Blockchain Security Cloud Service The Blockchain
Post# of 82672
The Blockchain Security Cloud Service has the following capabilities –
● Two factor authentication – Multiple methods are supported including - Out-of- Band Phone Number, PIN, OTP, and/or Voice, OTP Delivery to Phone via SMS, Voice, Email, and/or Push, Out-of-Band Push – Accept/Deny, PIN, and/or Fingerprint, Hard Tokens – Key Fob, USB Key, and/or Wallet Cards, Mobile Tokens – iOS and Android, Desktop Tokens – Windows, OS X & MacOS, and/or Linux.
● Policy Server – The Policy Server stores the user access policies for the blockchain. It defines user roles and maps the roles to capabilities.
● Rules Engine – The Rules Engine stores rules that will be used by the Agent software to enforce access. For example, a rule might be to invoke two factor authentication if the transaction is over a certain amount.
We will sell this solution to enterprises, government and consortia that are implementing private blockchains. We expect that this market will grow significantly in the future and due to having a first mover advantage we will be positioned to be a major player in the blockchain security marketplace.
11
Confidential for Discussion Purposes
Wallet Security
Wallets are vulnerable to malware that can capture the user’s login credentials via keylogging and screen capture. Anti-Virus software tries to detect the malware using signatures and advanced heuristics. But as discussed earlier, they are oftenineffective.
Rather than trying to identify malware, we take a radical approach. We assume that malware exists on your device and prevent the malware from doing its job – keylogging, screen capture, clipboard spying, web cam spying, microphone spying, etc.
The solution suite comprises desktop software (PC/Mac) and a mobile app (iOS/Android). The desktop software and mobile app prevent the actions of malware.
Desktop software
The desktop software will have the following features –
Confidential for Discussion Purposes
12
Keystroke Protection – Traditional keystroke data flows through a series of steps before it appears on your monitor. Hidden in these steps is an area of vulnerability where cyber criminals try to take advantage using keylogging spyware. This feature bypasses the places keyloggers can reside, helping to eliminate your vulnerability to attack. A kernel component takes control of the keyboard at the lowest possible layer in the kernel. The keystrokes are then secured and sent to the application via an “Out-of-Band” channel bypassing the messaging queue.
Anti-Screen Capture – This feature prevents screen scraping malware from taking screenshots of your information surreptitiously.
Cryptographic Integrity monitoring – This feature constantly monitors the keyboard device driver stack to detect un-trusted drivers (which could potentially be keyloggers). If an un-trusted driver is discovered, it warns the user. It also checks if cryptographic services provided by the OS are operating properly.
Anti-Clickjacking - Clickjacking is a vulnerability that is exploited by hackers to load malware. Our desktop software prevents this from happening.
Trusted Platform Module (TPM) integration – The TPM chip is used to generate cryptographic keys.
All the above features currently exist. The planned enhancements are –
Mouse Capture Prevention - Malware monitors mouse clicks. We will prevent this from happening.
Clipboard Capture prevention - Malware monitors the clipboard to spy on copy and paste. We will prevent thisfrom happening.
Webcam Capture prevention - Malware monitors the webcam to spy on the user. We will prevent this from happening.
Microphone Capture prevention - Malware monitors the microphone to spy on the user. We will prevent this from happening.
The above four features are currently in development.
Defense against ransomware