Innovation Sandbox

We have submitted to the Innovation Sandbox, the Most Innovative Contest for RSA Conference 2010.
Innovation Sandbox represents today’s best new security solutions — and culminates with a shoot-out among the top 10 start-ups presenting their new companies and products to a judging panel comprised of venture capital professionals, CISOs, CTO’s and industry experts.
Our goal is to come among the top 10 start-ups and get the chance for presenting our product. Why not become the winner?
Innovation Sandbox will take place on Monday, March 1, 2010 and is the prelude to the RSA Conference in San Francisco (March 1-5)
Anyway we are going to attend this RSA Conference.
We are still are looking for potential partners for cooperation in areas such as:
Science, Law, Marketing, Sales, and hardware operation. In fact In fact what we need is a “Business coach” for all aspects of the American market, especially for patenting.

The password is dead, the password is alive!

Again and again the same bad news:
The latest is: Passwords for Google, Yahoo and Hotmail accounts illegally leaked online,
with the headline such as
“Huge data breach hits Google, Hotmail, and Yahoo“ , “Google targeted in e-mail scam”.How can one protect oneself best? How to avoid these huge data breaches?
As a user, or consumer and customer one has to log in several times a day. About twenty logins a day is the average for an ordinary user.
In order to avoid data breaches of any kind one has to use „strong“ passwords and not use only one master password.
Strong passwords should have at least 14 character, they should be a combination of characters, numbers and symbols. They shouldn’t be real words of a language. They shouldn’t have a relation any to one’s or my family, pets, etc. And we are advised not store our passwords.
Some people say strong passwords are bad passwords, because they are too complicated to remember and you have to write them down.
Some people also say that the longest and encrypted password is breakable, if you simply give it away during a phishing attack.
What could help against this; image the following scenario:
Þ If there are only time-based disguised passwords and the submission of the actual original password locks the accounts
Þ that the user’s credential are transmitted and stored only encrypted,
Þ That the user starts the login within a secure application on the desktop.

What if it was possible to?
Þ use the whole UTF-16 character set, that means 63353 characters to create a complex password which is easy to remember?
Þ use time-based disguised passwords?
All these can be achieved by one single image. This image can be easy to recall. You will never have to write down the password. With this one image you can create different passwords for many different applications, or addressees.

If you become curious to how it is done then take your time and visit our web site:
If you click on the button you can get a first impression of how complex passwords might look.
Or simply click on this link to help us with our survey
in order to answer some question in the areas of:
passwords in general, the citizen’s position in authentication process, and suitable business models for SMEs developing “global born” rich internet application (RIAs).
Participants in the survey have the possibility to download the whole application .

We look forward to your participation.

The Start

On 16th of September we have sent out our circular letter to about 400 people all over the world who are concerned with the topics of authentication, cryptographic or IT security.
Our reason for doing this was to raise interest in the topic of “unbreakable” passwords. We would like to know what the potential user thinks about the application of long and complex passwords which are sufficient for current and future requirements, but easy to remember by a graphic image.
This we have achieved by the development of an RIA Application on the basis of ADOBE AIR.
We are looking for potential partners for cooperation in areas such as:
Science, Law, Marketing, Sales, and hardware operation.
We look forward to get a response to our circular letter, and we are hoping to make contact with many people at the RSA Conference in London (20th-22th October 2009), and hope to raise interest in our solution.