Demonstrators at the ICAC 2006 Tech Demonstration Fair
Overview | Demonstrators
Intelligent Healthcare is a prototype that demonstrates how real-time remote patient monitoring can help transform healthcare by enabling better care management. Developed by Accenture Technology Labs, the prototype showcases an innovative vision for the future of healthcare by integrating a plethora of emerging technologies, including consumer health electronics, wireless networks, predictive analytics, and advanced visualization and user interface. Through a number of interactive scenarios, the prototype provides a glimpse of how the application of the latest technologies may enhance healthcare in the long-term. Other applications may include the real-time monitoring of the health condition of first responders in dangerous situations.
Axalto is demonstrating two different products:
1. With the US Government about to issue citizens with a new generation of passports containing an electronic chip it is important to understand the efforts undertaken to protect their privacy. Axalto, being on the shortlist of companies competing to supply the Dept of State will demonstrate the latest technology that addresses all the major privacy concerns. Compliant to ICAO specification and latest Basic Access Control Specification.
2. Axalto has created a suite of products based on secure, proven and trusted smart cards to provide secure online authentication of a user community to an internet service provider. Supporting both offline and online authentication techniques with smart card powered tokens the audience can witness the ease of use of these devices and how effective they are at countering phishing, spoofing, social engineering and other classic identity theft attacks.
Cisco's IP Interoperability and Collaboration System (IPICS) is a powerful new IP-based tool that is designed to easily integrate disparate push-to-talk radio systems (including those used by public safety agencies) together with other communication resources such as wireless or wireline voice, VoIP, video and data devices. These next generation capabilities are designed to allow public safety organizations to easily collaborate on emergency management and routine operations across different networks, both wired and wireless. Unlike audio gateways or bridges, IPICS allows emergency managers to create talk groups on an ad hoc or pre-defined basis, and is easily scalable to meet regional and national needs. It does not require a pre-defined "interoperability" radio channel. IPICS addresses an important public policy need and is available in the marketplace now. In contrast, radio-based solutions to interoperability are estimated to cost tens of billions of dollars and will result in interoperability only for those agencies that have interoperable radio systems. The demonstration will show how an emergency manager uses the IPICS system, and the graphic user interface on a laptop, to connect non-interoperable push-to-talk radios used by police and fire departments, as well as add other participants who will connect from cellular telephones. The demo will also illustrate how emergency managers can tap data sources (such as sensor technologies) to better manage the incident.
Compressus VIGILENT is a suite of solutions providing superior situational awareness and multi-agency information-sharing for public safety, homeland security and public health protection. VIGILENT enhances critical-incident-management (CIM) capabilities for day-to-day challenges, preparedness, and disaster response. VIGILENT is composed of several modules, each of which meets or exceeds required functionality for today's CIM needs. Each interoperates with existing hardware and software, allowing authorities to leverage existing assets while adding more capabilities and interoperability. Our demo will employ laptops, video monitors and handouts to illustrate how VIGILENT can:
- Monitor and share area-wide data about the status of medical resources
- Display real-time location and status of resources from multiple jurisdictions on an accurate map
- Distribute the right data and messages to the right people at the right time, via any network or device
- Prompt, track and record response activities in line with federal guidelines
- Collect, analyze and display data from many sources to identify disease outbreaks and biohazards
Consumer Electronics Association
CEA's presentation will showcase products that will be at the center of the key technology policy debates in the 109th session of Congress - including HDTV, play-shifting technology, the V-chip are more. The demo will include products that highlight these issues. CEA will also showcase some of its award-winning consumer education material. This material can be used by Congressional staff to education their office or their constituency. As an association that represents over 2,000 consumer electronics companies, CEA will showcase some of the latest and greatest technologies.
When a consumer's PC malfunctions, finding the appropriate support and repair is a perpetual source of anxiety. And while computer manufacturers such as Dell offer phone support to consumers with problems, some serious computer problems require a higher level of service. To better serve that consumer need, Dell in November 2005 launched TechConnect, a new remote access support service for consumers. With the customer's permission, Dell technicians are able to access and control the user's PC to resolve technical problems, or even provide education to the consumer. Dell is the first national PC manufacturer to offer this remote access support service.
Using TechConnect, the customer can have their PC problems solved by a Dell technician without the hassle of having to unplug, pack up and deliver their PC to a retail outlet or ship to the manufacturer. The program removes a customer's anxiety about leaving their PC at a retail outlet for an undetermined amount of time with strangers, or allowing a stranger to come into their home for onsite service. And the program guarantees security and privacy by making sure the consumer is always in control of the remote session.
The technology is open source software and can be used license-free by anyone. The President's DNA Initiative provides funding, training, and assistance to ensure that forensic DNA reaches its full potential to solve crimes, protect the innocent, and identify missing persons. The DOJ's National Institute of Justice uses the re-architected www.DNA.gov to present a unified, cross-government, resource for this important work. The DNA initiative, like many other efforts, finds the knowledge and expertise needed to inform the public spread across Federal agencies and integrally linked to State, local and non-profit organizations. In collaboration with the Federal government Devis has pioneered technology to cost-effectively allow for distributed content management so that Agencies and experts can work together to present one view to the public. The tool achieves "single point of entry" using distributed Web content management and/or on-line "Coaching." Several award winning Web sites (DNA.gov, DisabilityInfo.gov, MilSpouse.org) will be demonstrated to prove that the Web can, and should, be controlled directly by the subject experts, without "HTML" getting in the way.
The widespread availability of computers and connections to the Internet provides everyone with 24/7 access to information, financial services, and shopping. Unfortunately, some individuals exploit the Internet through criminal behavior and other harmful acts. Cyber crimes are expected to yield more than $1 trillion in 2006, more than the illegal drug trade last year. Despite this overwhelming threat and the amount of information available to consumers regarding the dangers of spyware, viruses, and phisher sites- the fact remains that consumers are still confused by the differences and even more confused on how to fully protect themselves online. The demonstration will highlight the simple, extremely effective Internet security measures and services provided via the EarthLink Protection Control Center. Highlights include EarthLink's single scan technology that allows users to scan their entire computer for both spyware and viruses simultaneously with extreme efficacy. In addition our ADS (Active Defense Shield) actually stops spyware from installing the moment it tries to install. The EarthLink Protection Control Center makes it easier than ever to protect yourself against viruses, spyware, and hackers all from one convenient location.
EgovMall Technologies, a division of ElectionMall Technologies, Inc. will demonstrate their Election Security Seal Program, which is the Internet's first and only real-time Identity Assurance infrastructure for campaign websites. Once the authentication of a candidate's website is confirmed through State Election office the candidate website is then listed in an official online "Registrar Directory" that will validate the information in real time and will include every official candidate site registered through the State Election Officials. The candidate will also have the option to add an Election Security Seal to their website that will let voters know they are on the legitimate campaign site. The seal has a scroll-over capability that will allow the visitor to see the certification. ElectionMall Technologies is qualified as the only online "Registering Authority" (RA) providing digital authentication certificates to candidates, campaigns, and political organizations' website worldwide. The Election Security Seal Program delivers trust, confidence, and peace of mind to voters and candidates as they become secured and certified interactive participants. For an example of technology visit www.electionsecurty.com
Entertainment Software Association
Online Video Games
ESA will provide a demonstration and discuss consumer access to video games over the internet using game consoles and PCs. ESA's presentation will show how gamers can play online games with their friends and other players around the world. ESA is the trade association representing the publishers of computer and video games for personal computers, video game consoles, handheld devices, and the internet.
Federal Trade Commission
The FTC will distribute and display consumer education resources attendees can use to promote safe computing practices. Promote safe computing; also demonstrate Web site games and quizzes via series of FTC operated Web sites.
The Fujitsu PalmSecure is a palm-vein based authentication system that utilizes the latest in biometric security technology. Answering a worldwide need from governments to the private sector, this contactless device offers an easy-to-use solution for verifying identity. The Fujitsu PalmSecure works by capturing a person's vein pattern image while radiating it with near-infrared rays. This vein pattern is then verified against a pre-registered pattern to authenticate the individual. As veins are internal in the body and have a wealth of differentiating features, attempts to forge an identity are extremely difficult, thereby enabling a high level of security.
The opportunities to implement PalmSecure include security, financial/banking, healthcare, commercial enterprises and educational facilities. Applications for the device include physical admission into secured areas; log-in to PCs or server systems; access to POS, ATMs or kiosks; positive ID control; and other industry-specific applications.
GetNetWise is more than a Web site -- it's a Web-wide partnership of companies and nonprofit groups commited to providing common resources to help Internet users with their experiences online. GetNetWise focuses on keeping kids safe online, protecting your computer from hackers and viruses, stopping unwanted e-mail and spam and keeping your personal information private.
Internet-enabled situational awareness, information sharing, and interoperable internet communications technologies offer the most important, affordable, and speedy means available today for improving the homeland security and emergency response capabilities of the nation. The Emergency Response Incident Command and Communications System (ERICCS) is a collaboration between small and large businesses, state and local government, and emergency responders.
ERICCS Alliance member companies Invizeon and BAE Systems and others will demonstrate an affordable and rapidly deployable portable emergency operation center (PEOC) system that provides integrated geospatial situational awareness displays, GIS/GPS mapping and tracking, decision support applications, satellite and wireless broadband internet access, and interoperable radio communications capabilities to first responders in the field. Built on service oriented application architecture, these capabilities are delivered to the incident commanders and first responders on the front lines through advanced portable, desktop, and mobile operations and communications platforms.
As the rate of VoIP adoption accelerates, companies are beginning to look more closely at the effects of VoIP initiatives on overall IT security. Identification, access, application and network vulnerability: these are all issues of great concern that are preventing or limiting VoIP deployments and success.
What are the key security issues that companies need to consider in deploying VoIP infrastructure and putting it to use with real-world applications? As companies increasingly adopt VoIP as their standard telecommunication environment, the possibilities for putting it to use are virtually endless. But overcoming unique security obstacles is critical to taking advantage of these new technologies and capabilities.
In this demo, LiteScape Technologies will illustrate how VoIP identity security is achieved through authentication by three methods on one single device: Ask who the user "IS" by using biometrics; ask what the user "KNOWS" by use of a password; and ask what the user "HAS" by using a magnetic/RFID/SMART card.
Microsoft will demonstrate several of its current and emerging platforms that leverage the Internet and IP networking to provide rich, satisfying, and user-friendly media experiences for American consumers. These will include Windows Media Center, Microsoft TV's IPTV solutions, and Xbox 360.
Motion Picture Association of America
The demonstration will feature digital source devices (DVD players) that transmit content via analog connections to various digital recording devices. The exhibit will highlight the discrepancies between those digital recording devices that currently detect and respond to rights management information and those that do not. This difference means that proprietary content is unevenly protected from unauthorized distribution. The demonstration will also show how the rights information currently detected by many digital recording devices can be stripped out of analog signals and how VEIL technology can be effectively used as a backup carrier of rights management information in analog signals.
NTT DoCoMo USA, Inc.
Japan's premier mobile communications company, NTT DoCoMo, provides wireless voice and data communications to tens of millions of subscribers. NTT DoCoMo is the creator of W-CDMA technology, the new de facto global industry standard, as well as the groundbreaking mobile i-mode service. Please come and look some of our latest features, such as mobile wallet "FeliCa," fingerprint security, QR-code reader and much more!
NTT Communications will demonstrate how corporate networks are enhanced with IPv6 and how to secure end-to-end/peer-to-peer data exchanges with its IPv6 security technology, m2m-x (machine to machine exchange.)
We will show how the problem of improving employee productivity and efficiency while enforcing secure end-to-end/peer-to-peer connectivity is solved allowing employee access to business information anywhere, anytime, with IPv6 and NTT's m2m-x security technologies. NTT Communications' IPv6 corporate network allows users to access all the necessary information they need to perform their work while keeping the information safe from unauthorized access and disclosure, and makes remote collaboration easier and more secure.
The demonstration consists of several presentations: a video, an IPv6 thin client system, and remote collaboration system.
NTT America will demonstrate the common availability of IPv6 enabled products and services with commercial off the shelf (COTS) equipment in a mobile wireless environment.
Open Voting Solutions
Our presentation will show an election voting system that uses secure networking combined with off-the-shelf name brand components to easily construct a trusted voting environment that is dramatically cheaper to implement. By using open source and open public standards we provide transparency and openness. The visitors will be able to see the actual voting network exchanges and how egovernment services can be provided in realtime to the public without the loss of trust, privacy and security involved in using the Internet.
Panasonic will demonstrate in-home use of High-Definition Power Line Communication (HD-PLC). HD-PLC uses the existing electric power lines in the home to distribute voice and data and even HD video via a high-speed network (190 Mbps), making it possible to connect and enjoy multiple streams of exceptional quality High-Definition video content, music playback, Internet gaming, VoIP Phone service, home security video monitoring and the typical connection of computers and other devices to a unified network. A high level of security is provided, as the adaptor automatically sets up AES 128-bit encryption. HD-PLC makes it extremely easy to set up a robust home networks - simply plug the adaptor into an electric power outlet, connect your PC or other peripheral into the adaptor's Ethernet port, and you're ready to go! With HD-PLC, a normal family can easily take advantage of the ever growing world of amazing networked products and Internet technology.
The demo will show scanning, quarantining, removal, and real-time protection of spyware threats utilizing Spyware Doctor 3.5 on a spyware infected PC. The demo will display the spyware doctor interface http://www.pctools.com/res/images/spyware-doctor/thumbnail.gif, with live test scans and filtering.
More information about Spyware Doctor: Chosen as "Best of the year 2005" by PC Magazine, Spyware Doctor 3.5 effectively removes spyware, keyloggers, Trojans, and other malicious threats. as well as prevents new spyware from forming on your PC. "The most effective of all the products tested at both blocking and removing spyware and keyloggers, and it's our current Editors' Choice." - PC Magazine Editors' Choice, June 19, 2005
Phoenix Technologies will demonstrate Recover Pro, a desktop/notebook recovery application that allows for immediate total system recovery -whether caused by virus or malware attack, user error or operating system corruption. Unlike traditional network backup and restore, Recover Pro can recover your operating system, user settings and data files in a few simple mouse-clicks without a recovery CD or help from the IT department. The demo will illustrate how easy it is to create a complete system snapshot - as often is needed by the user- and will then take the audience through a spectacular system meltdown where family pictures, important documents and the operating system are completely destroyed. Then, even without the operating system, Recover Pro will access the recovery data from the firmware level of the PC and will restore the entire machine, in minutes.
Banking, healthcare, education, entertainment, shopping: consumers are living out more and more of their lives on the Internet. However, surveys and public opinion polls indicate that Internet users are concerned about the privacy and security of their personally-identifiable information online, and the risk of fraud and identity theft. As services are moved online in ever-greater numbers and the Internet is used in just about every aspect of our daily lives, trust in this important medium has never been more critical.
Online fraud comes in various forms, but there is a particular concern about the hijacking of accounts that are only protected by passwords. Once a reasonable protective measure, passwords have turned into a significant vulnerability because they are easily stolen, guessed or misappropriated. Moving beyond static passwords, an additional layer of strong security gives consumers the assurance that access to their online accounts (bank, credit card, retail or other) is reliably and securely restricted to them alone.
This demonstration from RSA Security will highlight how consumers and other Internet users can be empowered by technology tools to combat online fraud. The demo will feature two types of strong authentication:
< an invisible behind-the-scenes process analyzing the risks associated with the specific transaction, to determine whether it requires a stronger form of authentication (for example, in the form of an out-of-band phone authentication); and
< a high security device that generates a new password every 60 seconds. this device is uniquely associated with the user and can be used to access accounts at multiple secure websites.
This demonstration will provide information on how technology can be used to help improve health care services including how RFID technology is being used to prevent counterfeit drugs and promote consumer safety; demonstration on an RandD project using "virtual social agents" to address the issue of a decreasing number of healthcare workers in the United States; and other technology solutions that meet the growing demand for a modernized health care system.
The Slingbox is a breakthrough consumer electronics product that enables consumers to watch their living room TV programming from wherever they are by turning virtually any Internet-connected Windows-based laptop or desktop and any Windows Mobile-based PDA or smartphone into a personal TV. The Slingbox redirects, or "placeshifts," a single live TV stream from a cable box, satellite receiver, or digital video recorder (DVR) to the viewer's PC - located anywhere in the home or anywhere in the world, via the Internet.
Many new targeted attacks are bypassing fully patched end-point systems that have up-to-date anti-virus, anti-spyware, and personal FWs. Therefore, to the hacker community using targeted infection techniques, end-point compliancy (up-to-date AV & Anti-Spyware) adds limited security value to the victim being attacked and is often inconsequential in stopping these sorts of compromises. This is one of the reasons Symantec is integrating WholeSecurity's Behavior Detection Engine. More frightening is the fact that most targeted infection vectors are now using various process injection techniques to become part of "allowed processes" that are often permitted access to the Internet through the victim's network and gateway security mechanisms.
VeriSign Unified Authentication provides a single, integrated platform for provisioning and managing all types of two-factor authentication credentials for both the Public Sector and Commercial sectors. Strong, two-factor authentication provides a higher level of security than solutions based on static passwords alone. It helps prevent identity theft; allows you to open your network to partners, suppliers, and customers; and protects user devices and Web services. The combination of VeriSign's infrastructure, technology, data and intelligence puts you in control of your security environment, leaving you free to focus on running and expanding your business.
VeriSign will demonstrate the issuance, use and management of second factor credentials which could be used to strongly authenticate to on-line banking sites, shared healthcare networks and ecommerce sites. VeriSign's HSPD-12 compliance solution will also be demonstrated
Verizon Wireless will demonstrate its latest advanced product offerings that use CDMA EV-DO technology and its BroadbandAccess service. These products will help business users stay connected and increase productivity, and provide consumers with new and exciting entertainment applications. For business, Verizon will demonstrate two new products; the new Blackberry 7130e with tethered modem capabilities and the new Palm Treo 700w Smartphone. These products take two well-established and important business tools (the Blackberry and the Palm) and turbo-charge them with EV-DO broadband capabilities, providing enormous benefits to the business user. For entertainment, Verizon will demonstrate its new V CAST Music service; the world's most comprehensive mobile music service, which lets music lovers download music over the air directly to their wireless phones, straight to their Windows XP PCs, and transfer new and existing digital music from the PC to their phones.
Verified by Visa is the leading online security tool addressing one of the top concerns of consumers and merchants on online commerce today: the securtiy of transactions. Verified by Visa is simple and inexpensive for a merchant to implement, and easy and fast for consumers to use. This demonstration will showcase how this extra layer of fraud protection protects consumers and merchants and increases the security of online transactions.
During the demonstration, Visa will highlight how the registration process works and how consumers using Verified by Visa can use a password to confirm their identity when shopping online - the same way a PIN number authenticats cardholder identity at ATM machines. Because only the carholder knows the password, Verified by Visa helps prevent fraudulent charges, protecting both the consumer an the merchant.
Currently, more than 56,000 merchants in the U.S. have implemented Verified by Visa, which significantly reduces their liability for fruadulent transactions. Ensuring the integrity of online transactions also increases consumer confidence, contributing to an increase in sales for participating Verified by Visa merchants.