Data Integrity, Privacy, and Security for your valuable information

The Patented design to secure ANY enterprise, across ANY business ecosystem

The Secure Exchange of Encrypted Data

What is SEED Protocol?

SEED Protocol distributes control across three core components to generate and manage virtual vaults. De-couples sensitive data from applications, delivering robust cyber resilience
Generates a union identity by mapping users and data subjects from multiple applications. Creates an authoritative source of data, encrypted once and securely shared across organizational boundaries and applications. to deliver unparalled data interity, privacy, and security.

Encrypt

Create an insurmountable cracking hurdle using individualized encryption

Encrypt

Create an insurmountable cracking hurdle using individualized encryption

Verify

Require independent authentication to retrieve the protected data from the Cloud Lockbox

Verify

Require independent authentication to retrieve the protected data from the Cloud Lockbox

Unify

Securely share one authoritative source of data across applications and organizations

Unify

Securely share one authoritative source of data across applications and organizations

Mask

Preserve anonymity while enabling two-way communications

Mask

Preserve anonymity while enabling two-way communications

Ledger

Guarantee authenticity and integrity with our high-performance blockchain

Ledger

Guarantee authenticity and integrity with our high-performance blockchain

Watch

Crowdsource breach detection to users/subjects, quickly detecting compromises

Watch

Crowdsource breach detection to users/subjects, quickly detecting compromises

The Unique Core of the Invention

SEED protocol distributes control across three core components to generat and mange virtual vaults de-coupling sensitve data from applications. Split control delivers tremendous cyber resistance and individualized encryption creates an insurmountable cracking hurdle

Key Master

Performs all crypto functions. Generates and manages unique keys per subject-application pairing. Responds only to authorized applications

Registry

Serves as meta directory of users, subjects and permissions. Requires independent authentication from a separate device.

Cloud Lockbox

Releases an encrypted file only after BOTH are authenticated API from the Key Master and approval by the Registry.

Secures Any Enterprise

De-couples sensitive data from applications, delivering robust cyber resilience. Generates a union identity by mapping users and data subjects from multiple applications.
Access to the SEED-protected data requires authentication to application as well as authentication to the data. Provides second factor authentication services to applications. Crowdsources intrusion detection by alerting users and, optionally, data subjects to speed detection of breaches.

Extends Across Any Business Ecosystem

Creates an authoritative source of data, encrypted once and securely shared across organizational boundaries and applications Deploys high performance indelible distributed ledger based on our high performance blockchain, providing restricted related-party chains or public chains Delivers ironclad identity masking that retains two-way mapping, revolutionizing applications such as medical research

Healthcare Example

patient bc1

HIPAA HITECH COMPLIANT

GDPR GDA COMPLIANT

NIST SOC-2 COMPLIANT

Robust Intellectual Property

The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections. Originally filed under US Provisional Application 61/553,883 (Nov. 2011)

US Patent No. 9,378,380

-Granted June 2016-

(English)

US Patent No. 9,390,228

-Granted July 2016

(English)

US Patent No. 9.973,484

-Granted May 2018-

(English)

US Patent No. 10,798,373

-Granted Sept. 2020-

(English)

US Patent No. 11,290,261

-Granted March 2022

(English)

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a “network infrastructure” item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.

Contact Us

If you have any questions about SEED Protocol and how it can benefit your company please reach out