Page 74 - Cyber Warnings
P. 74







SECURED INTERNET CYBER CARD SYSTEM.

 Employs proved, off-the-shelf mag-strip, hardware and firmware.

 Each cyber device requires integration with an off-the-shelf mag-strip reader.

 Software is segregated and encrypted.

 Cyber Cards cannot serve skimming, hacking or breaching, such as with malware and/or
botnet malware.
 Cyber Cards security systems are de-centralized into several encrypted repositories,
each repository requiring knowledge of the issuer’s encrypted platform for integrating
identity confirmation, for financial authorization and money ownership transfer.



SECURED CYBER CARD PROCESS.

 Upon receipt of the Cyber Card the owner is provided with the issuer’s initial, encrypted
cyber-encoding by which to enter the de-centralized, on-line Internet financial system.

 Ensuing security is established solely by the card owner who alone can change
encodings; the issuer’s encrypted, decentralized system then assures nobody else can,
including employees or thieves.

 The Cyber Card owner can encrypt security encodings in their personal cyber devices
for secured in-house purchases on the Internet.

 The system cannot be entered without the Cyber Card, the device’s e-reader requiring
and accepting the unknown owner’s security encodings per the unknown owner’s
encryption (PINs and Passwords are basic examples).

 Others cannot operate this Internet system by possessing or duplicating another’s Cyber
Card since the Cyber card provides no intrinsic identity, thereby no financial value.

 The new cyber system also permits the simplicity of owning a singular government
and/or commercial Cyber Card which requires its possessor to decide which top-tier
encrypted Internet system to enter based on the non-identifiable owner’s encoding.



OTHER APPLICATIONS OF CYBER CARD TECHNOLOGY.

 Governments can issue variants of the Cyber Card to secure electronic voting.

 Can be the first step to enter security-soft infrastructures and facilities.

 Can secure federal and state financial programs including Social Security, Medicare,
Medicaid and Tax Reimbursement.

 Converts the high-value U.S. Social Security Card to a no-value membership card.
74 Cyber Warnings E-Magazine – September 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   69   70   71   72   73   74   75   76   77   78   79