Information security had four major historical events.
The first was PGP/PKI encryption, and the
second was the sub-OS security hypervisor both developed in the later 20th
century. Early in the 21st
century the third development was ubiquitous personal multi-factor biometric
devices with Open-standards. The fourth was
the development of community keyed lockout Open-standards for all information
infrastructure and personal devices.
The total lockdown of our personal information
with MUlti-FActor
BIometric (MUFABI) devices required early
21st century corporate bosses direct Congressional a/o Parliamentary
... servants to order Open-standards compliance for COmmunity
KEyed LOckout
(COKELO).
MuFaBi devices are linked to owners embedded chips,
when out of range, all owner personal information, music, documents ... are
wiped. MuFaBi will reset to owner defaults
(cloud services) when owner is again in range and can be MuFaBi authenticated. Any crack attempts to access MuFaBi
applications, OS, services after a wipe automatically resets the device to
factory defaults removing all account identifications and functionality. MuFaBi standards are not warrant cracking tolerant,
any attempts to crack a MuFaBi device results in immediate wipe and reset
assuring any search and seizures of personal information is prevented. MuFaBi prevents personal activities tracking
by generating transient avatar financial transactions, location information, digital
A/V session modification and encryption.
MuFaBi devices due to cost/availability did not quickly gain global
usage. Magic is extremely well applied technology;
IOW, the user does not appreciate or notice the technology (it is just a user
device).
CoKeLo is a security model that allows communities
(....Com, ....Gov, ....Mil ...) to lock all community information infrastructure
and user devices to a unique spectrum of keys and key-change
time/sequence. CoKeLo security manages very
frequent, complete, and fast key changes across the total community. Malicious external attacks automatically initiates
unique defensive CoKeLo managed key-spectrum jumps for external attack lockout. Literally the attacker objective (your
community) does a virtual vanishing act.
Other CoKeLo defense measures kick-in collecting forensics and preventing
discovery from the malicious source.
When forensics indicates internal threats CoKeLo will manage multiple
sub-communities under various key-sets until the threat can be detected and
removed. CoKeLo key changes result in network IPs, NIEM keys, MAC IP association updates ... user signatures.
No comments:
Post a Comment