The document discusses Secure Channels' patented encryption technologies for securing data, including PKMS2 and SPHERE. PKMS2 encrypts documents using multiple encryption keys and segments, making the encrypted data difficult for hackers to decrypt without all the required information. SPHERE provides similarly strong encryption across various platforms using customized encryption scripts. Secure Channels believes these technologies can effectively protect customer data from theft or hacking by rendering encrypted data unusable without the proper encryption methods and keys.
2. Data Breaches is the Increasing Threat
Identity Theft Resource Center
2014 Breach List: Breaches: 480 Exposed: 17,508,452
Report Date: 8/19/2014
Source: http://www.idtheftcenter.org/
3. Data ENCRYPTION is the answer
Secure Channels Patented Encryption will just do that.
Secure Channels patented encryption
works even if a private cloud is hacked,
because the only thing a hacker can
see is useless bits and bytes without
the set of encryption keys, pattern
keys, scripts, and source code required
to make any sense of it.
6. PKMS2 Introduction
• PKMS2 is a radically new take on standard FIPS certified encryption
practices.
• PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or
Standard)
• One of the inherent difficulties with encryption is the use of a single
key or protocol to encrypt data. PKMS2 solves that problem.
Secure Channels Inc Patent Technology
PKMS2
7. PKMS2 Solution
• PKMS2 breaks a document into segments and encrypts each segment
individually.
• The protocol/password used per segment is based on a pattern key and can
be as simple or as complex as necessary. This pattern is user-derived and
thus can be as unique as the user wants.
• Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said
keys then the document in encrypted in a round robin fashion rolling
through the pattern.
• The document can be [optionally] initially encrypted as a whole resource
and then segmented and then the resultant encrypted segments can also
be encrypted as a while resource.
Secure Channels Inc Patent Technology
PKMS2
8. FIPS Certification
• Since PKMS2 only uses FIPS certified third party encryption libraries
then the resultant encrypted document, by definition, is also FIPS
certified.
• The segment size is based on the key bit strength formula (s/8 – 11)
bytes. The segments encrypted with passwords have the length
embedded in the resource.
Secure Channels Inc Patent Technology
PKMS2
9. Secure Channels Inc Patent Technology
PKMS2
Baked Shrimp
Melt a stick of butter in the
pan. Slice one lemon and layer
it on top of the butter. Put
down fresh shrimp, then
sprinkle one pack of dried
Italian seasoning. Put in the
oven and bake at 350 for 15
min. Best Shrimp you will EVER
taste:)
Ordinary Document
Apply initial
encryption pattern
with key 5 (yellow)
Initial optional encryption
Change angle to see layers
Segment 1 with Process 1
Encrypt
segment
#1 with
key 2 (red)
Encrypt
segment #3
with key 8 (blue)
Segment 3 with Process 3
Encrypt
segment #4
with key 7 (purple)
Segment 4 with Process 4
Encrypt
segment #5
with key 2 (red)
Segment 5 with Process 1
Encrypt
segment #6
with key 6
(green)
Segment 6 with Process 2
Encrypt
segment #7
with key 8 (blue)
Segment 7 with Process 3
Encrypt
segment #2
with key 6
(green)
Segment 2 with Process 2
Apply
optional
final
encryption
with key 4
PKMS2
applied – for
all practical
purposes, the
document is
immune to
hacker
decryption
Final Optional Encryption
Encrypt
segment #8
with key 7
(purple)
Segment 8 with Process 4
11. SPHERE Defined
• SPHERE stands for SecureChannels Process Hardened Encryption and
Resource Enveloping. That might seem to be quite the verbiage but it
is very specific and descriptive. Let’s tear it apart and examine each
piece.
Secure Channels Inc Technology
Sphere
12. Process Hardened
One of the driving forces was the PKMS21 (Pattern Key, Multi Strength,
Multi Segment) process being patented. Once this patent was done
then all of a sudden SecureChannels had in its grasp the means it was
waiting for: the ability and means to secure data via encryption that
would render the data, for all intents and purposes, unbreakable.
Secure Channels Inc Technology
Sphere
13. Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
14. Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
15. Resource Enveloping
• What is needed to resolve a number of security issues is not to
physically surround the data center but to digitally surround the data.
SPHERE’s design is one of wrapping the data in such a way as to make
the data utterly useless without full knowledge of a number of
factors. In the past digital data security has relied solely on the
encryption patterns and key. If the pattern is known and the key is
known then the security of the data is zero. Where SPHERE is
different is that it wraps layered processes around the data in such a
way that it takes
Secure Channels Inc Technology
Sphere
16. Resource Enveloping cont.
• - knowledge of the manner in which the layers were applied;
• - knowledge of the standard and proprietary encryption patterns;
• - knowledge of all of the keys used;
• - knowledge of the pattern by which the keys were applied;
• - knowledge of the customer defined ‘uniqueness’ of the processing
• The data resource is wrapped or enveloped in such a way that it
creates an incalculable combination of possibilities to decrypt and
thus renders the data virtually unbreakable.
Secure Channels Inc Technology
Sphere
17. Resource Enveloping cont.
Due to the flexibility of SPHERE an entire scripting language was developed
to drive the encryption process. These scripts can be completely unique per
customer. Each encryption function is fully standalone and thus each script
can be uniquely created in almost an unlimited pattern. One customer might
encrypt their data with a script that specifies functions A,B,C whereas
another customer might specify the same functions but in B,A,C order. This
flexibility adds immeasurable depth to the security of the data. One
customer might use pictures for passwords whilst another might use
Japanese phrases. Since SPHERE has no limit to the number of functions;
number of keys/passwords; no limit to the size of said keys/passwords then
the ability to encrypt data to an unbreakable level is strictly under customer
control.
Secure Channels Inc Technology
Sphere
18. SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that
it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since SPHERE is
about enabling the customer to secure and encrypt THEIR data THEIR way
and under THEIR control.
Conclusion
• The question was asked earlier “Is the data worth protecting and if so then
how can it be done?” SecureChannels has developed SPHERE such that the
answer to the question is a resounding yes. As has been seen in the news
we can assume data will be stolen but by applying SPHERE to the data the
data itself becomes meaningless outside of a SPHERE enabled system.
Secure Channels Inc Technology
Sphere
19. SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds
that it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since
SPHERE is about enabling the customer to secure and encrypt THEIR
data THEIR way and under THEIR control.
Secure Channels Inc Technology
Sphere
20. Conclusion
• The question was asked earlier “Is the data worth protecting and if so
then how can it be done?” Secure Channels has developed patented
encryption PKMS2 and the answer to the question is a resounding
yes. As has been seen in the news we can assume data will be stolen
but by applying our patent encryption to the data the data itself
becomes meaningless outside of the enabled system.
Secure Channels Inc Technology
21. Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014
http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html
Black Hat Hackers Fail to Crack Encryption Tech
http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech
Secure Channels Inc Technology
Press release