© 2011. Copyright GuardTime. All Rights Reserved.
Raul.Vahisalu@GuardTime.com
  General Manager Estonia
        21.03.2012
GuardTime
Proof of time, origin and integrity for the world’s electronic data
   Founded in Estonia in 2006
   IP of Estonian scientists Ahto Buldas and Märt Saarepera
   Accredited timestamping service provider in EU since 2007
   Financed by ASI, Brother, Singaporean Government and Hong
   Kong based Horizons Ventures




                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
   Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San
   Diego
Hash Functions
 GuardTime’s technology is based on cryptographic hash functions
                                                                HASH VALUE

                                   HASH                        AXSJ76SNWCRVRVL
   INPUT DATA                                                  FFAONRDNZG4VUS
                                 FUNCTION                      U2HAS7DJWZR2U


                                ONE-WAY ONLY




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                            REVERSE CALCULATION NOT POSSIBLE




                                                                                 3
When trust is not enough
      4




                           © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough
                                                                               TIME




      5




                           © 2011. Copyright GuardTime. All Rights Reserved.
Keyless Signatures: How It Works




     Enable any            Sign the event                     Signatures are
                                                Receive a
      system or            logs, backups,                     mathematically




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                                              signature for
   environment to          archives, other                     verifiable for
                                             each data item
     use Keyless              data and                         the life of the
                                                 signed
     Signatures             applications                            data


When trust is not enough                                                         6
When trust is not enough
      7




                           © 2011. Copyright GuardTime. All Rights Reserved.
Prove This Didn’t Happen
       Does your proof require that someone trust you?
                           • ‘Cleaning up’ the application and system logs
           Accidental
                           • ‘Fixing’ the backups and archives
           (admin)         • Checking in untested applications
                           • Removing application and system log entries
           Intentional
                           • Changing database records
           (admin)         • Adjusting application and system configurations




                                                                                 © 2011. Copyright GuardTime. All Rights Reserved.
                           • Removing log entries
           Malicious
                           • Changing database records
           (hacker)        • Inserting new code into the operating environment

When trust is not enough                                                         8
Use Case: Auditable Scan-To-Server
       Signing capabilities are embedded directly into the multi-functional printer
       Documents are signed after scanned and converted to PDF
       The signature is embedded within the PDF
       Signed PDF documents are stored on the server
       Recipients of the documents
       can verify the signature of the
       documents from within the
       scanned PDF




                                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
       Provides proof of origin (e.g.
       which scanner), time and
       content for the stored
       documents
When trust is not enough                                                              9
International team
       Business is done by people! Our group CEO flight mileage last year - 250000
       0900-1700 Tallinn time +9h/-8h
       ~10 different nationalities
       Negotiation and communication style
       Work ethic, command of languages
       Politics, religion, women, alcohol




                                                                                      © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough                                                             10
Research & development
       R&D is in Tallinn, Estonia
       Top of the technology pyramid
       Serendipity-led R&D
       Can innovation be outsourced?
       What is innovation?
       Accountability to investors




                                        © 2011. Copyright GuardTime. All Rights Reserved.
       Test-site Estonia




When trust is not enough               11
Sales
       What do you sell?
             Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear
       Naive, Pragmatic, Strategic
       IP
       Obstacles
             Not invented here
             Nice to have but not compulsory (through legislation)




                                                                                                            © 2011. Copyright GuardTime. All Rights Reserved.
             Too new, too disruptive for me
       Technology push v. Market pull
       „GuardTime is not a technology problem, its a marketing problem“

When trust is not enough                                                                                   12
Business model
       GuardTime is sold as a monthly subscription service based on volume
       (Transactions/Second) shared with partners and downstream channel
       Estonia as a test site for the world
       Cooperation agreement with the Estonian Government for a service free of
       charge
       In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion...




                                                                                   © 2011. Copyright GuardTime. All Rights Reserved.
When trust is not enough                                                          13
Orwell 1984
       Big Brother
       Doublethink
       Thoughtcrime
       Newspeak




                            © 2011. Copyright GuardTime. All Rights Reserved.
       Memory hole


When trust is not enough   14
© 2011. Copyright GuardTime. All Rights Reserved.
           When trust is not enough



         Thank You!
Email: raul.vahisalu@guardtime.com

Guard time connect_estonia 21.03.2012

  • 1.
    © 2011. CopyrightGuardTime. All Rights Reserved. [email protected] General Manager Estonia 21.03.2012
  • 2.
    GuardTime Proof of time,origin and integrity for the world’s electronic data Founded in Estonia in 2006 IP of Estonian scientists Ahto Buldas and Märt Saarepera Accredited timestamping service provider in EU since 2007 Financed by ASI, Brother, Singaporean Government and Hong Kong based Horizons Ventures © 2011. Copyright GuardTime. All Rights Reserved. Subsidiary offices in Singapore, Hong Kong, Tokyo, Beijing, San Diego
  • 3.
    Hash Functions GuardTime’stechnology is based on cryptographic hash functions HASH VALUE HASH AXSJ76SNWCRVRVL INPUT DATA FFAONRDNZG4VUS FUNCTION U2HAS7DJWZR2U ONE-WAY ONLY © 2011. Copyright GuardTime. All Rights Reserved. REVERSE CALCULATION NOT POSSIBLE 3
  • 4.
    When trust isnot enough 4 © 2011. Copyright GuardTime. All Rights Reserved.
  • 5.
    When trust isnot enough TIME 5 © 2011. Copyright GuardTime. All Rights Reserved.
  • 6.
    Keyless Signatures: HowIt Works Enable any Sign the event Signatures are Receive a system or logs, backups, mathematically © 2011. Copyright GuardTime. All Rights Reserved. signature for environment to archives, other verifiable for each data item use Keyless data and the life of the signed Signatures applications data When trust is not enough 6
  • 7.
    When trust isnot enough 7 © 2011. Copyright GuardTime. All Rights Reserved.
  • 8.
    Prove This Didn’tHappen Does your proof require that someone trust you? • ‘Cleaning up’ the application and system logs Accidental • ‘Fixing’ the backups and archives (admin) • Checking in untested applications • Removing application and system log entries Intentional • Changing database records (admin) • Adjusting application and system configurations © 2011. Copyright GuardTime. All Rights Reserved. • Removing log entries Malicious • Changing database records (hacker) • Inserting new code into the operating environment When trust is not enough 8
  • 9.
    Use Case: AuditableScan-To-Server Signing capabilities are embedded directly into the multi-functional printer Documents are signed after scanned and converted to PDF The signature is embedded within the PDF Signed PDF documents are stored on the server Recipients of the documents can verify the signature of the documents from within the scanned PDF © 2011. Copyright GuardTime. All Rights Reserved. Provides proof of origin (e.g. which scanner), time and content for the stored documents When trust is not enough 9
  • 10.
    International team Business is done by people! Our group CEO flight mileage last year - 250000 0900-1700 Tallinn time +9h/-8h ~10 different nationalities Negotiation and communication style Work ethic, command of languages Politics, religion, women, alcohol © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough 10
  • 11.
    Research & development R&D is in Tallinn, Estonia Top of the technology pyramid Serendipity-led R&D Can innovation be outsourced? What is innovation? Accountability to investors © 2011. Copyright GuardTime. All Rights Reserved. Test-site Estonia When trust is not enough 11
  • 12.
    Sales What do you sell? Business model, Pilot, Service (consumer, infrastructure), Product, Disruptive change, Fear Naive, Pragmatic, Strategic IP Obstacles Not invented here Nice to have but not compulsory (through legislation) © 2011. Copyright GuardTime. All Rights Reserved. Too new, too disruptive for me Technology push v. Market pull „GuardTime is not a technology problem, its a marketing problem“ When trust is not enough 12
  • 13.
    Business model GuardTime is sold as a monthly subscription service based on volume (Transactions/Second) shared with partners and downstream channel Estonia as a test site for the world Cooperation agreement with the Estonian Government for a service free of charge In Estonia - National Archive, RIK, MKM, Levira, SEB, Elion... © 2011. Copyright GuardTime. All Rights Reserved. When trust is not enough 13
  • 14.
    Orwell 1984 Big Brother Doublethink Thoughtcrime Newspeak © 2011. Copyright GuardTime. All Rights Reserved. Memory hole When trust is not enough 14
  • 15.
    © 2011. CopyrightGuardTime. All Rights Reserved. When trust is not enough Thank You! Email: [email protected]

Editor's Notes

  • #2 Endast rääkida
  • #3 Financing process, 8mUSD in 2010
  • #11 Ämbrite viisi teed joonudKazakhstan v. Saudi power games, äri teha endasugustegaMentaalne kaugus, ei usu ärisse kus ise kohal ei oleKiirus, vaeva nägemineFacilitors, facilitating
  • #13 Mida teeme? – eriliste toodete müük, eriprojektid, milles puudub konkurents