The Patented design to secure ANY enterprise, across ANY business ecosystem
SEED Protocol distributes control across three core components to generate and manage virtual vaults. De-couples sensitive data from applications, delivering robust cyber resilience
Generates a union identity by mapping users and data subjects from multiple applications. Creates an authoritative source of data, encrypted once and securely shared across organizational boundaries and applications. to deliver unparalled data interity, privacy, and security.
Create an insurmountable cracking hurdle using individualized encryption
Create an insurmountable cracking hurdle using individualized encryption
Require independent authentication to retrieve the protected data from the Cloud Lockbox
Require independent authentication to retrieve the protected data from the Cloud Lockbox
Securely share one authoritative source of data across applications and organizations
Securely share one authoritative source of data across applications and organizations
Preserve anonymity while enabling two-way communications
Preserve anonymity while enabling two-way communications
Guarantee authenticity and integrity with our high-performance blockchain
Guarantee authenticity and integrity with our high-performance blockchain
Crowdsource breach detection to users/subjects, quickly detecting compromises
Crowdsource breach detection to users/subjects, quickly detecting compromises
SEED protocol distributes control across three core components to generat and mange virtual vaults de-coupling sensitve data from applications. Split control delivers tremendous cyber resistance and individualized encryption creates an insurmountable cracking hurdle
Performs all crypto functions. Generates and manages unique keys per subject-application pairing. Responds only to authorized applications
Serves as meta directory of users, subjects and permissions. Requires independent authentication from a separate device.
Releases an encrypted file only after BOTH are authenticated API from the Key Master and approval by the Registry.
De-couples sensitive data from applications, delivering robust cyber resilience. Generates a union identity by mapping users and data subjects from multiple applications.
Access to the SEED-protected data requires authentication to application as well as authentication to the data. Provides second factor authentication services to applications. Crowdsources intrusion detection by alerting users and, optionally, data subjects to speed detection of breaches.
Creates an authoritative source of data, encrypted once and securely shared across organizational boundaries and applications Deploys high performance indelible distributed ledger based on our high performance blockchain, providing restricted related-party chains or public chains Delivers ironclad identity masking that retains two-way mapping, revolutionizing applications such as medical research
The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections. Originally filed under US Provisional Application 61/553,883 (Nov. 2011)
Exported according to U.S. Department of Commerce regulations under 5D002 classification as a “network infrastructure” item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.
If you have any questions about SEED Protocol and how it can benefit your company please reach out