Defining the Problem
Accessing a network using a browser allows unlimited entry to your environment by any internet connected device in the world; therefore, browser-based access can only deliver up to Classified level security.
A safer point of view.
Removing public access to secure services exponentially decreases exposure.
0
 Billion
INTERNET CONNECTED DEVICES
0
AUTHORIZED USERS
(mid-size company example)
(mid-size company example)
0
 Million
POTENTIAL ENEMIES TO 1 AUTHORIZED USER
A universal problem,
Browser-based access
Classified Activity

- Browser anonymously connects to a website.
- Login loaded.
- Gather Endpoint Factors.
- Endpoint Factors are rendered to Data.
- Data are transferred.
- Data are received.
- Data is used to match to any authorized user.
- If match: The Identity associated with the data is retrieved. It is assumed the retrieved identity is the person providing the data.
- Else: Secure access denied. Unrestricted access permitted the attempt.
- End If.
Browser-based Classified Configuration can only deliver Classified level security
The reason is the Sequence of Events:
- Authentication
- Identification
- Access Control
Existence Technologies, Browser-less access
Secure Activity
All a user does is connect, input credentials, interact, and disconnect.

Step 1
- Insert ExistenceID.
- ExistenceID verified and authenticated.
- ExistenceID connects to its private Internet dimension.
Step 2
- The User is presented a Login.
- Data are gathered.
- Data are transferred.
- Data matched to the identified user’s credentials.
- If match: Access granted.
- Else: +=; On count = 3; Disable Existence ID; Removes the opportunity to attempt again.
- End If.
- Conduct Secure activity.
Step 3
- Disconnect ExistenceID.
- Existence terminates.
- No session data left behind.
Browser-less Secure Configuration For Secure level Internet activity
Access Control begins by limiting access to authorized users. An authorized user is identified, then data is collected and matched to a specific user for authentication, anonymity is removed from secure. Secure activity can never be performed in a browser-based environment where spying is the model.
The Secure sequence of events:
- Access Control
- Identification
- Authentication
Does your organization have anything SECURE?
Contact Existence Technologies to find out.