You are not logged in.

#1 2014-10-04 04:50:00

husnain
User RankUser RankUser RankUser RankUser RankUser Rank
Administrator
From: Chichawatni,Pakistan
Registered: 2014-10-03
Posts: 8,129
Website

How to secure top secret Information?

Secure Top Secret Information Device:


laciesafe.jpg global

This computer invention provides peace of mind for securing your information.

Storing your files on this mobile hard drive gives you multiple levels of protection because it uses advanced encryption and biometric authentication technology.

The Safe uses 128-bit AES encryption (Advanced Encryption Standard) which is the same standard usd by governments to protect top secret information.

Encryption Converts:


Encryption converts information that is readable into a mixture of unreadable characters. Decryption processes the encrypted unreadable characters back into a readable format.

The algorithm that encrypts and decrypts the information is known as a cipher. The cipher allows access to the readable information when you enter a password.

computer invention Most ciphers will use passwords that are four to eight characters in length, but a 128-bit AES cipher uses a 16 character password which is extremely difficult to hack.

computer invention Biometric authentication is a technology that recognizes physical or behavioral characteristics such as fingerprints, palm geometry, retina patterns, voice and signature. Fingerprint recognition is the most popular because it's easier to use.

Your finger is scanned for minutia, which are the points on a fingerprint where a ridge ends or splits into two. An algorithm extracts the minutia points and creates a template image that is used for authentication.


You cannot discover the new oceans unless you have the courage to lose the sight of the shore.

2014-10-04 04:50:00

Advertisement
Ads By Google

Re: How to secure top secret Information?



\n
The following user say "Thank You" for this post:Guest

Board footer