The aim is to support companies in analyzing their large-scale transactions, especially for strategic workloads, and to protect them from growing threats to cryptographic systems 05 Apr 2022 Veronica Balocco
IBM officially launches IBM z16, the next generation system with an AI accelerator integrated into the chip to offer optimized inference by reducing latency. This innovation was designed to allow companies to analyze their transactions in real time and on a large scale, especially for strategic workloads, such as credit card, health care and financial transactions. Building on its historical leadership in the field of security, IBM z16 is also specifically designed to help companies protect themselves from future threats that could lead to the decoding of today's encryption technologies. Index of topics • Real-time AI for businesses • Data protection with the first quantum-safe system Real-time AI for businesses Financial institutions around the world struggle every day with the impacts of fraudulent activities on their revenue and interactions with consumers. According to the new study by IBM and Morning consult "2022 IBM Global financial fraud impact report", credit card scams are the most common type of fraud among consumers in the seven countries involved in the investigation. Furthermore, respondents said they believe banks and payment networks should be more responsible in preventing fraud. However, due to latency issues, it has not been possible to run real-time deep learning models at scale so far, which means that fraud detection models only run on less than 10% of high-volume transactions - therefore, a significant amount of fraud goes unnoticed.
The IBM Z16 is the only system that brings together AI inferences, via its IBM Telum processor, with the extremely secure and reliable processing of high-volume transactions that IBM is known for. For the first time, banking institutions will be able to perform fraud analysis while large-scale transactions are underway: The IBM Z16 can process 300 billion inference requests per day with only a millisecond of latency. For end users, this means reducing the time and effort required to manage fraudulent transactions on their credit cards. For merchants and card providers, the result could be a reduction in lost revenue, as consumers could avoid the risk of false rejections and would not need to go to safer institutions for future transactions. Data protection with the first quantum-safe system In a hybrid cloud environment, which includes on-premise and public cloud resources, it's critical to protect yourself against today's threats and take a stand against cybercriminals who might steal your data now to decrypt it later. Based on IBM technologies such as pervasive encryption and confidential computing, IBM Z16 helps take a step forward in cyber resilience, protecting data against future threats that may evolve with quantum computing advances. As the industry's first quantum-safe system, IBM z16 supports lattice-based cryptography, an approach to building cryptographic primitives that helps protect data and systems from current and future threats. With IBM z16's quantum-safe encryption, today's business applications and data will be ready for the future. With a secure boot process (whereby malicious actors cannot inject malware into the boot process to take control of the system during boot), IBM z16 customers can strengthen their cyber resiliency and the ability to maintain control of the system. their system. In addition, the Hardware security module (Hsm) Crypto express 8S (CEX8S) will offer customers both classical and quantum-safe cryptography technology to help address use cases where management is required: confidentiality of information, integrity and otherwise. repudiation. IBM z16 secure boot and quantum-safe encryption can help enterprises address future quantum-computing threats, including "harvest now, decrypt later" attacks that can lead to extortion, loss of intellectual property and disclosure of other sensitive data.
COMMENT: They tell you that there may be quantum cryptography, fake. The system is based on two statements. The first is that there are no cryptographic systems that resist quantum computers, which we contest because our CRIPTEOS 3001 is actually resistant. The second is that we continue to use public and private key algorithms. So it is stated that with quantum computers the computation of prime numbers linking the public key and the private key, hitherto impossible to do with traditional computers, is solved. Quantum Key Distribution, if it works, solves this problem and allows you to transmit the private key. Key which, as already stated, with known cryptographic systems, is quietly violated by the quantum computer. In addition, there remains the problem of false certificates of those who issue public keys, a trick that allows you to get hold of private keys. Our system has two keys of 128 kilobytes and therefore it is inviolable and fast, besides all it can be customized with a third key to differentiate the algorithms of the various customers. And if they want to transmit our keys with the quantum key distribution system, fine, but avoid saying that there are no cryptographic systems that resist the brute force attacks of quantum computers.artificial intelligence