 So here we're secure our RF. So who are you? So I'm Louis Parks. I'm the CEO of secure RF and you make secure IoT. What do you do? We actually developed security solutions that are very very efficient very very small that will fit on the smallest devices now making up the Internet of Things or IoT so specifically authentication and data protection mechanisms for 8 and 16-bit microprocessors and things as small as passive NFC and RFID and Things like Bluetooth smart and other devices where energy and speed are very important. So let's see some of this stuff here. So this is so this is a this This is a FPGA from a company called micro semi and this is their smart fusion to a latest board Now what we've done is we've got our solution the algebraic eraser running on it alongside lip to curve cryptography Two asymmetric protocols and I can show you the speed difference between the two by looking at the screen here And on the screen I have two squares and what's going to happen is I'm going to hit go and in each case every time That smart board computes an authentication. It's going to paint a line of pixels. There's five hundred and twelve So I'm going to hit go and you're going to see the spate the speed at which we paint pixels against DCC Go so that's five hundred and twelve pixels painted in thirty seven milliseconds. What's happening here? ECC is painting one line every three hundred and eighty milliseconds Three a second still isn't bad, but you can see the speed at which it deploys So this difference in speed and performance translates not only in terms of how quickly we can authenticate But in significantly lower power consumption. So again in wireless devices or things where Power and energy consumption are important like Bluetooth or any of the other wireless sensors that are making up the internet of things That's the difference that we bring. So do you get on arm processors or yes? And as a matter of fact arm has a range of processors the smallest of which are the M zero and M three's That's where our solutions run because there are already other solutions that can run on the much higher more advanced arm processors But absolutely. So you're we are an arm partner. We are shipping We have pilots going now with major pharmaceutical companies. It's some defense contractors a significant department of defense Pilot going on now in the US So we're just beginning to send out platforms commercially because I achieve awesome is great But if it's not secured then it's going to fail right so it has to be secure correct the IOT and the industrial IOT security safety Privacy very very critical components for adoption. All right. Why are you showing these over there? Because what we're showing is these are passive NFC Chips and what we're showing is a solution where if you wanted to authenticate products In the IOT We have an app and this app will actually Authenticate with a chip. There's actually a cryptographic engine running in the chip So all I have to do to authenticate it is hold it up hold it over the chip when that turns green I touch And it's going to do an authentication What's exciting and different about anything else that's out there if you look at the phone? You'll see it's an airplane mode So this did not use any server or back-end processor It actually did an asymmetric or public key handshake between this phone and the chip in this tag to authenticate it And like anything else is running now on that type of platform. All right. So since when do you have the solution working? These solutions we've just introduced commercially earlier this year including the FPGA solution some of our intellectual property has been around for a few years and Then people can just add this to their IOT solutions. Correct So we are licensing it to semiconductor companies and working with partners, you know like like an arm and others Or they can get it with our code built-on sensors something like this where we're producing a Temperature sensor that's using an asymmetric authentication Doing one million temperature Collection points all encrypted and protected to ensure nobody tampers with the data or the authentication of the product that it's on All right. Are you is it compatible with the Fido Alliance and all the other security that's going on? We're member of some alliances, but you know each alliance arguably is affiliated with a protocol or some algorithm method So we're members of several But again, we're providing that the very base level Asymmetric solution so happy to work with whoever and whatever out there