Design Simulation Systems Ltd
 

Authentication isn't just about passwords

DSS Enterprise. The Complete Cybersecurity Solution

  • Authentication
  • Access Control
  • Authorisation
  • Transparent Two or Three Factor Authentication
  • No added inconvenience burden on users
  • Keyboardless entry of authentication factors
  • 2-Tier SSO Session Management
  • Identity as a Service
  • Installs Out-of-the-Box
  • Intrusion Protection


About us

Design Simulation Systems Pty Ltd is an Australian company, which was originally born in Singapore, with the aim of developing and marketing clever stuff, until it was bought by the National Computer Board.
The Australian reincarnation came about, when we noticed that existing authentication systems were either vulnerable to many forms of attack, grossly overpriced, or offered a solution which was actually a development project. Usually, they were all three.
Our answer to this, is to offer an authentication system which installs out-of-the-box in less than an hour, provides user-transparent 3-Factor authentication, and costs less than the average laptop for an all-site licence.
Also, the footprint is small enough to send all of the components by email.
 
 

Be Your Own Authentication Provider


Why rely on a third party to be your 'Identity as a Service', when the service provider can be you, on your own hardware, inside your own firewall?
Full configuration functionality is accessible from your smartphone, so you can set it up at the poolside, with a margarita in your hand.
Also, unlike freebies like Radius, you don't need to start a development project, since you can install it in 5 minutes and, unlike SAML-based systems, you can write an interface to it, with 2 lines of HTML.
If you already have an account on our online IDaaS system, you can access it here
Find out More Download Manual

2FA from Device Signature

Authentication begins when your device connects to the DSS Enterprise authentication server.
Before the user is even presented with the challenge, the device's unique signature is checked against those registered to you, and is the second factor of the authentication.
Registration of any device is transparent and totally hands-free, without querying the device, or installing cookies or client software.
Find out more Download Manual

First Factor From Password

Keyboardless login - on any device. The challenge panel just needs you to enter the password by simply spelling it out on the two touch panel images.
Because these are images, there are no keystrokes for malware to record, and no text for screen scrapers to read. Also, because each challenge presents a different set of random characters, malware can't predict the future encoding of your password.
Find out more Download Manual

User Self-Service for Most Tasks

Users have no need for admin privilege to set most of their profile parameters.
They can securely and safely set Passwords, reset Passwords, register as many devices as they need and deregister devices no longer needed, lost, stolen or obsolete.
Download Manual

Interactive SSO Demo

Croesus & Midas sell diamonds. The diamonds are sold from four different stores, each of which only sells one colour

The four stores sell Red, Green, Blue and White diamonds respectively.

To make things easy for their many customers, Croesus & Midas permit a single password to give access to more than one store.

The ID's of users authorised to access the diamond stores, together with their passwords, and instructions on how to run the demo can be found here

Find out more

Secure Data At Rest with Virtual Key Encryption

Even though the confidential user details and password data in your database might all be encrypted, the Enemy Within knows the location of the encryption keys and can steal the database, decrypt the data, and publish it on the internet.
Not with DSS Enterprise. Once the virtual keys are set, not even we can access them. Even though the root user can change the keys, he's never told their value.
Find out more Download Manual

Content Driven IDS/IPS

Our interest in security has been fostered by the fact that this site has been under attack by parasites trying to implant viruses since 2009, and by a botnet since Christmas Eve 2012. We've collected and logged about 10000 hack queries, ranging from SQL injection, to dumb PHP and WordPress hacks, to attempted bash exploits. You can download these files to create pen-testing scripts.
Our IDS/IPS, has successfully defeated every single hack attempt and, by reporting the IP addresses to their ISP's, has helped to remove 77753 of these parasites from the internet - and counting...
You can see a (live) chart of incoming defeated hack attempts by clicking on 'See Live Graph' and, if you're interested in trying the IPS, to protect your website, drop me a line.
See Live Graph Download the hack queries

Unix, Oracle and Security

We include here, a pot-pourri of Unix articles, with a leaning towards database and security applications. If you're not that good a programmer, they'll either help, or put you off, for good... Read 'Real Programmers' to see if you qualify or, if you're not a programmer, try 'WordImperfect'
Find out More

Blog: Random Ramblings On System Security

Blog: Identity As What Service?

Blog: The Choice of a Second Authentication Factor?

Blog: The Choice of a Third Authentication Factor?

What next?
I need more technical information
I need pricing information
I'd like a free 3-month trial


The Legacy Simulation Stuff

In an era where an electronic circuit is a slab of silicon, designed by writing a language like VeriLog or VHDL, with virtually no need to understand the mathematics of circuit design, or the physics of semiconductor devices, we present a set of tools from a more gracious age. From an age when computers were still drawn by horses, and it took an engineer to design something. Not a software package.

I guess this is all precipitated by the fear that, one day, there will be nobody left who actually understands how or why stuff like VHDL works, and colleges will have stopped teaching mathematics, because it's all too hard, and too many people fail the courses - which isn't politically correct, because it damages their delicate egos....

So, what are these analog tools? I hear you ask...

At some point, you might like to see a complete electronic circuit design cycle, starting with schematic capture, proceeding to a time-domain simulation, and finishing with some DSP post-processing of the result, to produce a Fast Fourier Transform of the output waveform

These tools are all available for free download, compiled for either Linux or Sun SPARC. No special gizmos, like Motif or Java are needed, and they'll run quite happily on anything with a working X11 library.

Graphical Schematic Capture and Edit
Of course, circuit design is done with a graphical circuit editor, supported with libraries for everything. Behavioural level Laplace Transform primitives, high level logic functions, semiconductors, mechanical components, PCB track primitices and a heap of others.
Find out more

FFT, IFT And A Lot More
When the simulation is finished (or if you have your input data in a file), you can apply a whole heap of mathematical functions, including forward and inverse Fourier transforms, convolution, deconvolution, differentiation, integration functions and display results in the complex plane.
You can also download either the SPICE or Spice3 simulator (or both), each of which has functionality that the other doesn't have. Both simulators have been enhanced with LIMPTS increased to 65536, and memory to 800000. They both continuously dump node data to a binary file
Find out more Find out about DSP functions

High Level Digital Logic Simulator
Not content with offering the analog circuit creation and simulation anachronism, we compound the injury by also showing a digital circuit simulator, which simulates digital logic at the device level, not the gate level.
Find out more

Oscilloscope, Spectrum Analyser, Signal Generator
You can set up any waveform you can think of with the signal generator, drive your circuit over whatever time interval, and with whatever resolution you choose, and watch the outputs change. This goes for a time domain analysis, a frequency domain sweep and everything else that SPICE can do. All results are presented graphically.
Find out more

SPICE Models From Data Sheets

Since even the most comprehensive library may miss the very device which you need to use, we also supply a set of component modelling tools

Vmodel will make a computer model from the characteristics supplied on the data sheet, while Vmodel2 accepts X-Y characteristic curve data, and accurately extracts and optimizes the relevant SPICE parameters by curve-fitting techniques

Find out more

Free Downloads

All the analog tools mentioned above are available as either Linux or SPARC executables. If you're planning on using GEX, you're going to need the analog lib file, which also contains SPICE models for a whole variety of stuff.
There are also Unix man pages for most of the products, which you can install in any 'man' directory.
Go to downloads page

Can't make it work on your version of Linux?

Need to model an obscure semiconductor device?

Get in touch:

xmarks@exemail.com.au
Copyright © 1999-2017 Design Simulation Systems

All rights reserved for their respective owners.

visitors since January 1st