0% found this document useful (0 votes)
42 views28 pages

ITwin

iTwin is an innovative USB device that allows users to securely access and share files between any two online computers from anywhere in the world. It overcomes the limitations of USB drives and cloud storage by providing limitless storage, strong encryption, and remote access and disabling capabilities.

Uploaded by

BHAVIKA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views28 pages

ITwin

iTwin is an innovative USB device that allows users to securely access and share files between any two online computers from anywhere in the world. It overcomes the limitations of USB drives and cloud storage by providing limitless storage, strong encryption, and remote access and disabling capabilities.

Uploaded by

BHAVIKA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

ITWIN

A Seminar Report
Seminar Report submitted in partial fulfillment of the requirements for the award
of the degree of B.Tech. in Computer Science & Engineering under
Bikaner Technical University

by
Apoorva Saini
University Roll No.: 20EMCCS020

Under the Guidance of


Manoj Kumar Mishra
(Asst. Professor, Dept. of CSE )

DEPARTMENT OF COMPUTER SCIENCE&


ENGINEERING
MITRC, ALWAR
2023

I
CERTIFICATE

This is to certify that the Seminar entitled ITwin presented by


Apoorva Saini bearing University Roll No.20EMCCS020 of
Computer Science & Engineering in MITRC has been completed
successfully.

This is in partial fulfillment ofthe requirements of Bachelor Degree in


Computer Science & Engineering under Bikaner Technical University,
Bikaner, Rajasthan.

I wish her/ him success in all future endeavors.

Manoj Kumar Mishra


(Asst. Professor, Department of CSE )

II
ACKNOWLEDGEMENTS

I would like to express my deep and sincere gratitude to my guide,


Asst. Prof. Manoj Kumar Mishra of CSE for his unflagging support
and continuous encouragement throughout the seminar work. Without
his guidance and persistent help this report would not have been
possible.

I express my sincere gratitude to Prof. J.R. Arun Kumar, HOD of Dept.


Of Computer Science and Engineering and faculty and staffs of
Computer Science and Engineering Department for their support and
guidance.

Apoorva Saini
Department of CSE
University No.- 20EMCCS020

III
ABSTRACT

USB flash drive is device that is used to store the data. Cloud storage
is also used to store the data on the middle server. But the USB flash
drive has the drawback that it is too small in size, because of that it
can be easily misplaced or lost. In case of cloud storage data can be
misused if the username and password is hacked by someone else. To
overcome all these problems, iTwin is the best solution. It is the
secure USB device that can be used to access, share & edit all the files
and media between any two online computers anywhere in the world.
It allows remote file access without any security and privacy risks.

Signature of the Student:


Name: Apoorva Saini
University Roll No.: 20EMCCS020
Branch: CSE
Semester: VII
Section: A
Date:

IV
Table of Contents
ACKNOWLEDGEMENTS…..………………………………………………..III
ABSTRACT………………………………………………………….………….IV
LIST OF FIGURES…..……………………………………………………….VII
1. CHAPTER-1: INTRODUCTION TO ITWIN………….…….……………..1
1.1 Introduction……………………………………………………….………...1
1.2 History………………………………………………………………………2
1.3 Why we need?………………………………………………………………3
2. CHAPTER-2: ITWIN FEATURES…………………………………………..4
2.1 ITwin Features………………………………………………………………4
2.1.1 Model…………………………………………………………………5
2.1.2 3D representation……………………………………………………..6
2.1.3 Simulation…………………………………………………………….6
2.1.4 Data model…………………………………..………………………..6
2.1.5 Visualization………………………………………………………….6
2.1.6 Model synchronization……………………………………………….6
2.1.7 Connected analytics…………………………………………………..6
2.2 Benefits of using ITwin connect device…………………………………….6
3. CHAPTER-3: ITWIN SECURITY…………………………………………..8
3.1 ITwin Security………………………………………………………………8
3.1.1 Hardware and grade security……………………………….…..….…9
3.1.2 Two factor authentication…………………………..………….……..9
3.1.3 Remote disable…………………………..………………………...….9
3.1.4 End-to-end encryption………………………...………………….….10
3.1.5 Twin trust authentication…………………………...………………...10
3.2 Applications of ITwin……………………………………………..………10
3.2.1 Testing New Systems Prior to Manufacture…..………………….…10
3.2.2 Improving Efficiency and Productivity………………..……………10
3.2.3 Managing Assets in Real Time………………...……………………11
3.2.4 Understanding Data to Provide Better Service………………………11
3.2.5 Facing New Security Challenges ……...……………………………11

V
4. CHAPTER-4: WORKING AND AUTHENTICATION PROCESS..……13
4.1 Working of ITwin…………………………………………………………13
4.2 Authentication process……………………………………………………14
4.2.1 AES encryption……………………………………………………..14
5. CHAPTER-5: CHARACTERISTICS OF ITWIN…………………..……16
5.1 Remote Desktop…………………………………………………………..16
5.2 Teleport Me……………………………………………………………….16
5.3 Office and Home Network Access………………………………………..16
5.4 Secure AES 256-bit Encryption…………………………………………..17
5.5 No subscription or Contract promise…………………………………..…17
6. CHAPTER-6: ADVANTAGES AND DISADVANTAGES…………….…18
6.1 Advantages………………………………………………………………..18
6.2 Disadvantages…………………………………………………….……….18
7. CHAPTER-7: ITWIN COMPONENTS……..…………………………..…20
7.1 USB connector…………………………………………………………….20
7.2 ITwin connector………………………………………………………...…20
7.3 Activity indicator…………………………………………………………..20
CONCLUSION………………………………………………………………….21
REFERENCES………………………………………………………………….22

VI
LIST OF FIGURES

Fig. 1.1 ITwin Device……………………………………………………………..2


Fig. 2.1 Features of ITwin…………………………………………………………4
Fig. 4.1 Working of ITwin……………………………………………………….13
Fig. 7.1 ITwin component………………………………………………………..20

VII
CHAPTER-1
INTRODUCTION TO ITWIN

1.1 INTODUCTION
ITwin is an innovatory new file distribution and far-flung access device brought to
you by a corporationcalled iTwin. It is similar to two ends of a cable, without
having any cables attached. It is as simple as touse a flash drive. It’s exactly plug
and play device. ITwin can attach any two online computers universallyall over
the world. ITwin empowers you to have access to any or all of your home-based
computer's filesand folders while you're on-the-go. Likewise, you can also use
iTwin to access to some or all of yourworkplace computer's files and folders while
on-the-go. There's no in-built limit to the volume of storageyou can access with
iTwin while you're on-the-go. The only limit is the size of our own hard drives
spaces.The only other "limit" is the rapidity of your Internet connection. The
faster it is, the enhanced experiencewill be there.

You can hand-pick your files for editing later on-the-go, or you can edit them
distantly, without the filesparting your computer. You can also reserve files to
your home-based or workplace computer while you'reout on-the-go. It's so easy,
it's incredible.

A USB flash drive is a data storage device that consists of flash memory with an
integrated Universal Serial Bus (USB) interface. A Cloud Storage is also a similar
case where in the data is stored remotely and is accessed whenever needed.
But a drawback of this USB flash drives is it’s small size cause of which it can
easily be misplaced or lost. This is a particular problem if the data it contains is
sensitive and confidential. In Cloud Storages the data can be stolen or misused if
the username and password of an account to access the storage is hacked by
someone. There are many more drawbacks like limited storage, no security, back
up, temp files, no remote disable etc.

1
ITwin is a 'limitless' secure USB device that enables users to access, edit & share
all their files & media between any two online computers anywhere in the world.
The only limit is the size of your computer’s hard drive. iTwin is an innovative
solution that allows remote file access without the security and privacy risks of the
cloud and USB flash drives. It’s very easy to access as a USB device and no
special installation is required. iTwin uses thoroughly analyzed crypto protocols
and algorithms(AES 256 bit encryption). It has features like bi-directional file
access, no temp files, remote disable, smart key generation, password support and
twintrust authentication.

Fig 1.1 ITwin Device

1.2 HISTORY
ITwin was developed by an Indian called Lux Anantharaman. After completing a
Bachelor’s degree inElectrical and Electronic Engineering from IIT in Chennai
and a Master’s degree from IISc in Bangalore,Lux operated first as an IT security
researcher at the Institute of Systems Science, Singapore and then assenior
researcher at Kent Ridge Digital Labs and the Institute for Infocomm Research.
Lux is major in PKIimplementations, proficient digital certificate revocations and
functioning security. Lux was pursuing apart-time MBA at NUS Business School,
Singapore, but he left the course in between because of potentialof iTwin.

As the first and only remote file access solution that is truly plug-and-play, iTwin
was among the top 100new tech products to be selected from thousands of
products and technologies globally reviewed by theeditors of the magazine. The
award was featured in the December issue of Popular Science, the mostwidely

2
read issue of the year since the debut of “Best of What's New” in 1987. Based in
the United States,Popular Science was first published in 1872 and is the
world's most widely circulated science andtechnology magazine with a
circulation of 1.3 million and 6.8 million monthly readers.

1.3 WHY WE NEED?


Transferring data from one PC to another can be difficult, especially if it's a large
amount of data. Forexample, if you want to send some data to somebody in
another country, you’re going to have to go through the hassle of either sending it
via e-mail, or upload it to some file hosting service. Chances are, if your file is too
large, you’ll probably need to buy more storage. Enter iTwin. This new USB
dongle/USB drive allows users to remotely access data from anywhere in the
world. It’s a one-time investment.

3
CHAPTER-2
ITWIN FEATURES AND BENEFITS

2.1 ITWIN FEATURES


One of the best features of iTwin device is the ability to securely access your data
by establishing a personal Virtual Private Network which is capable of managing
several tasks. You can able to access all your files and data on your home or office
PC by using Windows Explorer. Otherwise you can access definite files that are
stored in desktop applications. As well as it is possible to access files from your
isolated computer and save that files to the device that you are currently using, till
both the devices are enabled with iTwin Connect device.

Most of the mobile professionals and individuals that want to access their files and
information in spite of where they are, select cloud services for backing up and
storing important documents. A cloud service is suitable and enables you to access
your files from some device with an Internet connection. Many cloud service
providers deploy security technologies to guarantee their customers that
documents are securely transmitted and stored. On the other hand, not anything is
one hundred percent perfect that means a device like iTwin Connect can help you
cover up all of your bases in the event of data break or loss. iTwin Connect device
makes sure that your files reside private and protected. as you own the device, it is
just functional when attached to the computer; it uses twofactor authentication and
military grade security, as well as performs functions that we have discussed in
this article. Even if you leave the main computer powered up so you can connect
to it from any place, your data and records stay protected.

Fig. 2.1 Features of ITwin

4
Following are the main features of ITwin:
1. iTwin is like a limitless secure USB flash drive.
2. You can remotely edit shared files on your computer without replacing files on
main computer.
3. Back-up data is safe and secure and it is very easy.
4. There are no subscription fees for file access. But you need to pay for one-time
for drop box account with unlimited storage, which is included in device cost. So,
no additional fees ever.
5. iTwin doesn’t store any data, it just enables a secure connection between two
computers. You can access files on remote computer, only when you have
physical half of the iTwin with you. Additionally, you can setup password for
your iTwin for more security. It has also a feature to remotely disable connection
to computer with other half of iTwin.It even uses AES encryption in order to
transfer data securely.
6. Two iTwins together randomly generate a 256-bit AES key, every time when
they are paired physically and plugged into a computer. Smart crypto key resides
on both halves of paired iTwin. Smart crypto key is used for encrypting data
congestion between two iTwins.
7. Unplug iTwin and all temp files are cleared automatically. This is very much
useful when using a computer that doesn’t belong to you.
8. iTwin supports passwords of any length. Unlike other web and cloud services,
iTwin password is stored on itself, not on any server.If you forget your password,
simply pair both halves of your iTwin and plug them into a computer and set a
new password. There is no need for any technical support.
9. When using iTwin, connection between any two computers is symmetrical.
Access, copy, backup and remotely edit files on 1st computer from 2nd computer,
and on 2nd computer from 1st computer. You will have access to files on both
computers.
10. In short, iTwin is just like a wireless device connecting two systems online
and securely transferring data between them.
2.1.1 Model

5
A digital copy of a physical device or a piece of equipment precisely replicates its
properties and characteristics. Digital twins allow users to build models of
physical objects in virtual environment and track their behaviour.
2.1.2 3D representation
A 3D representation is an exact visual copy created using all the parameters of a
physical device. Such visualization creates a nearly reallife experience and allows
you to easily grasp the data presented in analytic reports.
2.1.3 Simulation
The simulation software of a digital twin puts a virtual model of a physical device
into a virtual environment. It also changes the environment’s parameters to track
the device’s behavior in different conditions.
2.1.4 Data model
A digital twin is capable of bringing users a comprehensive data model. This can
help them to visualize the connections between the elements of a physical device
or system. It permits you to label data and delivers a transparent view of
operations and processes.
2.1.5 Visualization
This feature allows users to view a graphic model on a screen of standalone
workstation or a mobile device. It gives us instant insight into details related to the
functionality of a device or system.
2.1.6 Model synchronization
This outstanding feature aligns the digital model with real-world parameters.
Modern modelling software is capable of doing it in real-time. Model
synchronization allows you to instantly view the representation of all the physical
updates in a digital twin and make correct predictions and estimations.
2.1.7 Connected analytics
This feature of digital twin software gives you access to analytics based on the
measured properties of a physical device. A digital twin platform leverages ML
algorithms and computations to bring insights into your device’s or system’s
operations and behaviour.

2.2 BENEFITS OF USING ITWIN CONNECT DEVICE


Most of the mobile professionals and individuals that want to access their files and

6
information in spite of where they are, select cloud services for backing up and
storing important documents. A cloud service is suitable and enables you to access
your files from some device with an Internet connection. Many cloud service
providers deploy security technologies to guarantee their customers that
documents are securely transmitted and stored. On the other hand, not anything is
one hundred percent perfect that means a device like iTwin Connect can help you
cover up all of your bases in the event of data break or loss. iTwin Connect device
makes sure that your files reside private and protected. as you own the device, it is
just functional when attached to the computer; it uses two- factor authentication
and military grade security, as well as performs functions that we have discussed
in this article. Even if you leave the main computer powered up so you can
connect to it from any place, your data and records stay protected.

ITwin Connect device also provides suitable browsing in any case of where you
are positioned across the world. ‘Teleport Me’ feature enables you to select your
continent even if you are travelling across the road. For example, if you live in the
United States and you are travelling out of the country, you can select your
continent as the US and still have the benefit of the programs you watch in the US.
This benefit may also work vice versa. If you are travelling in the US and enjoy
shows in UK, you can set browsing tool to the UK and access each and every one
of the shows you enjoy while travelling. if you are sitting in an airfield waiting for
your flight, you can access your desired shows and news sites from any continent.
This is a benefit because your device and its IP address otherwise would not allow
you to access programming outside of a specific geographic region.
ITwin Connect enables you to choose from locations in the United States, Europe
or the Asia Pacific. This means you can grab up on your beloved shows and news
while sitting in an airport waiting for your flight since iTwin directs the traffic
through their dedicated servers in these locations.

The concept of digital twin remains beneficial in many ways. It eliminates the use
of symbols or numbers extracted from the visual information for conceptualization.
Instead of looking at the factory report, the digital twin simulations let users
directly see the progress as the product moves along the manufacturing stages.

7
Comparing the digital and physical product becomes easier as the twin model
tracks the progress of the physical product development directly, and clearly
indicates deviations from the idealized processes.

The most powerful benefit of digital twin however is in collaboration. Tracking


the state of the physical product under the development through a replicated
digital model lets individuals monitor the performance from anywhere.

8
CHAPTER-3
ITWIN SECURITY AND APPLICATIONS

3.1 ITWIN SECURITY


3.1.1 Hardware grade security
When two parts of iTwin connect are attached together and inserted into a
computer, a arbitrary 256-bit cryptographic key is generated on-board the iTwin
device. This cryptographic key is shared among the two halves of the iTwin
device using the particular iTwin connector. The cryptographic key never leaves
the device. All data and information transferred by means of the two halves of
iTwin is encrypted using this cryptographic key. The user can ‘join up’ the device
to generate the keys anytime and any number of times. The keys are saved only
inside the device and not known to any other entity.
3.1.2 Two factor authentication
ITwin device provides 2-factor authentication for advanced security. Access to
your data is provided based on two different factors: Something you have – your
physical iTwin device. Something you be familiar with –a password which you
have to enter before the iTwin device can be used. Setting an iTwin device
password is optional however we suggest that you set the optional password
throughout device initialization to protect your data and network in the event that
you lose the device. The password set for your iTwin is stored only on the two
halves of your iTwin and nowhere else.
3.1.3 Remote disable
In the one half of the iTwin is lost; connection between the two halves of the
device can be disconnected using the Remote Disable Feature. This is done by
entering a unique disable code in the iTwin Disable Web Centre. The connection
between the two halves of iTwin will be disabled within 90 seconds and after that,
it is impossible to gain access to your data via the lost device even if somebody
finds it.
3.1.4 End-to-end encryption

9
The shared cryptographic key stored in the two parts of the iTwin device are used
to produce session keys which protect all information transmitted over the Internet
using industrial strength AES-256 bit encryption.
3.1.5 Twin trust authentication
Every iTwin half has given a unique device ID and an linked device
authentication key, adapted during manufacturing. Every iTwin device also carries
certified public certificates of Twin Trust servers, inserted during manufacturing.
Before allowing any data transfer, every iTwin is authenticated by iTwin's Twin
Trust servers. After authenticating with Twin Trust, two halves of iTwin
commonly authenticate each other using their previously shared AES 256 bit
crypto key. All communication between iTwin and Twin Trust server is secured
using HTTPS protocol.

3.2 APPLICATIONS OF ITWINS


Because it’s possible to make digital twins of individual components, complete
assets, full systems and entire processes, the technology has broad application in a
variety of areas.
3.2.1 Testing New Systems Prior to Manufacture
Companies can use digital twins to create and test systems, equipment ideas and
service models before investing in building or implementation. If a model proves
effective, its digital twin could theoretically be linked to the physical creation for
realtime monitoring.
3.2.2 Improving Efficiency and Productivity
In a 2017 prediction regarding the benefits of digital twins, Forbes suggested
using the technology could improve the speed of critical processes by 30 percent.
According to Gartner, industrial companies could see a 10 percent improvement in
effectiveness. The widespread availability of and diverse use cases for digital
twins gives businesses in nearly all industries a better understanding of where
processes can be streamlined and improved, thus helping to minimize downtime
through the practice of predictive maintenance.
3.2.3 Managing Assets in Real Time

10
Using digital twins to monitor daily operations and streamline manufacturing
reduces unnecessary wear and tear on machinery and alerts business owners to
potential money-saving changes, such as making adjustments in fuel use. Faster
maintenance and repair allows companies to maintain a competitive edge by
improving overall output.
3.2.4 Understanding Data to Provide Better Service
Digital twins also have customer-facing applications, including remote
troubleshooting. Using virtual models, technicians can conduct diagnostic testing
from anywhere and walk consumers through the proper steps for repair instead of
blindly relying on default protocols. Information gathered from these sessions
provides valuable insights for future product planning and development.
3.2.5 Facing New Security Challenges
The faster a new type of technology spreads, the less attention tends to be paid to
security at the outset. This forces companies to scramble to put out metaphorical
fires when vulnerabilities are exploited, leading to the loss of time and profits.

Because digital twins are based in the cloud and don’t require physical
infrastructure, the associated security risks are somewhat lower than with other
types of systems. However, the massive amounts of data being collected and
utilized is drawn from numerous endpoints, each of which represents a potential
area of weakness. It’s estimated 75 percent of digital twins will be integrated with
at least five endpoints by 2023, and a time is coming when visualizing complex
systems may require the linking of multiple digital twins.
Every time a new connection is made and more data flows between devices and
the cloud, the potential risk for compromise increases. Therefore, businesses
considering digital twin technology must be careful not to rush into adoption
without assessing and updating current security protocols.
Areas of greatest importance include:
• Data encryption
• Access privileges, including clear definition of user roles
• Principle of lease privilege
• Addressing known device vulnerabilities
• Routine security audits

11
CHAPTER-4
WORKING AND AUTHENTICATION PROCESS

4.1 WORKING OF ITWIN


The iTwin Connect is a device similar to a USB flash drive but, is designed with
two USB connections. The iTwin device is very dense and it establishes a secure
connection between two computers or a secure connection between one computer
and the iTwin server. When you connect theiTwin Connect device to the main
computer in your home or at office, the software is automatically installed
configure the computer for remote connection.

Fig. 4.1 Working of ITwin

When the device is disconnected from the main computer, you have to separate
the two parts of the USB ports which are separated in two separate USB devices.
The two separate devices are very dense at less than two inches. Small size makes
it convenient and easy to carry with you all the time. When you connect the
second half to your laptop while travelling on the road, it will routinely install

12
itself without any user interference. In addition, you can set up a special password
that disables the device if you are going to lose it. This ensures you can lock down
your files to avoid access by an illegal user.

4.2 AUTHENTICATION PROCESS


Before allowing any data transfer every single i-Twin is validated by i-Twins
Twin Trust Services.

Total communications among the i-Twin are secured using industry strength
HTTPs (RSA1024 bits, 128bits RC4) protocol. After effective validation by Twin
Trust assist i-Twin to determine its other half.

After confirmation with Twin Trust, two splits of i-Twin mutually authenticates
each other using pre-shared AES 256 bit crypto key.If key is set, then
authentication is performed on both i-Twins beforehand the data transfer is started.
4.2.1 AES ENCRYPTION
AES(Advanced Encryption Standard) is a identification for the encryption of
electronic data established by the U.S National Institute Of Standards And
Technology(NIST) in 2001. AES has been adopted by U.S government and it
replaces the Data Encryption Standard(DES), which was published in 1977.The
algorithm reported by AES is a symmetric-key algorithm, meaning the same key
is used for encrypting and decrypting the data.
A. Description of the Cryptograph:
1. AES is based on a design principle known as a substitution-permutation
network, combination of both substitution and permutation, and is quick in both
software and hardware.
2. AES is a variant of encryption family which has fixed block size of 128,192, or
256-bits.
3. AES operates on a 4*4 matrix of bytes, termed as ‘state’.
4. Key size used for an AES cryptograph specifies the number of repetitions of
transformation rounds that are required to convert input in plain text into output
in cryptograph text.

13
5. 10 cycles of repetitions for 128-bit keys, 12 cycles of repetitions for 192-bit
keys, 14 cycles of repetition for 256-bit keys.
B. Security:
1. The design and strength of all key lengths of the AES algorithm(i.e, 128,192
and 256) are sufficient to protect categorized information up to the confidential
level.
2. Highly confidential information requires use of either the 192 or 256 key
lengths.
3. The implementation of AES in commodity deliberates to safeguard national
security systems and/or information must be evaluated and certified by NSA prior
to their accession and use.
C. Performance:
1. High speed and low RAM requirements were benchmark of the AES election
process.Thus AES executes well on a wide variety of hardware, from 8-bit smart
cards to high performance computers.

14
CHAPTER-5
CHARACTERISTICS OF ITWIN

5.1 REMOTE DESKTOP


This feature enables you to observe the desktop of the main computer an allows
you to manage the device. This is very useful medium for managing your
computer from a remote position and it can also be used to offer tech support to
somebody who experiencing computer problems without actually being seated in
front of the PC.
By making use of isolated Desktop you can also start Windows Remote Desktop.
This can be done with a single click which provides you the access to multiple
different applications as well as the data enclosed in them on the remote PC.
5.2 TELEPORT ME :
The Teleport Me feature is the secret browsing tool that enables you to surf the
Internet lacking any limitations. Any websites that you open or any information
that you transmit passes through the protected Virtual Private Network channel
and uses the similar Internet connection that your house or workplace PC uses.
If the main workstation cannot be left operating for some reason, Teleport Me is
intended to connect to the iTwin dedicated network services to provide you a
private connection. The company maintains dedicated servers all over the Europe,
Asia Pacific and the United States.
The Teleport Me feature is a helpful tool, mainly if you are browsing the Internet
on hotel or other types of public wireless networks where security is an important
issue. Teleport Me takes care that your private information is protected from
snooping eyes. It also ensures that no one is tracking your browsing movement.
There are no browsing limits which denote that you can browse your social media
accounts, can watch programs, and connect in any other activity you usually do
online.
5.3 OFFICE AND HOME NETWORK ACCESS :
You can access approximately everything that is connected to your office or home
network using the iTwin connect device. This includes devices such as drives or
network applications on an office network, or devices like media servers, cameras,
and televisions on your home server. For accessing the network it does not require

15
any set of connections and arrangement. It automatically makes a secure VPN to
your network.
5.4 SECURE AES 256-BIT ENCRYPTION :
Hardware grade security is provided in iTwin. AES (Advanced Encryption
Standard) 256-bit encryption is a security technology adopted by the US
government to defend top secret classified information. When every part of the
iTwin Connect device is paired with one another, a unique encryption key is
generated for each session to make sure all information is protected prior to being
transmitted over the Internet.
You can also configure the two-factor authentication integrated with the iTwin
Connect device. This enables you to setup an optional second password on the one
half of the USB device which you bring with you. If you come about to lose this
half of iTwin device, without using the second password it cannot be accessed.
5.5 NO SUBSCRIPTION OR CONTRACT PROMISE :
While using iTwin Connect, there is no subscription necessity or contract
commitment, you just have to pay a one-time cost of $130 for lifetime access to
the iTwin device. You can also own the device and be able to use it in several
ways you like. You do not have to be a mobile expert. You can also use iTwin
Connect for personal use as well as to help family members that frequently call
you for help with a computer problem. If they have one part of the iTwin device,
you can access and managed the Desktop and repair the problem.

16
CHAPTER-6
ADVANTAGES AND DISADVANTAGES

6.1 ADVANTAGES
1. Secure File Sharing: iTwin often provides a secure means of sharing files
between devices, ensuring that data is encrypted during transfer.

2. Remote Access: Users can remotely access their files and devices from
anywhere with an internet connection, which can enhance flexibility and
productivity.

3. Plug-and-Play Setup: Many iTwin devices are designed for ease of use,
featuring a plug-and-play setup that requires minimal technical expertise.

4. No Cloud Storage: Unlike some other file-sharing solutions, iTwin may not rely
on storing data in the cloud. This can be an advantage for users who prioritize
keeping their data localized and under their direct control.

5. Bi-Directional Sync: Changes made on one device are often automatically


synchronized with the paired device, ensuring that both copies of the data are up-
to-date.

6.2 DISADVANTAGES
1. Dependency on Internet Connectivity: Remote access solutions, including
iTwin, rely on a stable internet connection. If the connection is slow or
unavailable, accessing files may be challenging.

2. Initial Cost: Depending on the specific product, iTwin devices may have an
upfront cost. Users need to weigh this against the benefits they expect to gain.

17
3. Limited Storage: If iTwin doesn't use cloud storage, the local storage capacity
of the devices may be a limiting factor, particularly for users with large amounts
of data.

4. Security Concerns: While iTwin aims to provide secure file sharing, any remote
access solution poses potential security risks. Users must ensure that they follow
best practices for securing their devices and data.

5. Compatibility Issues: Some iTwin solutions may have limitations regarding


compatibility with certain operating systems or devices. Users should confirm that
iTwin works seamlessly with their specific setup.

6. Device Availability: Depending on your location, iTwin devices may not be


readily available or may have limited distribution, affecting accessibility.

18
CHAPTER-7
ITWIN COMPONENTS

7.1 USB CONNECTOR


USB connector is to plug the device into the USB port of a computer.

7.2 ITwin CONNECTOR


The iTwin connector is used to connect the two halves of the iTwin device to form
a physical pair.

7.3 ACTIVITY INDICATOR


NO LIGHT : Device is not functional or iTwin is not installed on your computer
RED LIGHT : error CONSTANT
BLUE LIGHT : Device is active and functioning

Fig 7.1 ITwin components

19
CONCLUSIONS

Without a hesitation, iTwin Connect represents a unique solution for providing


secure access to your files and information from a remote location, credit to the
AES 256- bit encryption technology. The iTwin connect device performs like to
Peer to Peer access excluding the data is only being shared between you and your
main computer. If you are travelling with a Windows device and your main
computer is a Mac, you can still access your files since iTwin Connect will work
with both systems. The iTwin is a unbelievable solution for the house user who
desires to access and change their files remotely and securely. The iTwin bypasses
the virtual world of cloud services to turn your physical storage into its own
networking solution. The iTwin is simple to use and inexpensively solves the
Drop box limitations. For peoples who want to maintain files up-to-date among
two computers the iTwin is for them.

20
REFERENCES

[1] Vernik, Gil, et al. “Data On-boarding in Federated Storage Clouds.”


Proceedings of the 2013 IEEE Sixth International Conference on Cloud
Computing. IEEE Computer Society, 2013.
[2] Michael F. Lewis (March 29, 2013). “Move over AI Gore, Kurt Vonnegut
invented the internet”.
[3] D.Tipper; S. Ramaswamy; T. Dahlberg Wireless Communications and
Networking Conference, 1999 IEEE, 1999.
[4] Ankush Sharma, Priti Sharma. “Data of working technique iTwin for high
speed data transfer, from point to point on internet.” Third International
Conference on Resent Trends in Engineering Science and Management, 2016.
[5] Roberto S. Silva Filho, Christof J. Budnik, Willam M. Hasling, “Supporting
Concern-Based Regression Testing and Prioritization in a Model-Driven
Environment”, 34th Annual IEEE Computer Software and Applications
Conference Workshops, 2010

21

You might also like