SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
BioSlimDisk
presentation v1.1

RiTech International Ltd
Product (Signature)
Website www.bioslimdisk.com
Marcus Chan
Date: 14th August 2009
Overview
    • Company Profile

    • Biometric Technology

    • Bioslimdisk Signature


2   © RiTech International Ltd, Confidential & Proprietary
COMPANY PROFILE
RiTech International Ltd
    • Ritech was established in 1994 as
      Designer, developer, manufacturer and
      distributor of innovative products,
      services & systems in the area of
      biometrics security and portable data
      storage.
    • Specializes in biometrics security
      technology with in-house R&D.
    • Overseas operation network: Malaysia,
      Hong Kong, China, India and Europe.
4   © RiTech International Ltd, Confidential & Proprietary
Vision
         First Choice Solution provider in the
         Biometric security industry
                                                             Biometric
                                                                         Process

                                                                         Algorithms

                                                                         Implementation knowledge

                                                                         Customised Solutions

                                                                         Ergonomics and desgin

                                                                         Sensors

5   © RiTech International Ltd, Confidential & Proprietary
Objectives
    Advanced Research and Development
    • Biometrics products for portable information
      storage and transportation
    • Biometrics products for Intellectual Property
      Protection
    • Biometrics products for secure identification
      over networks
    • Biometrics products for as a secure
      replacement over existing keys, cards,
      password which tend to be a burden

6   © RiTech International Ltd, Confidential & Proprietary
BIOMETRIC TECHNOLOGY
What is Biometric?

         The Science of measuring

         and statistically analyzing

         biological data

8   © RiTech International Ltd, Confidential & Proprietary
What is Biometric?
    Biometric Technology

         Authentication can be divided into three
         different factors:

    • something you know
    • something you have
    • something you are




9   © RiTech International Ltd, Confidential & Proprietary
Something you know
     Common
     • Pin Numbers/Code
     • Learn it , You have to remember the
       Code Number
     • Forced to memorize passwords

     Disadvantage:-
        Software hacking tools via
        internet, easy to steal by
        anyone. (e.g. Keylogger)
10   © RiTech International Ltd, Confidential & Proprietary
Something you have
     Example Smart cards
     • Cash Card
     • ATM Card
     • Visa/Master Card
     • Door/Building Access Card

     Disadvantage:-
        If picked up by anyone, it can still be
        used. (e.g. Paying at a Petrol Station)
11   © RiTech International Ltd, Confidential & Proprietary
Something you are
     Biometrics is what you are!

     What you have:
     1. Your Finger > Fingerprint
     2. You cannot loose it
     3. You cannot give it away

     You cannot tell a friend to use your prints.

12   © RiTech International Ltd, Confidential & Proprietary
Types of Biometric
     1. BEHAVIOURAL
                     – Voice Patterns
                     – Signature Verification
                     – Key Stroke Patterns (Signatures)

     2. PHYSIOLOGICAL
                     –      Fingerprints
                     –      Hand Geometry
                     –      Retinal & Iris Scanning
                     –      Facial Recognition
                     –      DNA Fingerprinting
13   © RiTech International Ltd, Confidential & Proprietary
Biometric Comparison
          Comparison of various biometric
          technologies
          It is possible to understand if a human characteristic can be
          used for biometrics in terms of the following parameters:
     •    Universality => each person should have the characteristic
     •    Uniqueness => is how well the biometric separates individually
          from another.
     •    Permanence => measures how well a biometric resists aging.
     •    Collectability => ease of acquisition for measurement.
     •    Performance => accuracy, speed, and robustness of
          technology used.
     •    Acceptability => degree of approval of a technology.
     •    Circumvention => ease of use of a substitute.

14   © RiTech International Ltd, Confidential & Proprietary
Biometric Comparison
              Comparison of existing biometric systems
                     Comparison of various biometric technologies, modified from Jain et al.,
                                       2004 (H=High, M=Medium, L=Low)

Biometrics:       Universality          Uniqueness           Permanence   Collectability Performance Acceptability Circumvention

Face                      H                     L                    M         H             L            H             L
Fingerprint               M                     H                    H         M             H            M             H
Hand geometry             M                     M                    M         H             M            M             M
Keystrokes                L                     L                    L         M             L            M             M
Hand veins                M                     M                    M         M             M            M             H
Iris                      H                     H                    H         M             H            L             H
Retinal scan              H                     H                    M         L             H            L             H
Signature                 L                     L                    L         H             L            H             L
Voice                     M                     L                    L         M             L            H             L
Facial
                          H                     H                    L         H             M             H            H
thermograph
Odor                      H                     H                    H         L             L            M             L
DNA                       H                     H                    H         L             H             L            L
Gait                      M                     L                    L         H             L             H            M
Ear Canal                 M                     M                    H         M             M             H            M
      15    © RiTech International Ltd, Confidential & Proprietary
Fingerprint Identification
                                                              Minutiae Definition
                                                              • Form of Fingerprint

                                                              • Number of Lines

                                                              • Distance Between Marks



16   © RiTech International Ltd, Confidential & Proprietary
Processing & Identification
     Fingerprint
       How many minutiae are needed for
       comparison?
     –Generally,     a complete
        fingerprint is made up
        of up to 100 minutiae
     –Fingerprint   recognition
        normally requires 20~30
        minutiae for processing
17   © RiTech International Ltd, Confidential & Proprietary
The Biometrics’ Dilemma




18   © RiTech International Ltd, Confidential & Proprietary
Biometric Advantages
     Advantages of Biometrics
     for Access Control
                                          Copy                Theft   Forgotten   Lost
     Key
                                           X                  X         X         X
     Badge
                                             -
                                                              X         X         X
     PIN Code
                                           X                   -
                                                                        X         -

     Biometric
                                             -                 -         -        -
     Feature


19   © RiTech International Ltd, Confidential & Proprietary
BIOSLIMDISK SIGNATURE
WHY?
     • Threat of data theft is real and costly
     • Affects employees negatively
     • Affects company negatively
     • Loss of productivity and credibility
     • Loss of profits and sustainability




21   © RiTech International Ltd, Confidential & Proprietary
HOW?
     • Physical theft and hacking
       Actual device is stolen and tapped for data
     • Social engineering
       Passwords or access keys can be coaxed
     • Virtual hacking and theft
       Popular method of data theft
     • Man-in-the-Middle attacks
       Spying and snooping on communications


22   © RiTech International Ltd, Confidential & Proprietary
Securing Data
                                          Signature can meet security
                                            challenges with
                                          Tamper-proof with self-destruct
                                           function
                                          Fingerprint recognition
                                           (biometric)
                                          Built-in AES-128 bit data
                                           encryption
                                          Features to protect user
                                           identification
23
                                          No passwords during usage
     © RiTech International Ltd, Confidential & Proprietary
Safekeeping
     Self Destruct Feature
      Activated  when tampering is detected
      All data drive is destroyed
      Keeps confidential data out of reach


     No backdoor access
      No password or function to reset security
      Only valid fingerprints are allowed access




24   © RiTech International Ltd, Confidential & Proprietary
Hardware Benefits
     AES-128bit hardware encryption
      Keys  never leave Signature
      Avoids tapping/snooping of keys
      All data on drive is encrypted
      On the fly encrypt and decrypt


     Totally hardware-based
      Resistant to software-based attacks
      Security methods are encapsulated in
       hardware
25   © RiTech International Ltd, Confidential & Proprietary
Protecting Fingerprints
      Dual-finger authentication
            Reduces latent fingerprint
             copy
            Intruder requires 2 unique
             fingerprints

      Limiting fingerprint retries
            Intruder has less time to guess correct
             fingerprint
            Limits tries and time for correct fingerprint

26   © RiTech International Ltd, Confidential & Proprietary
Convenience
     • Anti-static rubberized casing
      Hard to copy fingerprints on device
      Less dust attraction to protect sensor


     • Cross platform compatibility
      Nofurther software or software needed
      Works in Windows, MAC, Linux, Solaris, etc.




27   © RiTech International Ltd, Confidential & Proprietary
Unique Service
     • Our technology is mature and
       battletested
        Our company is the leader in this field
     • Quick response to security breaches
        Product is constantly updated
     • Customization to end users
        Security tokens, 3rd party software



28   © RiTech International Ltd, Confidential & Proprietary
Summary of Features

     1) Dual-Finger Authentication

     2) Unique Self Destruct

     3) Hardware Crypto AES-128bit

     4) Worldwide Patents Awarded
        United Kingdom, Netherlands, Germany, France, China, Hong
        Kong, Singapore, Malaysia and many more.
29   © RiTech International Ltd, Confidential & Proprietary
END

Weitere ähnliche Inhalte

Ähnlich wie Bioslimdisk Presentation V1.1

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
Inttelix
 
Providing new customer_experience(final)
Providing new customer_experience(final)Providing new customer_experience(final)
Providing new customer_experience(final)
Tsukasa Makino
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
Inttelix
 

Ähnlich wie Bioslimdisk Presentation V1.1 (20)

Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart Identification
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012Nuance Biometrics Institute Presentation 27th June 2012
Nuance Biometrics Institute Presentation 27th June 2012
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Biometrics Final Visionics
Biometrics Final VisionicsBiometrics Final Visionics
Biometrics Final Visionics
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
IDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey SnapshotIDG TechNetwork Consumer Audience Survey Snapshot
IDG TechNetwork Consumer Audience Survey Snapshot
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biomatric
BiomatricBiomatric
Biomatric
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Providing new customer_experience(final)
Providing new customer_experience(final)Providing new customer_experience(final)
Providing new customer_experience(final)
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Bioslimdisk Presentation V1.1

  • 1. BioSlimDisk presentation v1.1 RiTech International Ltd Product (Signature) Website www.bioslimdisk.com Marcus Chan Date: 14th August 2009
  • 2. Overview • Company Profile • Biometric Technology • Bioslimdisk Signature 2 © RiTech International Ltd, Confidential & Proprietary
  • 4. RiTech International Ltd • Ritech was established in 1994 as Designer, developer, manufacturer and distributor of innovative products, services & systems in the area of biometrics security and portable data storage. • Specializes in biometrics security technology with in-house R&D. • Overseas operation network: Malaysia, Hong Kong, China, India and Europe. 4 © RiTech International Ltd, Confidential & Proprietary
  • 5. Vision First Choice Solution provider in the Biometric security industry Biometric Process Algorithms Implementation knowledge Customised Solutions Ergonomics and desgin Sensors 5 © RiTech International Ltd, Confidential & Proprietary
  • 6. Objectives Advanced Research and Development • Biometrics products for portable information storage and transportation • Biometrics products for Intellectual Property Protection • Biometrics products for secure identification over networks • Biometrics products for as a secure replacement over existing keys, cards, password which tend to be a burden 6 © RiTech International Ltd, Confidential & Proprietary
  • 8. What is Biometric? The Science of measuring and statistically analyzing biological data 8 © RiTech International Ltd, Confidential & Proprietary
  • 9. What is Biometric? Biometric Technology Authentication can be divided into three different factors: • something you know • something you have • something you are 9 © RiTech International Ltd, Confidential & Proprietary
  • 10. Something you know Common • Pin Numbers/Code • Learn it , You have to remember the Code Number • Forced to memorize passwords Disadvantage:- Software hacking tools via internet, easy to steal by anyone. (e.g. Keylogger) 10 © RiTech International Ltd, Confidential & Proprietary
  • 11. Something you have Example Smart cards • Cash Card • ATM Card • Visa/Master Card • Door/Building Access Card Disadvantage:- If picked up by anyone, it can still be used. (e.g. Paying at a Petrol Station) 11 © RiTech International Ltd, Confidential & Proprietary
  • 12. Something you are Biometrics is what you are! What you have: 1. Your Finger > Fingerprint 2. You cannot loose it 3. You cannot give it away You cannot tell a friend to use your prints. 12 © RiTech International Ltd, Confidential & Proprietary
  • 13. Types of Biometric 1. BEHAVIOURAL – Voice Patterns – Signature Verification – Key Stroke Patterns (Signatures) 2. PHYSIOLOGICAL – Fingerprints – Hand Geometry – Retinal & Iris Scanning – Facial Recognition – DNA Fingerprinting 13 © RiTech International Ltd, Confidential & Proprietary
  • 14. Biometric Comparison Comparison of various biometric technologies It is possible to understand if a human characteristic can be used for biometrics in terms of the following parameters: • Universality => each person should have the characteristic • Uniqueness => is how well the biometric separates individually from another. • Permanence => measures how well a biometric resists aging. • Collectability => ease of acquisition for measurement. • Performance => accuracy, speed, and robustness of technology used. • Acceptability => degree of approval of a technology. • Circumvention => ease of use of a substitute. 14 © RiTech International Ltd, Confidential & Proprietary
  • 15. Biometric Comparison Comparison of existing biometric systems Comparison of various biometric technologies, modified from Jain et al., 2004 (H=High, M=Medium, L=Low) Biometrics: Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention Face H L M H L H L Fingerprint M H H M H M H Hand geometry M M M H M M M Keystrokes L L L M L M M Hand veins M M M M M M H Iris H H H M H L H Retinal scan H H M L H L H Signature L L L H L H L Voice M L L M L H L Facial H H L H M H H thermograph Odor H H H L L M L DNA H H H L H L L Gait M L L H L H M Ear Canal M M H M M H M 15 © RiTech International Ltd, Confidential & Proprietary
  • 16. Fingerprint Identification Minutiae Definition • Form of Fingerprint • Number of Lines • Distance Between Marks 16 © RiTech International Ltd, Confidential & Proprietary
  • 17. Processing & Identification Fingerprint How many minutiae are needed for comparison? –Generally, a complete fingerprint is made up of up to 100 minutiae –Fingerprint recognition normally requires 20~30 minutiae for processing 17 © RiTech International Ltd, Confidential & Proprietary
  • 18. The Biometrics’ Dilemma 18 © RiTech International Ltd, Confidential & Proprietary
  • 19. Biometric Advantages Advantages of Biometrics for Access Control Copy Theft Forgotten Lost Key X X X X Badge - X X X PIN Code X - X - Biometric - - - - Feature 19 © RiTech International Ltd, Confidential & Proprietary
  • 21. WHY? • Threat of data theft is real and costly • Affects employees negatively • Affects company negatively • Loss of productivity and credibility • Loss of profits and sustainability 21 © RiTech International Ltd, Confidential & Proprietary
  • 22. HOW? • Physical theft and hacking Actual device is stolen and tapped for data • Social engineering Passwords or access keys can be coaxed • Virtual hacking and theft Popular method of data theft • Man-in-the-Middle attacks Spying and snooping on communications 22 © RiTech International Ltd, Confidential & Proprietary
  • 23. Securing Data Signature can meet security challenges with Tamper-proof with self-destruct function Fingerprint recognition (biometric) Built-in AES-128 bit data encryption Features to protect user identification 23 No passwords during usage © RiTech International Ltd, Confidential & Proprietary
  • 24. Safekeeping Self Destruct Feature  Activated when tampering is detected  All data drive is destroyed  Keeps confidential data out of reach No backdoor access  No password or function to reset security  Only valid fingerprints are allowed access 24 © RiTech International Ltd, Confidential & Proprietary
  • 25. Hardware Benefits AES-128bit hardware encryption  Keys never leave Signature  Avoids tapping/snooping of keys  All data on drive is encrypted  On the fly encrypt and decrypt Totally hardware-based  Resistant to software-based attacks  Security methods are encapsulated in hardware 25 © RiTech International Ltd, Confidential & Proprietary
  • 26. Protecting Fingerprints  Dual-finger authentication  Reduces latent fingerprint copy  Intruder requires 2 unique fingerprints  Limiting fingerprint retries  Intruder has less time to guess correct fingerprint  Limits tries and time for correct fingerprint 26 © RiTech International Ltd, Confidential & Proprietary
  • 27. Convenience • Anti-static rubberized casing  Hard to copy fingerprints on device  Less dust attraction to protect sensor • Cross platform compatibility  Nofurther software or software needed  Works in Windows, MAC, Linux, Solaris, etc. 27 © RiTech International Ltd, Confidential & Proprietary
  • 28. Unique Service • Our technology is mature and battletested Our company is the leader in this field • Quick response to security breaches Product is constantly updated • Customization to end users Security tokens, 3rd party software 28 © RiTech International Ltd, Confidential & Proprietary
  • 29. Summary of Features 1) Dual-Finger Authentication 2) Unique Self Destruct 3) Hardware Crypto AES-128bit 4) Worldwide Patents Awarded United Kingdom, Netherlands, Germany, France, China, Hong Kong, Singapore, Malaysia and many more. 29 © RiTech International Ltd, Confidential & Proprietary
  • 30. END