Please note that the details of this Challenge are no longer open. This challenge is under evaluation and is no longer accepting new submissions. You can:
Challenge <p> Secure Remote Desktop Access to Isolated Networks</p>

Secure Remote Desktop Access to Isolated Networks

Award:  $25,000 USD
STATUS: Under Eval
Active Solvers: 110
Posted: Sep 13 2017
Challenge ID: 9933785
 
Team Project Rooms are available on this Challenge. Team Share Challenge Share
Abstract

A general principle of data protection in secure environments is the creation of isolated networks. These networks implement a security constraint that protects the information in the network from leaking to unwanted or unapproved destinations. This isolation, however, does not allow the flow of information to travel between the isolated networks and surrounding networks and limits productivity and the usefulness of the information. CTTSO, the Seeker for this Challenge, is soliciting ideas on how to create a comprehensive work experience on one computer that will provide a remote desktop like viewing experience across multiple isolated networks without allowing the protected data or information to bleed over to the user’s native network. Solutions must allow for complete visibility into the protocols and code that comprise the underlying solution. 

This is an Ideation Challenge with a guaranteed award for at least one submitted solution.

Overview

The use of isolated networks is a general principle of data protection in secure environments. Security constraints on these networks prevent the flow of information between the network and surrounding networks and prevents the protected information from leaking to unwanted or unauthorized destinations. The main advantage of isolating a network is the layer of protection it provides against online attacks. Unfortunately, the same measures that protect an isolated network make it difficult to use the information on the network by forcing users to use solutions such as multiple computers in conjunction with KVM (keyboard, video, mouse) switches when working with other networks. 

CTTSO, the Seeker for this Challenge, is soliciting ideas on how to create a comprehensive work experience on one computer that will provide a remote desktop like viewing experience across multiple isolated networks without allowing the protected data or information to bleed over to the user’s native network. Solutions must allow for complete visibility into the protocols and code that comprise the underlying solution. Several commercial solutions are known but these use proprietary protocols that are closed source and therefore there is no way to verify the information being transferred between the two environments. 

This is an Ideation Challenge, which has the following unique features:

  • There is a guaranteed award.  The award(s) will be paid to the best submission(s) as solely determined by the Seeker. The total payout will be $25,000, with at least one award being no smaller than $5,000 and no award being smaller than $1,000. 
  • The Solvers are not required to transfer exclusive intellectual property rights to the Seeker.  Rather, by submitting a proposal, the Solver grants to the Seeker a royalty-free, perpetual, and non-exclusive license to use any information included in this proposal, including for promotional purposes.

Submissions to this Challenge must be received by 11:59 PM (US Eastern Time) on October 15, 2017. 

Late submissions will not be considered.

After the Challenge deadline, the Seeker will complete the review process and make a decision with regards to the Winning Solution(s). All Solvers that submit a proposal will be notified on the status of their submissions; however, no detailed evaluation of individual submissions will be provided

ABOUT THE SEEKER

The Combating Terrorism Technical Support Office (CTTSO) provides a forum for interagency and international users to discuss mission requirements to combat terrorism, prioritizes those requirements, funds and manages solutions, and delivers capabilities.  The CTTSO accomplishes these objectives through rapid prototyping of novel solutions developed and field-tested before the traditional acquisition systems are fully engaged.  This low-risk approach encourages interdepartmental and interagency collaboration, thereby reducing duplication, eliminating capability gaps, and stretching development dollars.

What is InnoCentive?
InnoCentive is the global innovation marketplace where creative minds solve some of the world's most important problems for cash awards up to $1 million. Commercial, governmental and humanitarian organizations engage with InnoCentive to solve problems that can impact humankind in areas ranging from the environment to medical advancements.

What is an InnoCentive Ideation™ Challenge?

An InnoCentive Ideation™ Challenge is a broad question formulated to obtain access to new ideas, similar to a global brainstorm for producing a breakthrough idea or market survey which may include ideas for a new product line, a new commercial application for a current product, or even a viral marketing idea to recruit new customers. Ideation™ Challenge submissions are typically about two written pages, and Seekers receive a non-exclusive, perpetual license to use all submissions.

In an Ideation™ Challenge, Solvers may:

  • Submit ideas of their own
  • Submit third party information that they have the right to use and further the authority to convey that right and the right to use and develop derivative works to Seekers
  • Submit information considered in the public domain without any limitations on use

Solvers should not reveal any confidential information in their submissions. Often the Ideation™ Challenge will be followed by one or more of the other three Challenge types to further develop the ideas and gain Intellectual Property protection when the concept has been well-defined.

Share This Challenge
InnoCentive Trust Partners