Welcome

Welcome to this site dedicated to the IST MODEL Technology, an innovative PATENTED technology designed to guarantee the highest levels of security during communications and transactions over the Internet.

Benvenuti in questo sito dedicato alla Tecnologia IST MODEL, progettata per garantire il più alto livello di sicurezza nelle comunicazioni e transazioni su Internet.
IST MODEL è una tecnologia innovativa brevettata.

IST Model - A short Introduction.pdf

IST Model - Main innovative aspects

Here there are some of the innovative key points of this invention.


NO CRYPTOGRAPHIC TECHNOLOGY
IST Model does not uses any cryptographic techniques to build his strong safe identification model


FAST AND WELL SUITED FOR SMALL DEVICES
No cryptographic techniques has two main outcomes: the IST Client is very fast and it can be implemented in any device, even the smallest one with limited computation bandwidth (for example  smartphone, smart card, RFID tag ecc. ecc.)


BIDIRECTIONAL IDENTIFICATION
IST Model implements a strong identification engine able to identify every transaction partner (for example both the Client and the Server in 2 partner scenario)


"N" PARTNER SCENARIO TRANSACTIONS
IST Model can be naturally extended to build a scenario composed by 'N' partners all involved in the exectution of a single electronic transaction


OPEN PROTOCOL
IST MODEL has no special needs, just a TCP/IP connection. It is an open protocol that can be adoped with minimum costs over an existing infrastructure


GENERALIZED TRANSACTION
Every kind of syncronous transaction can be defined inside the model


IDENTIFICATION DATA NEVER SHARED
There is only one "certification authority" who is enabled to identify transaction partners. Security data are never shared among partners


NO DETERMINISTIC ALGORITHMS
The model is not using any deterministic algorithm, making it inherently secure


MINIMIZE HUMAN INTERVENTION
The IST model is designed to minimize human intervention


INTRINSIC PROTECTION
The identification engine inside IST Model is inherently secure by design. Its innovative features make invulnerable by many computer-related fraud among those currently most popular (phishing, pharming, arp poisoning, sniffing just to name some of them)