i-TWIN TECHNOLOGY THE LIMITLESS-PENDRIVE
Presented by Mohd Omer 15911D5812 1
Overview
INTRODUCTION
HOW TO USE I-TWIN?
FEATURES
SECURITY
DETAILED AUTHENTICATION PROCESS
i-TWIN LOST?
COMPARISON WITH OTHER TECHNOLOGIS
REQUIREMENTS
CONCLUSION 2
Introduction iTwin is a ‘limitless’ secure USB device that enables s to access, edit & share all their files & media between any two online computers anywhere in the world. The only limit is the size of your computer’s hard drive.
iTwin uses thoroughly analyzed crypto protocols and algorithms(AES 256 bit encryption).
It was founded and designed by “Lux Anantharaman”.
3
How to use i-Twin?
1. Plug iTwin into USB port and share your files and folders.
2. Detach one half.
3.Plug that half into another computer and files are transferred securely via 44 internet.
Features Limitless capacity secure USB drive Remotely edit shared files Backup your data from anywhere One time cost Data security Smart key generation Bi-directional file access
5
Remotely edit shared files: You can keep a single version of files on one computer, with you and your chosen collaborator(s) editing files on this version. Say goodbye to multiple versions of files flying around by email or storing sensitive data on thirdparty servers.
6
i-Twin Multi for Collaboration : You can plug multiple iTwin devices into a single computer and use your computer as a centralized shared repository for files shared between a group of people. You can update the files in the shared repository and the whole group will have access to the latest set of files.
7
Fine-grained File Permissions: You can grant read and write permissions or just read permissions to files and folders using the familiar File Properties tools of Windows or Mac. If you don’t want someone to access a previously shared file, you can simply "unshare" the file. You can plug one half into your office computer and give the other half to your customer, business associate, client or assistant.
8
Security As it doesn't store any data on itself. Your remote data can only be accessed if you have the physical iTwin with you. You can set up your iTwin to require a . Two iTwins together generate a random 256-bit AES key, everytime they are physically paired and plugged into a computer. Advanced Encryption Standard (AES) 256 bit encryption is used to protect all data communication & its standard has not been broken so far and many consider AES to be military grade.
9
Detailed Authentication Process Before allowing any data transfer, every authenticated by iTwin's TwinTrust servers.
iTwin
is
All communication between iTwin and TwinTrust is secured using industry strength HTTPS protocol. After successful authentication by TwinTrust, TwinTrust assist iTwin to discover its other half. After authenticating with TwinTrust, two halves of iTwin mutually authenticate each other using their pre-shared AES 256 bit crypto key. If is set, then verification is performed on both iTwins before data transfer is initiated.
10
i-Twin Lost?
When you physically pair two iTwin devices and plug into a computer, iTwin software requests you to create an iTwin Disable Code. If you lose one half of your device, you simply provide us this Disable code (suicide trigger) and we remotely disable your lost half of your iTwin, preventing any data loss.
11
i-Twin Vs USB
12
i-Twin Vs Cloud Storage
13
System Requirements Windows and Mac OS X compatible When you plug iTwin into a computer for the first time, iTwin software gets installed on the computer. Requires a mini 512 MB RAM. Requires 15 MB hard-disk space. USB 2.0 port Requires broad-band Internet access 1Mbps speed recommended. Need rights to access. Can be uninstalled. Automatic Updates. 15
Conclusion The iTwin is a fantastic solution for the home who wishes to access and change their files remotely and securely. The iTwin is simple to use and inexpensively. For those who want to keep files up-to-date between two computers the iTwin is for you.
16
References http://www.itwin.com http://www.twitter.com http://www.andhrareads.com
17
1