMV9, RealVideo, H263, H264) encode/decode at D1 (720x480 pixels) 30 fps (High Definition)
Integrated image signal processor (ISP) for faster, higher-quality image capture and lower system cost
Flexible system support
Composite and S-video TV output
XGA (1024x768 pixels), 16M-color (24-bit definition) display support
Flatlink™ 3G-compliant serial display and parallel display support
High Speed USB2.0 On-The-Go support
Seamless connectivity to Hard Disk Drive (HDD) devices for mass storage
Leverages SmartReflex™ technologies for advanced power reduction
M-shield™ mobile security enhanced with ARM TrustZone™ support
Click link to see diagram
High definition to the left of me, High speed USB to the right...
Much, much more detail on these processors and their capabilities is provided here and here. If this processor could be combined with Nvidia's GoForce 5500 GPU (discussed above) the next plateau in Mobile devices would certainly be upon us with both chipset and GPU working to provide unparalleled multimedia functions. Even if such a combination isn't possible less power hungry CPUs combined with new security features, faster USB and HDD access and ameliorated multimedia capabilities and possibilities still make this new High Definition processing power something to look out for in 2007.
Special Thanks to all the sites sourced and all logos, trademarks and intellectual property are the sole property of those individuals and organisations.
I agree. But I believe the article will reflect more about Wave "the company" more than some think. Jeff
Anybody watch Cramer tonight? He's bullish on EMC because of their new "Vwave" technology LOL. Jeff
NTT DoCoMo, KDDI, NEC and Hitachi Develop Authentication Infrastructure for Mobile Phones
Tokyo, Jan 26, 2007 (JCN) - NTT DoCoMo, KDDI R&D Laboratories, NEC Corporation, and Hitachi Ltd. developed a highly secure authentication infrastructure which works for all mobile carriers. The research was commissioned by the National Institute of Information and Communications Technology (NICT) and took three years to complete.
Compared with conventional ID/Password authentication, the new technology utilizes Public Key Infrastructure (PKI) and uses electronic certification. An electronic certification prevents impersonation and falsification by a third party and alleviates the burden on users, who no longer need to register every time they use it).
The authentication infrastructure feasibility test will take place at the Mobile IT Forum on January 25, 2007. NTT DoCoMo, in collaboration with NICT, will open a public lecture on the mobile authentication infrastructure technology ("The future of electronic certification in the mobile commerce") on February 6, 2007.
By Aki Tsukioka, JCN Staff Writer
http://www.japancorp.net/Article.asp?Art_ID=14064
Dont remember seeing this presentation?
Sorry if already posted.
Slide 18 and 19 in particular
www.gstproject.org/sec/docs/Escar05_deCock.pdf
http://www.gstforum.org/
GST is an EU-funded Integrated Project that is creating an open and standardized end-to-end architecture for automotive telematics services.
The purpose of GST is to create an environment in which innovative telematics services can be developed and delivered cost-effectively, and hence to increase the range of economic telematics services available to manufacturers and consumers.
Think Zion's Bank knows something about Wave?
Multi-Factor Authentication Takes Hold
February 16, 2007 - Linda McGlasson
Information Security Technology
STRONG Authentication
Are financial institutions implementing the multifactor authentication laid out in the FFIEC Guidance? That was one of the issues discussed at the RSA panel presentation, “37 Days After the FFIEC Guidance Deadline.” The panel of banks, credit unions and industry experts talked about what it took to get this far, and what is expected to happen next.
Lee Carter, President of Online Banking at Zions Bank in Centerville, UT, was on the panel and he voiced optimism about the multifactor authentication guidance. He explained the Zions Bank’s implementation of its new authentication method, “It was days if not hours after the implementation that we had people [hackers] banging on our front door trying to figure out what we were doing. They were pretty persistent, and put up phishing sites to try to figure it out, we got those taken down, and they since have stopped.” Carter said Zions Bank customers were well aware of the changes, as the bank had done a lot of advertising up to 45 days before the implementation and information was sent to its customers prior to the cutover, so they would be informed as to what to expect with the new changes. With Zion’s success, Carter expressed concern for smaller institutions “who have not implemented a solution yet, because more structured things may be coming their way, because they [phishers] will move to where they think they have new ground to plow.”
The panel noted that phishing attacks were up an estimated 40 percent in the last year, and thought that this may point to phishers trying to get in as many phishing attacks as possible before institutions implement the stronger authentication for their customers.
"From an industry perspective, I think most of the community financial institutions are ahead of the curve as far as the adoption of multifactor authentication because they don't host/manage their Internet Banking infrastructure. Typically, financial institutions have their Core Provider host their Internet Banking website, and most Core Providers already have adopted some form of multifactor authentication," said audience member Matt Riley, CTO and VP of Security at Gladiator Technology Services, a managed security service provider for financial institutions.
The panel noted that regulatory agencies gave signals two years before this guidance came out. So what might be next? While the authentication guidance deadline was fairly short in comparison to other previously issued guidance, a less dramatic movement toward mutual authentication, and encryption, may be possible next steps, noted panelist Doug Johnson, senior policy analyst for the American Banking Association.
Scott Schrader
President- Wave ETMS Management Team
Mr. Schrader brings over 18 years of management, marketing and product management experience to the eTMS team, where he is responsible for the company's operational and company strategy. Prior to Wave Mr. Schrader held executive positions with Zions Bancorp owned Lexign and Digital Signature Trust where he was Vice President of Global Sales and President of Financial Services. Prior to joining Zions Bancorp, Mr. Schrader was Corporate Vice President of Sales for Caredata where he managed the company's global sales and business development efforts. Prior to Caredata.com, Schrader was Vice President of Sales and Marketing of Zynx Health Incorporated, a subsidiary of Cedars-Sinai Health System where he directed the company' growth from 15 clients to over 300. Prior to joining Zynx, Mr. Schrader was Vice President of HBS International of Seattle WA, where he helped HBSI achieve record sales and revenue growth. Prior to HBSI, Schrader held management positions at Johnson & Johnson and Citicorp. Mr. Schrader attended the University of Missouri-Columbia, where he earned a B.S. in Personnel Management and completed his graduate education in Psychology.
http://www.arm.com/community/display_product.php?ProductId=2302&display=3
Wave Systems Corp.
EMBASSY Trusted Computing Software
Security
Product Description
EMBASSY Trusted Computing Software
Wave Systems has developed a range of advanced security products and technologies under the EMBASSY (EMBedded Application Security SYstem) Trusted Computing brand. Trusted hardware designs, such as the new ARM TrustZone architecture, including the ARM defined software support for TrustZone, are key elements for the security models supported by the EMBASSY technologies. Wave’s EMBASSY products support the open standards for new hardware security solutions from the Trusted Computing Group (TCG). The TCG is working on specifications covering a wide range of platforms including PCs, peripherals, cell phones, PDAs, and other devices.
Wave’s EMBASSY family of trusted computing products, technologies, and experience include the following elements
• Secure Applications and Services
• Application Development Tools
• Trust Infrastructure Servers
o Device Management and Authentication
o Secure Application Life Cycle Management
o Key Management Services
Wave Systems is focused on development, licensing, and reseller relationships in the emerging trusted computing ecosystem based on the ARM TrustZone architecture.
http://www.wave.com/products/ets.html
Market Segment(s)
Embedded
Enterprise
Home
Mobile
ARM Processor(s)
ARM1176JZ(F)-S
Embedded Software
TrustZone™ Technology
TI Demonstrates 'Over-the-Air' Secure Application Downloads Over Live Wireless Networks
BARCELONA, Spain, Feb. 9 /PRNewswire/ -- Building on its strategy to allow mobile operators to provide new services and improved user experience, Texas Instruments Incorporated (TI) is demonstrating TI's M-Shield(TM) security framework on the OMAP(TM) platform at 3GSM World Congress. TI has collaborated with Vodafone to showcase how operators can securely deploy and upgrade key applications, such as DRM agents to phones over-the-air (OTA), making it possible for an installed-base of users to upgrade the capabilities of their handsets and purchase protected multimedia content transparently. This capability will reduce operators' operational costs, improve time-to- market of new services deployment, while at the same time preventing the risk of installing unwanted applications and malicious software.
Click to learn the importance of data management in creating availability solutions including clarification of availability terminology.
Cost containment for communications vendors and their carrier customers can be achieved on two fronts. Click here to find out what they are and how to streamline the development and maintenance costs associated with building the product.
Click Here to Learn How You Can Evaluate Customer Relationship Management (CRM) Applications
Over the past decade, consumer debt has surged at an alarming pace. The likelihood of recovering debt, however, decreases with each passing day. Click here to learn how to maximize revenue.
"A robust trusted execution platform is critical to ensure secure software downloads and execution," said Chris Haynes of Vodafone. "TI's M-Shield security technology on the OMAP platform offers the means to achieve the level of security we want to provide to customers. We now have demonstrated the possibility to securely upgrade terminals in the field, and to speedily provide customers with new services and content access."
In collaboration with Trusted Logic, the demonstration of TI's M-Shield Trusted Execution Environment (TEE) shows the real-time, secure download of Calton Hill's DRM agent over Vodafone's existing wireless infrastructure to a terminal that has no DRM; a real-time upgrade to the software over the network; and a demonstration of protected content and rights sharing between two terminals. The demonstration illustrates how users can easily upgrade their installed software, or transfer rights to use protected content to other users.
Forge valuable relationships at The World's Only IP Communications Development Event. Communications Developer Conference is May 15-17, 2007 in Santa Clara.
Where do you stand on selecting sofware products? Take a quick survey to voice your opinion.
Forge valuable relationships at The World's Only IP Communications Development Event. Communications Developer Conference is May 15-17, 2007 in Santa Clara.
Have an opinion on software products? Customer Interaction Solutions wants to know what you think. Take this brief survey.
"In order for content-based and personalized applications to proliferate, security solutions on handsets need to be cost-efficient, standards-compliant, and easily deployable and upgradeable. TI's M-Shield Trusted Execution Environment on the OMAP platform greatly expands the possibilities offered in the deployment of secure services to both operators and end-users," said Loic Hamon, Strategic Marketing Director of TI's Wireless Terminals Business Unit. "Now devices in the field can securely receive instant software installations or upgrades to handle new services and fix bugs, and ensure enhanced reliability and resilience to attack over the lifetime of the terminal."
About TI M-Shield Technology
Texas Instruments M-Shield mobile security technology solution implements a hardware-strengthened secure environment for the safe execution of sensitive applications and the secure storage of critical data, enabling standards- compliant terminals, secure applications and services. M-Shield technology provides the highest level of terminal and content security in the industry today and is the key security element of TI's OMAP platform and OMAP-Vox(TM) processors.
See the M-Shield Technology Demo at 3GSM
TI's M-Shield technology on the OMAP 2 platform will be demonstrated at the TI booth (8A84) at 3GSM World Congress in Barcelona on February 12 and 13. For more information on TI's activities at 3GSM, please visit http://www.ti.com/3gsm_2007 .
Texas Instruments - Making Wireless
TI is the leading manufacturer of wireless semiconductors, delivering the heart of today's wireless technology and building solutions for tomorrow. TI provides a breadth of silicon and software and 16 years of wireless systems expertise that spans handsets and base stations for all communications standards, wireless LAN, GPS, Digital TV, Bluetooth(R) and Ultra Wideband. TI offers custom to turn-key solutions, including complete chipsets and reference designs, OMAP(TM) application processors, as well as core digital signal processor and analog technologies built on advanced semiconductor processes. Please visit http://www.ti.com/wirelesspressroom for additional information.
About Texas Instruments:
Texas Instruments Incorporated provides innovative DSP and analog technologies to meet our customers' real world signal processing requirements. In addition to Semiconductor, the company includes the Education Technology business. TI is headquartered in Dallas, Texas, and has manufacturing, design or sales operations in more than 25 countries.
Texas Instruments is traded on the New York Stock Exchange under the symbol TXN. More information is located on the World Wide Web at http://www.ti.com/ .
Trademarks
M-Shield, OMAP and OMAP-Vox are trademarks of Texas Instruments. All other trademarks and registered trademarks are property of their respective owners.
Photo: NewsCom: http://www.newscom.com/cgi-bin/prnh/20010105/NEF016LOGOAP Archive: http://photoarchive.ap.org/PRN Photo Desk photodesk@prnewswire.com
Texas Instruments Incorporated
CONTACT: U.S., Amy Drozd, +1-214-567-7513, or a-drozd@ti.com , or EMEA,Daniela Koeppe, +011-33-493-22-2947, or koe@ti.com , both of Texas InstrumentsIncorporated. Please do not publish these e-mail addresses or phone numbers.
Web site: http://www.ti.com/wirelesspressroomhttp://www.ti.com/3gsm_2007" target="_blank">http://www.ti.com/http://www.ti.com/wirelesspressroomhttp://www.ti.com/3gsm_2007
http://3gsmworldcongress.com/
Pretty convincing dots here?
http://www.globalexecutiveforum.net/Security.htm
Sprint Mobile Security offers unmatched seamless end-user security for mobile workforce
Sprint launched Sprint Mobile Security, which is powered by Mobile Armor and is the only security solution from any carrier that allows complete end-to-end security management for laptops and mobile handheld devices. It is a new service available in the Sprint Mobility Management portfolio, which also includes billing and device management services and is the only integrated package designed to work across multiple carriers and device and operating system (OS) platforms.
"Wireless security issues concern enterprise customers looking to expand wireless access to a broader range of corporate applications," said Rena Bhattacharyya, industry analyst at IDC. "Sprint Mobile Security addresses these concerns by bundling services that mitigate security risks and threats into a pre-packaged solution designed to be easy to install, use and pay for."
Sprint Mobile Security is designed to meet three major needs: data protection, threat prevention and compliance.
Data Protection
Sprint Mobile Security protects data by enforcing password policies across all devices with fixed, PIN or color-coded credentials. It also allows companies to encrypt individual files or an entire device and memory card using AES or 3DES, and the mobile VPN allows users to securely connect to the corporate intranet while on the go.
Threat Prevention
Sprint Mobile Security protects mobile devices from viruses, worms and Trojans that can infect devices and spread malware via text messages or Bluetooth connectivity. It scans, identifies and removes these malicious codes, and its firewall blocks "denial of service" attacks and restricts network traffic based on source, destination, IP ports and applications. Sprint Mobile Security can also lock and delete data on a device if the device is lost or stolen.
Compliance
Sprint Mobile Security enables companies to enforce policies to ensure that only corporate-sanctioned applications are on their devices and that government and industry regulations are being met. It can enforce more than 150 policies from a single online portal. Sprint Mobile Security also offers automatic remediation, which will update non-compliant programs or profiles automatically, without requiring user intervention. This feature simplifies the user experience and enhances productivity so that users are not locked out of applications or services.
"With Sprint Mobile Security, companies have access to the highest level of security expertise, tools and customer service to ensure complete protection for their unique and evolving enterprise security needs," said Barry Tishgart, director of product marketing for Sprint. "Companies can have confidence knowing that their assets are secure and proprietary data is protected and compliant with corporate policy."
http://www.mobilearmor.com/industry_04a.html
Industry Solutions
Government - Military
Government agencies constantly face pressure to protect vital information from disclosure. Whether the data is related to intelligence, monetary policy or court cases, the data must be protected from both internal and external threats. With the increased use of laptops and other mobile devices such as PDAs and smartphones, this data is exposed to an increasing number of threats. Additionally, governments require security products to meet specific requirements, such as independent security evaluations.
Securing mobile devices within the government presents several challenges.
Prevent Unauthorized Access to Devices
As more information is being stored on devices outside the secure confines of a physically secure building where it does the most good, it becomes critical that you know who is authorized to access that information, and be able to prevent unauthorized people from accessing that same information.
Mobile Armor provides Mandatory Authentication Services on all protected devices. This service requires that any user be properly authenticated prior to any access to the device. This includes the operating system (such as Windows), and all stored data.
Secure Confidential Data
Related to unauthorized access is preventing any access to the data, even when a device has been lost or stolen. This information may include sensitive data, such as intelligence files or diplomatic intentions, and so that information must be secure wherever it resides.
Mobile Armor secures all stored data on the device with encryption. Without proper authentication no data on the device can be read, including the operating system.
Minimize User Impact of Security
The average user is not expected to be a technology professional, and while they should understand the need for security, they should not be bothered with its implementation. They need quick access to data, confident that security is taken care of.
Since Mobile Armor encrypts all data stored on the device, users are not required to remember any extra steps to secure records; they only need to be able to login to the device.
Uniform Protection for all devices
Most government departments have many different types of devices, from PCs to PDAs that are both used by various employees. The security provided across all these devices must be the same, both to assure complete protection as well as to minimize the impact on users of the devices.
Mobile Armor provides a uniform interface across all protected platforms, allowing an organization to standardize on a single authentication system regardless of the device being used.
Independently Evaluated
Many governments require that before security products are purchased they be evaluated against some independent criteria. These evaluations are used to measure the product against the needs of the organization and to provide assurances about the security provided by the product.
Mobile Armor utilizes FIPS approved and validated encryption algorithms, AES and 3DES, for all encryption operations. This provides the highest level of security assurance available for encryption products.[/B]
http://www.certicom.com/index.php?action=company,press_archive&view=581
[B]Mobile Armor Licenses Certicom Technology to Provide VPN Security for Mobile Devices
Integration of Certicom’s highest quality, standards-based IPSec VPN functionality into our existing solution provides a secure and trusted method to wirelessly deploy and manage services.-- Chand Vyas, Mobile Armor
Data security system enables rapid deployment and secure management of services over-the-air
MISSISSAUGA, Ontario – (April 18, 2006)–When it comes to security, managed service providers (MSP) have a tall order: rapid deployment, multiple platform support, easy and secure management of services and upgrades to thousands of devices. Certicom Corp. (TSX: CIC) announced today that Mobile Armor is using Certicom technology to expand its wireless suite of security products to include IPSec for virtual private network (VPN) connectivity that meets the needs of MSPs.
"Mobile Armor provides the 'best of breed' mobile security solution for protecting critical data and information on mobile devices, laptops, and desktops," said Chand Vyas, chairman and CEO of Mobile Armor. "Integration of Certicom's highest quality, standards-based IPSec VPN functionality into our existing solution provides a secure and trusted method to wirelessly deploy and manage services."
Relying on Certicom's experience in developing security for resource-constrained environments, Mobile Armor was able to integrate a standards-based VPN client that is about one-tenth the size of the desktop version but with equivalent functionality. The Mobile Armor solution, with Certicom's VPN technology, provides the tools required to secure the enterprise, including cross-platform centralized management and reporting; data and network protection; and compliance and remediation. [U]Mobile Armor's next-generation technology security solution currently ensures the data integrity of the U.S. Department of Defense, small to large enterprises and MSPs.[/U]
"By working with Certicom, Mobile Armor is able to accelerate its time to market with secure VPN connections that support leading platforms and gateways," said Ian McKinnon, Certicom's president and CEO. "Mobile Armor's solution offers mobile service providers the means to safely manage and deliver services 'over the air' with unparalleled security."
Under the terms of the agreement, Mobile Armor will pay a one-time license fee, professional services fees and royalties on a quarterly basis, on deployment of products.
About Mobile Armor
Privately held, Mobile Armor is a St. Louis based leading provider of Enterprise Mobile Data Security (EMDS™). Mobile Armor develops and markets the next-generation software suite that enables dynamic organizations to fully protect business, financial and operating information and data. Mobile Armor's solution has been certified to meet the standards and guidelines for security set by the National Institutes of Standards and Technology, an agency of the United States Government. Visit www.mobilearmor.com
About Certicom
Certicom protects the value of your content, software and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
Certicom, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.
AND THIS.....
http://www.investorshub.com/boards/read_msg.asp?message_id=16960428
Beep Science Announces New Consumer Mobile DRM Applications Based on ARM TrustZoneTechnology
OSLO, NORWAY AND CAMBRIDGE, UK – Feb. 14, 2006 – Beep Science, a leading provider of mobile Digital Rights Management (DRM) software, and ARM [(LSE: ARM); (Nasdaq: ARMHY)], today announced at the 3GSM World Congress, Barcelona, the availability of an Open Mobile Alliance (OMA) v2-compliant DRM solution based on the ARM® TrustZone® Software framework and API. The TrustZone Software API provides a common framework for secure application developers, reducing porting costs and enabling greater compatibility across multiple platforms.
By integrating the Beep Science OMA DRM Agent, mobile operators, service and content providers can protect their content property rights while ensuring high-quality downloaded content continues to drive revenue and profits. The ARM TrustZone technology is specifically targeted at securing a range of embedded and consumer products such as mobile phones, PDAs, set-top boxes including those running open Operating Systems (OS), such as Linux, Symbian OS and Windows CE. It contributes towards a reliable implementation of security critical applications and services such as network virus protection, VPNs and DRM. The TrustZone software framework provides application developers, OEMs and service providers with a robust and open security framework that facilitates interoperability and enables them to leverage their software investment in multiple market areas.
“Strong content protection technology enables high-quality content rights to be secured and ensures that digital content can be shared freely and securely across mobile phones, PCs and other consumer electronics,” says Markku Mehtala, vice president of business development at Beep Science. “By enhancing our mobile DRM solution with ARM TrustZone technology, we can enable device manufacturers and operators to deliver rich mobile media content in all forms of devices that consumers expect.”
“The OMA DRM standard is paving the way for a seamless DRM-enabled digital content ecosystem across consumer devices,” said Lance Howarth, general manager, Embedded Software, ARM. “The ARM TrustZone Software greatly increases the robustness of DRM solutions and, together with Beep Science, we can enable the delivery of highly secure and advanced digital products based on TrustZone technology-enabled processors.”
Availability
TrustZone software is available for licensing from ARM. TrustZone software implements the TrustZone software API which has been defined together with leading industry stakeholders. Partners are invited to join in the further development of the API. The Specification is available as a free, public and open standard for the promotion of interoperable security standards; information on which can be found at http://www.arm.com/trustzone
The TrustZone Hardware extensions are present in the ARM1176JZ-S™ processor as well as the award-winning Cortex™-A8 processor. ARM also developed a complete solution around the framework including models, software development tools and system-level hardware IP. For more information, visit http://www.arm.com/trustzone.
About Beep Science AS
Beep Science AS is a leading provider of Mobile Digital Rights Management software solutions. Founded in 2000, the company represents one of the largest specialist resource centers into mobile DRM technology. Beep Science has its head offices in Oslo, Norway, and has Research & Development site in Szeged, Hungary. Beep Science operates in Europe, Asia and America. Beep Science is an independent software vendor providing client and server side DRM software products based on open industry standard from Open Mobile Alliance. The company’s DRM vision is to support any content format, media player, operating system, device, network and content delivery platform with state of the art open standard DRM technology for both the client and server side. Beep Science has partnerships with leading technology providers and infrastructure vendors, and co-operates with leading software integrators and solutions providers in customer projects for end-to-end solutions. Beep Science has world-class brands in the Media and Telecom Industry as customers. For further information, please visit: www.beepscience.com.
About ARM
ARM designs the technology that lies at the heart of advanced digital products, from wireless, networking and consumer entertainment solutions to imaging, automotive, security and storage devices. ARM’s comprehensive product offering includes 16/32-bit RISC microprocessors, data engines, 3D processors, digital libraries, embedded memories, peripherals, software and development tools, as well as analog functions and high-speed connectivity products. Combined with the company’s broad Partner community, they provide a total system solution that offers a fast, reliable path to market for leading electronics companies. More information on ARM is available at http://www.arm.com.
ENDS
ARM and TrustZone are registered trademarks of ARM Limited. ARM1176JZ-S and Cortex are trademarks of ARM Limited. All other brands or product names are the property of their respective holders. “ARM” is used to represent ARM Holdings plc; its operating company ARM Limited; and the regional subsidiaries ARM INC.; ARM KK; ARM Korea Ltd.; ARM Taiwan; ARM France SAS; ARM Consulting (Shanghai) Co. Ltd.; ARM Belgium N.V.; AXYS Design Automation Inc.; AXYS GmbH; ARM Embedded Technologies Pvt. Ltd.; and ARM Physical IP, Inc.
Trustzone looks like it's heating up!
ARM Cortex-A8 Processor Provides Industry Leading Performance in Texas Instruments OMAP 3 PlatformARM Ltd
13/02/2007 10:49
CAMBRIDGE, England, February 12 /PRNewswire/ --
- Texas Instruments OMAP3430 Processor Demonstrates Low-Power High-Performance Multimedia, Web-Browsing and Gaming Capabilities at 3GSM World Congress
ARM [(LSE:ARM); (Nasdaq: ARMHY)] today welcomed the outstanding capabilities of Texas Instruments Incorporated (TI's) OMAP(TM)3430 processor, integrating the ARM(R) Cortex(TM)-A8 processor. A rich browser experience, High-Definition (HD) video, advanced Java(TM) multimedia, and 3D games, take center stage in the OMAP3430 platform, realizing the full potential of power-efficient and high-performance mobile devices. The OMAP3430 processor's capabilities are being publicly demonstrated at 3GSM World Congress, February 12-15 in Barcelona, in the TI booth #8A84.
"Our collaboration with ARM during the development of the Cortex-A8 processor was important to the advancement of the OMAP 3 platform," said Alain Mutricy, vice president and general manager, Texas Instruments Wireless Terminals Business Unit. "Proving the extensibility of the OMAP 3 architecture, we are demonstrating the ARM Cortex-A8 processor running at speeds up to 1GHz on TI's low-power 65-nanometer (nm) technology. Reaching this milestone provides a glimpse of what will be possible with future wireless technologies."
The Cortex-A8 processor is the first applications processor based on the next-generation ARMv7 architecture, which features support for TrustZone(R) technology, Thumb(R)-2 instructions, Jazelle(R)-RCT technology and ARM's powerful NEON(TM) signal processing extensions targeted for next generation enriched multimedia and gaming mobile platforms.
The exceptional speed and power efficiency of the Cortex-A8 processor brings desktop levels of performance to low-cost, high-volume products for the first time. As part of the OMAP3430 applications processor, the combination of the Cortex-A8 processor's clock frequency, performance efficiency and support for ARMv7 with NEON technology delivers up to three times the performance of today's highest performance handsets. With this, TI is able to demonstrate clock speeds of up to 1GHz on low-power 65-nanometer (nm) technology. This performance level supports a new class of consumer products and connected devices.
"With the rapid convergence of digital entertainment and mobile communications technology, the high performance and low power combination of the ARM Cortex-A8 processor and TI's OMAP 3 platform extends what is possible in this highly connected world," said Mike Inglis, EVP sales and marketing, ARM. "We are very pleased with the demonstrable capabilities of the Cortex-A8 processor and the success of our partnership with Texas Instruments."
The Cortex-A8 processor utilizes a superscalar pipeline and with advanced branch prediction to deliver more than 2000 DMIPS when clocked at 1GHz. The processor features ARM NEON 64/128bit SIMD multimedia technology together with a performance optimized level 1 cache and tightly coupled size-configurable level 2 cache to deliver high-throughput advanced media and gaming processing for next generation devices.
"The ARM Cortex-A8 processor enables a major increase in performance that visibly enhances the user experience," said Richard Kerslake, world wide general manager, 3G and OMAP business, Texas Instruments. "In addition to reaching new performance levels, the OMAP3430 platform is reducing application launch time, increasing touch screen responsiveness and supporting enhanced gaming and web browsing capabilities."
The Cortex-A8 processor was publicly launched at the end of 2005, TI introduced the OMAP 3 platform and OMAP3430 processor at 3GSM in 2006 and is sampling today. Today's announcement marks the first public demonstration of the Cortex-A8 processor's performance and the capabilities of Texas Instrument's OMAP 3 architecture-based silicon.
ARM has secured eight licensees for the Cortex-A8 processor and future support from major EDA and Operating System vendors.
About ARM
ARM designs the technology that lies at the heart of advanced digital products, from mobile, home and enterprise solutions to embedded and emerging applications. ARM's comprehensive product offering includes 16/32-bit RISC microprocessors, data engines, 3D processors, digital libraries, embedded memories, peripherals, software and development tools, as well as analog functions and high-speed connectivity products. Combined with the company's broad Partner community, they provide a total system solution that offers a fast, reliable path to market for leading electronics companies. More information on ARM is available at www.arm.com.
ARM, Jazelle, TrustZone and Thumb are registered trademarks of ARM Limited. Cortex and NEON are trademarks of ARM Limited. All other brands or product names are the property of their respective holders. "ARM" is used to represent ARM Holdings plc; its operating company ARM Limited; and the regional subsidiaries ARM INC.; ARM KK; ARM Korea Ltd.; ARM Taiwan; ARM France SAS; ARM Consulting (Shanghai) Co. Ltd.; ARM Belgium N.V.; AXYS Design Automation Inc.; AXYS GmbH; ARM Embedded Solutions Pvt. Ltd.; and ARM Physical IP, Inc.; and ARM Norway AS.
ARM Ltd
CL: Your post was cool man! Sweet dreams. Jeff
Howard thinks EMC VMWARE and IBM virtualization server technology is and will be competitive to Wave. He doesn't understand that the truth is found in the layers of the technology. He should read. RIF. Jeff
Vodafone / Wave Systems
TCG Outlines Plans to Embed Security into Mobile Phones
TCG’s mobile phone work group, whose active members include AuthenTec, Ericsson, France Telecom, IBM, Infineon, Intel, Motorola, Nokia, Philips, Samsung, Sony, STMicroelectronics, Texas Instruments, VeriSign, Vodafone and Wave Systems, has been working to identify critical security issues, standardized approaches to them, and implementations of Trusted Computing concepts for mobile phones.
Last week, the organization released case studies defining the application of Trusted Computing to the mobile phone. These uses are intended to outline the work TCG is doing and to solicit additional input and participation from the mobile phone industry. The use cases include:
Platform integrity to ensure the hardware and software are in a state intended by the manufacturer.
Device authentication, to protect and store identities of users and bind the device to the appropriate user.
Digital rights management implementation to protect content on the phone.
SIMlock/device personalization to ensure a device is locked to its network and prevents device theft.
Secure software download to enable the safe download of updates, patches and other software.
Secure channel between the device and UMTS Integreated Circuit Card (UICC) to help avoid malicious software that can interfere with applications or otherwise compromise it.
Mobile ticketing to enable the secure download of tickets and manage them.
Mobile payment to enable the secure execution of payments.
Software use to ensure that software is safe and if not, can be removed, replaced or not executed.
User data protection and privacy to allow users to prevent their information from being accessed or viewed by unauthorized entities and to give users access to services or data that might not require personal information.
The complete use cases document and other materials are available on the TCG website at:
https://www.trustedcomputinggroup.org/groups/mobile
TCG Defines PC Client Blueprint
More than just dots. Looks like a win for the Wave Express team!
http://www.smartcardstrends.com/det_atc.php?idu=4975&PHPSESSID=de2ebe11ba6f0937965ed4ce8efe4303
Vodafone Italy launching Vodafone SKY TV program with attractive introductory offer
-- Access rights system from Nagravision guarantees secure access to mobile TV channels
-- SIM cards from G&D handle key management for access rights
Munich, February 08, 2007.
Vodafone Italy, the country’s second largest mobile network operator, recently began offering its wireless customers a way to watch TV on their cell phones through its Vodafone SKY TV service. Much like pay-TV on an ordinary television set, the channels come in the form of encrypted broadcasts. The system of access rights offered by Nagravision handles the task of decoding the signal inside the mobile handset. Nagravision is an independent provider of conditional access systems and integrated solutions for digital TV channel operators. SIM cards being supplied by Giesecke & Devrient (G&D), the world’s second largest manufacturer of smart cards, ensure secure storage and administration of the keys and the user’s rights for the Nagravision system while enabling Vodafone to bill its customers for the incurred TV charges directly via the SIM card.
Italy’s wireless customers are among the first in the world with the ability to watch TV on their cell phones. Since June 2006, they have been able to receive their preferred shows on mobile TV sets. With an introductory giveaway campaign, Vodafone Italy launched in December 2006 its mobile TV program, Vodafone SKY TV, which offers a selection of nine different mobile phone TV channels. Mobile TV programs are transmitted to cellular telephones using Digital Video Broadcasting Handheld (DVB-H) technology. The shows can then be watched via DVB-H mobile phones on the market, the KU950 from LG and P940 from Samsung.
The applet required to decode the TV channel and administer the keys as well as the user’s rights of the Nagravision’s conditional access system is stored on a 128-Kbyte G&D SIM card dubbed UniverSIM Andromeda Pro CX 128. That means the SIM card roughly assumes the role of a smart card used for conventional pay-TV programming. The UniverSIM card meets the standards for 4+ CC EAL certification as well as Vodafone's especially strict security requirements.
Please visit us on 3GSM World Congress 2007 in Barcelona in hall 8, booth B65 and see our mobile TV live demo!
Giesecke & Devrient (G&D) : 08/02/2007
http://www.wavexpress.com/press_release_nagravision062002.asp
Nagravision and Wavexpress Formalize Joint Sales and Marketing Agreement
Leaders in Conditional Access and Content Distribution Combine to Market Secure IP Cable Solution
New York, NY and Cheseaux, Switzerland, June 20, 2002: Nagravision, the digital TV and broadband Internet division of the Kudelski Group (SWX: KUD), and Wavexpress, the broadband technology company backed by Wave Systems (NASDAQ: WAVX), today announced that they are teaming up to market content protection and conditional access solutions for broadband networks.
Nagravision and Wavexpress will work with leading distribution, content, and technology partners to deploy an improved broadband experience. Broadband subscribers will have instant, full-screen access to high-quality video, music, games, and software on the PC.
Wavexpress encrypts content before distributing it to servers at the cable system head-end. The encrypted content is stored at the head-end, and later multicast to all cable modem subscribers simultaneously. Finally, the content is stored locally in encrypted format on the home PC, ready for purchase.
Access to content stored on the PC is controlled by Nagravision's widely deployed Conditional Access System, coupled with Wave Systems' EMBASSY¨, a programmable security processor. EMBASSY (Embedded Application Security System) is a hardware and software-based device that enables secure local transaction processing. EMBASSY handles decryption, metering and billing functions, assuring that content and services are protected and accessible only if paid for by authorized transactions.
EMBASSY integrates NagraIP, an open, modular solution comprising a set of adapted tools that enable broadband operators to offer advanced video services and ensure faster ROI. Nagravision's core Conditional Access module handles distribution and management of encryption keys and users entitlements as well as other security related features.
Key features of NagraIP are flexible, persistent protection throughout the delivery chain, pre-encryption to secure content as early as possible in the distribution chain - at a video server level or directly at the content owner, and a real time IP encryption solution that provides true session security. Encrypted data can effectively navigate all devices on cable IP networks such as firewalls, proxies, caches, and routers.
"Security is the key component for providing content distribution over IP," said Walter Boyles, Senior Vice President, Business Development, for Wavexpress. "The integration of our hardware platform with Nagravision's proven conditional access software brings MSOs the security they need to attract strong brands to drive broadband adoption and retention."
"We expect the combination of Nagravision and Wavexpress will appeal to many of our existing and prospective customers," said John Markey, Chief Marketing Officer for Nagravision. "Working with Wave's EMBASSY product provides a cost-effective option for conditional access supported by hardware-based authentication."
About Nagravision
Nagravision (www.nagravision.com) is a leading provider of open conditional access, advanced management tools and integrated solutions for cable, satellite, terrestrial and MMDS, FTTH and xDSL operators worldwide. These advanced solutions provide digital TV and content providers with the tools to operate and manage a range of interactive broadband services that include e-commerce, interactive program guides and multimedia-on-demand including VOD.
Nagravision's digital and analog conditional access technologies are currently being utilized by leading operators worldwide representing over 35 million digital and analog subscribers. Nagravision is a division of the Switzerland-based Kudelski Group (SWX "KUD") and has offices in the United States, Singapore, Shanghai, Brazil, India, Spain and Switzerland.
About Wavexpress
Wavexpress enables cable TV operators to deliver secure broadband content and services. The company enhances the high-speed data experience with high-quality video, games, and music content. Wavexpress supports a variety of business models, including subscription, pay-per-view, and advertising services.
About Wave Systems
Wave Systems' goal is to build a worldwide network of users based on trusted electronic relationships. Trust @ the Edge defines a new architectural model for the Internet, which embeds trust and security in every user device. Wave Systems is developing, deploying and licensing its EMBASSY Trusted Client technology for the mass adoption of this revolutionary model. Wave is integrating industry standard functions from a wide range of partners that enable reliable, secure digital exchange and commerce. Wave Systems and third parties are building the services that will take advantage of this open model. For more information about Wave Systems and Trust @ the Edge, visit www.wave.com.
CONTACTS:
Wavexpress
Simon Tidnam
(917) 339-9083
stidnam@wavexpress.com
Nagravision:
John Kidd
41 21 732 0735
john.kidd@nagra.com
http://www.wave.com/news/press_archive/05/050412_GD.html
Giesecke & Devrient and Wave Systems Announce Strategic Partnership
Security Solutions Combining Smart Card and Trusted Computing Software Technologies to be Demonstrated at the CardTech SecurTech Annual Conference April 12-14, 2005 in Las Vegas
Munich, Germany and Lee, MA USA — April 12, 2005 — Giesecke & Devrient (G&D) and Wave Systems Corp. (NASDAQ: WAVX – www.wave.com) have formed a strategic alliance to offer an enhanced security solution to address the trusted computing market.
In the IT sector, high complexity and a wide spectrum of applications are boosting the demand for security solutions among private users and businesses alike. The challenge is to devise comprehensive solutions that can satisfy customers' security needs. Increasingly, what are known as Trusted Platform Modules (TPM) are being incorporated into personal computers for a more trustworthy computing environment. The TPM is a processor that is integrated into the PC motherboard as a separate chip. Use of smart card technology adds a further component to the security solution by serving as a key to the computer, preventing unauthorized access to system and data. G&D and Wave Systems have formed a strategic alliance to market a comprehensive security solution that integrates both components.
The G&D-Wave Systems collaboration will address the organizations' joint development activities in the fields of smart card technology and trusted computing software. The aim is to leverage the combination of smart card technology and TPM associated software to offer clients in industry and government a comprehensive, flexible and easy-to-use security solution.
Both partners are members of the Trusted Computing Group (TCG), an organization founded in 2003 by leading enterprises in the IT sector to develop open standards for a new generation of secure hardware and software products in virtually all application areas. "Multifactor authentication enabled by systems with TPMs and with smart cards helps IT managers further secure systems and data in the enterprise," said Brian Berger, TCG marketing work group chair. "The increasing availability and usage of systems with TPMs has enabled a number of security innovations that will help both IT and users."
In a secure platform environment, the TPM's task is to protect and generate secret keys and store system configurations safely. The TPM also functions as a hardware-based security mechanism that prevents system changes caused by virus attacks. "The combination of trusted computing with smart card technology shows a lot of complementary advantages. As an integrated part of the motherboard, trusted platform modules provide an early integrity control from software and hardware as well as identity control of the entire PC system. The addition of chip card technology, e.g. as smart card or smart USB token, enables portable user identification to achieve a reliable and flexible security solution," said Andreas Raeschmeier, Head of Business Development at G&D.
Using smart card technology ensures that only users who can authenticate themselves with a card or token, plus the associated PIN, can gain access to the computer or network. "Smart card technology is flexible and easy to use. Users only have to enter a four-digit PIN instead of a 20-digit passphrase. Possession of the card and knowledge of the PIN provide maximum security, and are user-friendly as well," said Andreas Raeschmeier, pointing out the advantages of smart card technology.
IT security departments have different security requirements, extending from protection of sensitive data and access control through hard disk encryption to management of hardware and software configuration. For each of these requirements , the trusted platform module can provide valuable support.
"Wave is pleased to be partnering with G&D, a leader in the smart card market, which has strong established relationships in enterprise and government markets in Europe and beyond," said Steven Sprague, Wave System's president and CEO. "We believe G&D's technology leadership can help further the adoption of trusted computing solutions in these geographical and business markets."
Wave's EMBASSY Trust Suite (ETS) secure software capabilities being demonstrated with G&D at CardTech SecurTech include security policy management, key archive and management, digital signature, file and folder encryption, secure email, secure wireless authentication and storage and automation of user names, passwords and personal information.
For more information on demonstrations at CardTech SecurTech, please contact the sales organizations of either company.
About Giesecke & Devrient
Giesecke & Devrient (G&D) is a technology leader in the field of smart cards, providing smart card based solutions for the areas of telecommunications, electronic payment, health care, ID, transportation, and IT security (PKI). G&D is also a leading producer of banknotes and security documents, and dominant in the field of currency automation.
Based in Munich, Germany, the G&D Group operates subsidiaries and joint ventures around the world. In fiscal 2003, the group employed some 6800 people and generated revenue of €1.05 billion. For more information, please visit our Web site at www.gi-de.com.
Contact:
Giesecke & Devrient GmbH
Andrea Bockholt, Press Officer
Prinzregentenstrasse 159, 81607 Munich
Telephone: +49-89-4119-2422, Fax: -2020
E-mail: andrea.bockholt@de.gi-de.com
About Wave Systems Corp.
Consumers and businesses are demanding a computing environment that is more trusted, private, safe and secure. Wave is the leader in delivering trusted computing applications and services with advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers. For more information about Wave, visit http://www.wave.com.
Safe Harbor for Forward Looking Statements
Except for the statements of historical fact, the information presented herein constitutes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other factors which may cause the actual results, performance or achievements of the company to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. Such factors include general economic and business conditions, the ability to fund operations, the ability to forge partnerships required for deployment, changes in consumer and corporate buying habits, chip development and production, the rapid pace of change in the technology industry and other factors over which Wave Systems Corp. has little or no control. Wave Systems assumes no obligation to publicly update or revise any forward-looking statements.
All brands are the property of their respective owners
For more information please contact:
Contact:
John Callahan
Wave Systems Corp.
413-243-7029
jcallahan@wavesys.com Wave Investor Relations Contact
David Collins
Jaffoni & Collins
212-835-8500
wavx@jcir.com
Probably posted. Worth another read if so.
http://www.gsnmagazine.com/oct_05_02/high_speed.html
High-speed transmissions challenge encryption software
By GAIL KALINOSKI
The need for high-speed encryption for government users is constantly on the rise as the U.S. military continues to wage a global war against terrorism and federal agencies are sharing a greater volume of sensitive information with traditional and non-traditional sources than ever before.
Add in the changing dynamics of our digital world and you’ve got a system that is changing rapidly to keep up with the demands for information assurance (IA) in both the government and commercial sectors.
According to information security experts, there are several key issues that government users face, including the sheer amount of data -- the increasing amount of multimedia data alone is staggering -- that must be shared at high security levels; bandwidth limitations and its associated costs; and the move away from less efficient legacy encryption systems.
“It’s becoming more and more clear that as we move to more digital systems, more databases, more networks, security is becoming more important than ever,” said Mitch Blaser, product manager for Mississauga, Ontario, Canada-based Certicom Corp., a pioneering company in the field of Elliptic Curve Cryptography (ECC), a public key cryptosystem that has been adopted by the National Security Agency (NSA) as the standard for protecting both mission-critical and sensitive, but classified, communications by the U.S. Government.
“With 9/11, that is probably even more true in the U.S. Government than anywhere else, but it certainly applies to the commercial world with identify theft and lots of other [security] issues,” said Blaser.
Chris Fedde, senior vice president and general manager of the enterprise security division of SafeNet, Inc., a Baltimore, MD-based information security firm that specializes in encryption technology, agreed that government and commercial users are facing some of the same problems when it comes to high-speed encryption, particularly when it comes to filling up bandwidth.
“If you’re encrypting at lower speeds, you’re generating a lot of overhead, said Fedde. That is filling up bandwidths, along with increasing use of video streaming, video teleconferencing, data backups and other applications that generate overhead, he said.
“When you’re paying $100,000 to $400,000 a month for your high-speed bandwidth and you’re filling it up, you can’t afford to waste any bits,’’ Fedde explained. “As soon as you start filling it up, that 15 to 40 percent bandwidth that you were giving up to overhead starts to cost you dearly in terms of dollars, and backs you up.”
The problem is compounded for government users, because the Department of Defense (DoD) is aggregating all of its users onto a common, high-speed grid, known as the Global Information Grid (GIG).
“The only way that’s going to work and it’s global is that they can secure at those high speeds without wasting bandwidth,” Fedde said of the DoD’s plan.
Government’s GIG-BE Nearly Done
The DoD’s Global Information Grid - Bandwidth Expansion (GIG-BE) program will be completed this year, said Anthony Montemarano, GIG-BE program director for the DoD’s Defense Information Systems Agency (DISA). A full operational test and evaluation was scheduled to be conducted last month. By the end of the year, the physical part of extending the fiber to the military bases will be finished.
David Mihelcic, DISA’s chief technology officer, said U.S. military bases would have 100 times more bandwidth with GIG-BE.
The bandwidth increase in Southeast Asia for the military in areas like Bahrain and Iraq has been even more significant. “It’s gone up 138 times since 9/11,” he said.
Montemarano said the DoD is using SafeNet for its link, or physical, level encryption. “We are employing encryption up to OC192; the first have been deployed over the several weeks,” he said.
SafeNet’s solution is SafeEnterprise SONET/SDH encryptors and SafeEnterprise security management center software. Soon after SafeNet started shipping in the third quarter of 2004, the company announced it had received a “substantial order” from the DoD for SafeEnterprise SONET/SDH encryptors and software to enable it to operate at networking speeds from 155 Mbps to 10 Gbps.
“It’s an encryptor that works on the same protocol that fiber optics do,” said Fedde. “That’s how we secure without generating overhead.”
DoD is also moving increasingly to network-level, or Internet Protocol (IP) encryption. “We’re using High Assurance Internet Protocol Encryption (HAIPE) globally to protect our secret traffic and our top secret traffic,” said Montemarano.
Mihelcic said the companies that DoD is working with which provide HAIPE products include Falls Church, VA-based defense contractor General Dynamics as well as L-3 Communications, of New York, NY, and ViaSat, Inc., of Carlsbad, CA. He said there are other vendors currently working on HAIPE products because the military’s need for them is increasing dramatically.
“We used to do everything by text; now it is multi-media,” he said. “We’re flying fleets of UAVs [unmanned airborne vehicles] that are taking pictures and capturing other kinds of images that need to be moved to the war fighters in the field and analysts and planners at the bases. It is censored data and it needs to be analyzed and used quickly.”
He described a recent GIG-BE test in which about a dozen images from a UAV were being streamed at 2.5 megabits per second to a war fighter’s desktop. In the past, because of bandwidth constraints, only one of those images would have made it through, Mihelcic said.
Asked about encryption systems like ECC versus RSA, the DISA officials said they only use products specifically approved by the NSA for classified data and by the National Institute of Standards and Technology (NIST) for unclassified data.
Certicom on Top of ECC
Blaser of Certicom said the government has been looking to move beyond legacy encryption systems, like RSA, because it is less efficient than ECC.
[ECC] is “functionally equivalent to RSA, but the key sizes are much smaller so that it fixes all the problems. It takes a lot less time to calculate, a lot less processing power and less battery power,” said Blaser.
Because the computations using the ECC algorithm can be done much faster than those using RSA, and since ECC consumes less power, memory and bandwidth, Certicom officials said ECC is ideal for use in constrained environments, like cell phones, personal digital assistants (PDAs) and smart cards.
And the NSA seems to agree. In 2003, the agency purchased extensive licensing rights to Certicom’s MQV-based ECC protocol. ECMQV (named for Certicom discoverers Menezes-Qu-Vanstone) combines key exchange and authentication all in one step, making it very efficient for communication, said Blaser.
The other ECC scheme in use now and recommended by the NSA is Eliptical Curve Digital Signature Algorithm (ECDSA).
“Digital signatures are used all over the place; every time you access a building or a network. Every time you send an e-mail in a secure setting or do a transaction on a secure Web site or a database transaction,” said Blaser.
For Certicom, the NSA’s decision to select ECC as the exclusive key agreement and digital signature standard to secure sensitive, but unclassified, data within the U.S. Government was “the most significant event during the year,” said Certicom President and CEO Ian McKinnon when he announced the company’s fiscal 2005 year-end results in a June press release.
“This is a major announcement by the NSA that will drive the proliferation of ECC in the government and commercial marketplaces,” he said.
That expectation has already begun to play out. In late July, Certicom announced that Intelligent Recognition Systems, Inc., of Westlake Village, CA, had licensed Security Builder Crypto, a software-based cryptographic provider that is part of the Certicom Security Architecture, for use in prototype communications technology it is building for the U.S. special forces, and U.S. Army Rangers. The system, which will include handheld devices needed to communicate in remote parts of the world, will be used to generate certificates, encrypt data and provide ECC-based authentication, according to officials from Certicom and Intelligent Recognition Systems.
Earlier in the year, General Dynamics C4 Systems, a Scottsdale, AZ-based business unit of General Dynamics, licensed Certicom’s entire portfolio for use as the public-key security technology in products for the defense and commercial markets. It also has agreements to license its ECC-based intellectual property to Waterloo, Ontario, Canada-based Research in Motion, maker of the BlackBerry a wireless handheld device popular with government users.
Blaser said that going forward government users should be looking for products that already have the ECC security protocols built into the design.
“What government should start asking for is its vendors to get up to speed,” said Blaser. “So you can apply your smart cards and take advantage of digital signatures and key exchange and authentication. So you have better security designed from the start.”
Seagate ‘Drives’ Notebook Encryption
Seagate Technology, a Scotts Valley, CA-based hard disc drive manufacturer, has developed hardware-based full disc encryption (FDE) for notebook PCs, a technology that could be attractive to government users. Company officials said its Momentus 5400 FDE 2.5-inch hard drive provides protection against unauthorized access to data on stolen or retired notebook PCs.
“We anticipate the earliest of the adopters to be in government and commercial spaces,” said Mark Pastor, Seagate’s director of strategic marketing. “It’s a very user-friendly, comprehensive approach to encrypting data on the hard drive.”
Rather than use software and make a conscious effort to protect specific data, FDE technology requires only a user key to encrypt all data on the drive, he said. The encryption functions, including the password or user key, are performed on the drive, not the operating system, providing additional security from hackers. If the notebook is disposed of or repurposed, the key that is used for encrypting the data would be removed.
“Deleting the key effectively removes the chance that data would then be readable by anybody,” Pastor said.
Seagate began putting the FDE in notebooks first because there use is growing and because their portability makes them vulnerable to loss or theft. But Pastor said Seagate also sees a need for hardware-based FDE in desktop and handheld device environments.
Seagate expects the first Momentus 5400 FDE hard drives to start shipping early next year. In the meantime, it is working with vendors to further develop the product for their needs. Lee, MA-based Wave Systems and Utimaco Safeware AG, of Oberusel, Germany, have announced they are incorporating the FDE hard drives in their products.
Certicom / Wave
http://products.esecurityplanet.com/security/encryption/1168362695.html
Certicom Security Architecture
Add ECC-Based Encryption Capabilities To Apps, Devices
The Certicom product line is centered around enabling ECC-based encryption capabilities in devices and applications. The platform provides both the core architecture for the implementation of low-level crypto-capabilities as well as service modules for the deployment of ECC-based capabilities in specific protocols or applications, such as SSL, IPSec, and Digital Rights Management.
ECC, according to the vendor, "...provides the most security per bit of any known public-key scheme..."; allowing it to offer comparable security to competing technologies but with smaller key sizes. Standing for "Elliptic Curve Cryptography," ECC was discovered in 1985 as an alternative mechanism for implementing public-key cryptography.
The vendor's Certicom Security Architecture (CSA) platform enables the use of this technology within developed applications and devices by providing at its heart a core API (Security Builder API) that serves as an abstraction layer between the higher level applications that need to use the cryptography and the lower level modules or hardware that actually provide it. The high level application, therefore, needn't be drastically altered should a new crypto provider be needed or the underlying hardware (chipset) need to be changed. The API has the ability to access the fastest or strongest security available within the platform; whether that security is provided within the chipset or in a specific crypto provider.
Beneath the Security Builder API are the vendor's crypto providers themselves, including:
- Security Builder Crypto, for integration of encryption, public-key cryptography and other security mechanisms into C, C# and Java apps
- Security Builder NSE, for NSA compatible deployments. Includes ECMQV and ECDSA, and supports Windows and Linux platforms
- Security Builder GSE, for the creation of apps that meet FIPS 140-2 and NSA Suite B requirements
- Security Builder MCE, software cryptographic module for microcontroller devices
- Security Builder BSP, board support package for access to hardware-based cryptography
- Hardware IP Cores, for the implementation of crypto within hardware. These include the Certicom ECC Core, for the acceleration of ECC on microcontroller devices (such as sensor networks)
On top of this core platform can be deployed multiple service modules, which support the implementation of specific protocols or applications. Among these security services are:
- Security Builder IPSec, a client-side VPN module
- Security Builder ETS, for the implementation services including secure key storage, key management and authentication services for trusted platforms. ETS interfaces with hardware-based trusted platform modules through Security Builder BSP
- DRM Agent, a digital rights management client
- Security Builder SSL, an SSL protocol module with support for 20+ SSL and TLS cipher suites, including ECC for C and Java applications. Supports SSL 2.0, SSL 3.0, TLS 1.0, and WAP 2.0 and extensible authentication such as EAP-TLS, EAP-TTLS, and EAP-PEAP
- Security Builder PKI, digital certificate management module for apps in C or Java
Recently announced by the vendor is the Certicom Suite B Web Security Power Bundle, which is targeted to the implementation of ECC-based Web communications. The bundle includes the Security Builder GSE, Security Builder IPSec, and Security Builder SSL components described above; and adds to them the Security Builder SSL mod-SSL plug-in for Apache, allowing the Apache Web server to become Suite B compliant; and the Certicom Suite B CSP for Firefox, allowing Firefox browsers to become Suite B compliant.
The Certicom product line is available now. Visit the vendor's Web site for further information.
Wonder who the vendor is?
http://63.236.73.4/dms/sc/1101152809.html
DataPort HotDock
External Drive Enclosure Enables IDE Hot Swap
The DataPort HotDock is an external hard drive enclosure that provides the ability to hot swap IDE drives on a PC or MAC (the enclosure supports both FireWire and USB 2.0 interfaces). The vendor notes that the enclosure is compatible with most 3.5" IDE/ATA-6 hard disk drives.
The HotDock is plug-n-play, and is offered in bundles with or without drive carriers. Drives can be interchanged within the enclosure without powering down the host. The HotDock can be deployed horizontally or vertically, and features a low-noise fan for cooling.
For the individual drives themselves, the enclosure supports the vendor's DataPort V and DataPort V Plus drive carriers. The DataPort V is a plastic carrier available in latch or keylock versions that support IDE, Narrow SCSI, and Ultra Wide SCSI/LVD interfaces. The DataPort V Plus is a cast aluminum carrier supporting IDE ATA-133, Ultra Narrow SCSI, Ultra2 Wide SCSI (LVD) and Ultra160 interfaces. Additional features of the DataPort V Plus carrier include the vendor's Temperature Controlled Cooling System and a fan failure alarm.
New to the HotDock feature set is a bundled offering--called HotDock Secure--including both the HotDock and the vendor's Encryption Removable Hard Drive Carrier, offered in 64 (DES) and 128-bit (3DES) flavors. As its name suggests, this optional drive carrier adds security to stored data via built-in hardware-based data encryption; data is automatically and transparently encrypted before being stored on the drive and decrypted when retrieved. The entire hard drive is encrypted, including the boot sector, O/S, temporary and swap files; and, according to the vendor, each Encryption DataPort ships with its own unique encryption key, which is not stored by the vendor.
The DataPort HotDock ships with FireWire/USB cables and a power supply.
The new HotDock Secure offering is now available with estimated Government pricing of $209 (64-bit DES) and $279 (128-bit 3DES).
Contact CRU-DataPort for further information.
product submission by EITPlanet Staff