SAKEM Benefits for Secure Application Design

CONNOTECH Experts-conseils Inc.

July 1999


Contents

A Word of Caution to the Reader
A Better Security Design with the Sakem Procedure
Operating Benefits Are Forever ...
Miscellanous Benefits Fostering Technology Acceptance
The Next Step

A Word of Caution to the Reader

Let's face it! Not everybody will spend the time required to understand how the SAKEM industrial strength security solution can be integrated into an application environment, but the rewards are worth the trouble!

You whish to put cryptographic techniques to work for the security of your application environment, because otherwise it's difficult to keep hackers at bay.

Your application environment encompasses the notion of client registration, or the field initialization of secure devices (the SAKEM procedure secures such registration or initiailization).

You are concerned with the direct operating costs of registering new clients or initializing secure devices, or you are simply looking for the best operating procedures.

You are prepared to design with public-domain security techniques such as royalty-free electronic signature algorithms, even if this means

If you answered 'yes' to some of these questions, the SAKEM procedure is an opportunity you should consider.

A Better Security Design with the Sakem Procedure

The SAKEM implied security model

More->

More->

More->

Low barriers to entry into secure e-commerce, cost-efficiencies within the reach of a single e-commerce project.

More->

SAKEM circumvents operational limitations intrinsic to many high security electronic identification schemes:

More->

More->

More->

Featherweight technology - low fixed project costs.

More->

Leading edge security: SAKEM makes internal use of strong cryptographic algorithms.

More->

End-user security awareness implicit message: "We practice what we teach."

More->

Operating Benefits Are Forever ...

Keep it simple for the end-user:

More->

More->

Support for "click-through contract" formation.

More->

SAKEM is attractive with portable security devices:

More->

More->

SAKEM is made for bottom line efficiencies, with low unit cost per new customer.

More->

Effective security: the SAKEM procedure securely ties each verification of identity to an authentication key or secret.

More->

"Best practice" against frauds by theft of identity.

More->

Miscellanous Benefits Fostering Technology Acceptance

With SAKEM, an organization can addres user concerns for personal information privacy.

More->

Court recognition of computer evidence: the SAKEM procedure enhances the determinism in the case of hostile examination by expert witnesses.

More->

SAKEM allows a unique form of dual control for high security network initialization. This is great for the strictiest standards of cryptographic key management.

More->

The Next Step

You should contact CONNOTECH to see how the SAKEM procedure can be used profitably in your case. Alternatively, you might go through a qualification questionaire to begin investigating the alternatives by yourself.


[ security scheme design | alternative to PKIpatent publicationsSAKEMscholarly web contentsconsulting services ]
[ CONNOTECH home page: http://www.connotech.com/about us | e-mail to: info@connotech.com ]

CONNOTECH Experts-conseils Inc.
9130 Place de Montgolfier
Montréal, Québec, Canada, H2M 2A1
Tél.: +1-514-385-5691 Fax: +1-514-385-5900