SlideShare a Scribd company logo
1 of 22
Unmatched Security for the Digital Ecosystem
Data Breaches is the Increasing Threat
Identity Theft Resource Center
2014 Breach List: Breaches: 480 Exposed: 17,508,452
Report Date: 8/19/2014
Source: http://www.idtheftcenter.org/
Data ENCRYPTION is the answer
Secure Channels Patented Encryption will just do that.
Secure Channels patented encryption
works even if a private cloud is hacked,
because the only thing a hacker can
see is useless bits and bytes without
the set of encryption keys, pattern
keys, scripts, and source code required
to make any sense of it.
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi
Standard
SPHERE
SecureChannels Process Hardened Encry
ption Resource Envelopment
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi
Standard
PKMS2 Introduction
• PKMS2 is a radically new take on standard FIPS certified encryption
practices.
• PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or
Standard)
• One of the inherent difficulties with encryption is the use of a single
key or protocol to encrypt data. PKMS2 solves that problem.
Secure Channels Inc Patent Technology
PKMS2
PKMS2 Solution
• PKMS2 breaks a document into segments and encrypts each segment
individually.
• The protocol/password used per segment is based on a pattern key and can
be as simple or as complex as necessary. This pattern is user-derived and
thus can be as unique as the user wants.
• Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said
keys then the document in encrypted in a round robin fashion rolling
through the pattern.
• The document can be [optionally] initially encrypted as a whole resource
and then segmented and then the resultant encrypted segments can also
be encrypted as a while resource.
Secure Channels Inc Patent Technology
PKMS2
FIPS Certification
• Since PKMS2 only uses FIPS certified third party encryption libraries
then the resultant encrypted document, by definition, is also FIPS
certified.
• The segment size is based on the key bit strength formula (s/8 – 11)
bytes. The segments encrypted with passwords have the length
embedded in the resource.
Secure Channels Inc Patent Technology
PKMS2
Secure Channels Inc Patent Technology
PKMS2
Baked Shrimp
Melt a stick of butter in the
pan. Slice one lemon and layer
it on top of the butter. Put
down fresh shrimp, then
sprinkle one pack of dried
Italian seasoning. Put in the
oven and bake at 350 for 15
min. Best Shrimp you will EVER
taste:)
Ordinary Document
Apply initial
encryption pattern
with key 5 (yellow)
Initial optional encryption
Change angle to see layers
Segment 1 with Process 1
Encrypt
segment
#1 with
key 2 (red)
Encrypt
segment #3
with key 8 (blue)
Segment 3 with Process 3
Encrypt
segment #4
with key 7 (purple)
Segment 4 with Process 4
Encrypt
segment #5
with key 2 (red)
Segment 5 with Process 1
Encrypt
segment #6
with key 6
(green)
Segment 6 with Process 2
Encrypt
segment #7
with key 8 (blue)
Segment 7 with Process 3
Encrypt
segment #2
with key 6
(green)
Segment 2 with Process 2
Apply
optional
final
encryption
with key 4
PKMS2
applied – for
all practical
purposes, the
document is
immune to
hacker
decryption
Final Optional Encryption
Encrypt
segment #8
with key 7
(purple)
Segment 8 with Process 4
Secure Channels Inc
TECHNOLOGY
SPHERE
SecureChannels Process Hardened Encry
ption Resource Envelopment
SPHERE Defined
• SPHERE stands for SecureChannels Process Hardened Encryption and
Resource Enveloping. That might seem to be quite the verbiage but it
is very specific and descriptive. Let’s tear it apart and examine each
piece.
Secure Channels Inc Technology
Sphere
Process Hardened
One of the driving forces was the PKMS21 (Pattern Key, Multi Strength,
Multi Segment) process being patented. Once this patent was done
then all of a sudden SecureChannels had in its grasp the means it was
waiting for: the ability and means to secure data via encryption that
would render the data, for all intents and purposes, unbreakable.
Secure Channels Inc Technology
Sphere
Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
Resource Enveloping
• What is needed to resolve a number of security issues is not to
physically surround the data center but to digitally surround the data.
SPHERE’s design is one of wrapping the data in such a way as to make
the data utterly useless without full knowledge of a number of
factors. In the past digital data security has relied solely on the
encryption patterns and key. If the pattern is known and the key is
known then the security of the data is zero. Where SPHERE is
different is that it wraps layered processes around the data in such a
way that it takes
Secure Channels Inc Technology
Sphere
Resource Enveloping cont.
• - knowledge of the manner in which the layers were applied;
• - knowledge of the standard and proprietary encryption patterns;
• - knowledge of all of the keys used;
• - knowledge of the pattern by which the keys were applied;
• - knowledge of the customer defined ‘uniqueness’ of the processing
• The data resource is wrapped or enveloped in such a way that it
creates an incalculable combination of possibilities to decrypt and
thus renders the data virtually unbreakable.
Secure Channels Inc Technology
Sphere
Resource Enveloping cont.
Due to the flexibility of SPHERE an entire scripting language was developed
to drive the encryption process. These scripts can be completely unique per
customer. Each encryption function is fully standalone and thus each script
can be uniquely created in almost an unlimited pattern. One customer might
encrypt their data with a script that specifies functions A,B,C whereas
another customer might specify the same functions but in B,A,C order. This
flexibility adds immeasurable depth to the security of the data. One
customer might use pictures for passwords whilst another might use
Japanese phrases. Since SPHERE has no limit to the number of functions;
number of keys/passwords; no limit to the size of said keys/passwords then
the ability to encrypt data to an unbreakable level is strictly under customer
control.
Secure Channels Inc Technology
Sphere
SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that
it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since SPHERE is
about enabling the customer to secure and encrypt THEIR data THEIR way
and under THEIR control.
Conclusion
• The question was asked earlier “Is the data worth protecting and if so then
how can it be done?” SecureChannels has developed SPHERE such that the
answer to the question is a resounding yes. As has been seen in the news
we can assume data will be stolen but by applying SPHERE to the data the
data itself becomes meaningless outside of a SPHERE enabled system.
Secure Channels Inc Technology
Sphere
SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds
that it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since
SPHERE is about enabling the customer to secure and encrypt THEIR
data THEIR way and under THEIR control.
Secure Channels Inc Technology
Sphere
Conclusion
• The question was asked earlier “Is the data worth protecting and if so
then how can it be done?” Secure Channels has developed patented
encryption PKMS2 and the answer to the question is a resounding
yes. As has been seen in the news we can assume data will be stolen
but by applying our patent encryption to the data the data itself
becomes meaningless outside of the enabled system.
Secure Channels Inc Technology
Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014
http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html
Black Hat Hackers Fail to Crack Encryption Tech
http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech
Secure Channels Inc Technology
Press release
Unmatched Security for the Digital Ecosystem

More Related Content

What's hot

Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduinoiruldaworld
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration EasyIntelePeer
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTWD Industries AG
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Ifthekharul Islam
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsBeMyApp
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksPriyanka Aash
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7Antony Law
 
Near field communication (NFC) in android
Near field communication (NFC) in androidNear field communication (NFC) in android
Near field communication (NFC) in androidMindfire Solutions
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenTWD Industries AG
 
Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking ReportSynack
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logicAlberto Rivai
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2nnlog2n
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!Priyanka Aash
 

What's hot (20)

Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduino
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
581 517-525
581 517-525581 517-525
581 517-525
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond Firewalls
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
Near field communication (NFC) in android
Near field communication (NFC) in androidNear field communication (NFC) in android
Near field communication (NFC) in android
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
 
Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking Report
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2n
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Ccna PrepCenter - IP Subnetting from Networkers
Ccna PrepCenter - IP Subnetting from NetworkersCcna PrepCenter - IP Subnetting from Networkers
Ccna PrepCenter - IP Subnetting from Networkers
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!
 

Similar to Secure Channels Presentation

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric keymdhar123
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extensionDESMOND YUEN
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS Gregory McNulty
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSGregory McNulty
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionLeMeniz Infotech
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 

Similar to Secure Channels Presentation (20)

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extension
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Matrix
MatrixMatrix
Matrix
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
How PUF Technology is Securing Io
How PUF Technology is Securing IoHow PUF Technology is Securing Io
How PUF Technology is Securing Io
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Secure Channels Presentation

  • 1. Unmatched Security for the Digital Ecosystem
  • 2. Data Breaches is the Increasing Threat Identity Theft Resource Center 2014 Breach List: Breaches: 480 Exposed: 17,508,452 Report Date: 8/19/2014 Source: http://www.idtheftcenter.org/
  • 3. Data ENCRYPTION is the answer Secure Channels Patented Encryption will just do that. Secure Channels patented encryption works even if a private cloud is hacked, because the only thing a hacker can see is useless bits and bytes without the set of encryption keys, pattern keys, scripts, and source code required to make any sense of it.
  • 4. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard SPHERE SecureChannels Process Hardened Encry ption Resource Envelopment
  • 5. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard
  • 6. PKMS2 Introduction • PKMS2 is a radically new take on standard FIPS certified encryption practices. • PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or Standard) • One of the inherent difficulties with encryption is the use of a single key or protocol to encrypt data. PKMS2 solves that problem. Secure Channels Inc Patent Technology PKMS2
  • 7. PKMS2 Solution • PKMS2 breaks a document into segments and encrypts each segment individually. • The protocol/password used per segment is based on a pattern key and can be as simple or as complex as necessary. This pattern is user-derived and thus can be as unique as the user wants. • Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said keys then the document in encrypted in a round robin fashion rolling through the pattern. • The document can be [optionally] initially encrypted as a whole resource and then segmented and then the resultant encrypted segments can also be encrypted as a while resource. Secure Channels Inc Patent Technology PKMS2
  • 8. FIPS Certification • Since PKMS2 only uses FIPS certified third party encryption libraries then the resultant encrypted document, by definition, is also FIPS certified. • The segment size is based on the key bit strength formula (s/8 – 11) bytes. The segments encrypted with passwords have the length embedded in the resource. Secure Channels Inc Patent Technology PKMS2
  • 9. Secure Channels Inc Patent Technology PKMS2 Baked Shrimp Melt a stick of butter in the pan. Slice one lemon and layer it on top of the butter. Put down fresh shrimp, then sprinkle one pack of dried Italian seasoning. Put in the oven and bake at 350 for 15 min. Best Shrimp you will EVER taste:) Ordinary Document Apply initial encryption pattern with key 5 (yellow) Initial optional encryption Change angle to see layers Segment 1 with Process 1 Encrypt segment #1 with key 2 (red) Encrypt segment #3 with key 8 (blue) Segment 3 with Process 3 Encrypt segment #4 with key 7 (purple) Segment 4 with Process 4 Encrypt segment #5 with key 2 (red) Segment 5 with Process 1 Encrypt segment #6 with key 6 (green) Segment 6 with Process 2 Encrypt segment #7 with key 8 (blue) Segment 7 with Process 3 Encrypt segment #2 with key 6 (green) Segment 2 with Process 2 Apply optional final encryption with key 4 PKMS2 applied – for all practical purposes, the document is immune to hacker decryption Final Optional Encryption Encrypt segment #8 with key 7 (purple) Segment 8 with Process 4
  • 10. Secure Channels Inc TECHNOLOGY SPHERE SecureChannels Process Hardened Encry ption Resource Envelopment
  • 11. SPHERE Defined • SPHERE stands for SecureChannels Process Hardened Encryption and Resource Enveloping. That might seem to be quite the verbiage but it is very specific and descriptive. Let’s tear it apart and examine each piece. Secure Channels Inc Technology Sphere
  • 12. Process Hardened One of the driving forces was the PKMS21 (Pattern Key, Multi Strength, Multi Segment) process being patented. Once this patent was done then all of a sudden SecureChannels had in its grasp the means it was waiting for: the ability and means to secure data via encryption that would render the data, for all intents and purposes, unbreakable. Secure Channels Inc Technology Sphere
  • 13. Process Hardened cont. So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms. Secure Channels Inc Technology Sphere
  • 14. Process Hardened cont. So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms. Secure Channels Inc Technology Sphere
  • 15. Resource Enveloping • What is needed to resolve a number of security issues is not to physically surround the data center but to digitally surround the data. SPHERE’s design is one of wrapping the data in such a way as to make the data utterly useless without full knowledge of a number of factors. In the past digital data security has relied solely on the encryption patterns and key. If the pattern is known and the key is known then the security of the data is zero. Where SPHERE is different is that it wraps layered processes around the data in such a way that it takes Secure Channels Inc Technology Sphere
  • 16. Resource Enveloping cont. • - knowledge of the manner in which the layers were applied; • - knowledge of the standard and proprietary encryption patterns; • - knowledge of all of the keys used; • - knowledge of the pattern by which the keys were applied; • - knowledge of the customer defined ‘uniqueness’ of the processing • The data resource is wrapped or enveloped in such a way that it creates an incalculable combination of possibilities to decrypt and thus renders the data virtually unbreakable. Secure Channels Inc Technology Sphere
  • 17. Resource Enveloping cont. Due to the flexibility of SPHERE an entire scripting language was developed to drive the encryption process. These scripts can be completely unique per customer. Each encryption function is fully standalone and thus each script can be uniquely created in almost an unlimited pattern. One customer might encrypt their data with a script that specifies functions A,B,C whereas another customer might specify the same functions but in B,A,C order. This flexibility adds immeasurable depth to the security of the data. One customer might use pictures for passwords whilst another might use Japanese phrases. Since SPHERE has no limit to the number of functions; number of keys/passwords; no limit to the size of said keys/passwords then the ability to encrypt data to an unbreakable level is strictly under customer control. Secure Channels Inc Technology Sphere
  • 18. SPHERE Deployed • With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control. Conclusion • The question was asked earlier “Is the data worth protecting and if so then how can it be done?” SecureChannels has developed SPHERE such that the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying SPHERE to the data the data itself becomes meaningless outside of a SPHERE enabled system. Secure Channels Inc Technology Sphere
  • 19. SPHERE Deployed • With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control. Secure Channels Inc Technology Sphere
  • 20. Conclusion • The question was asked earlier “Is the data worth protecting and if so then how can it be done?” Secure Channels has developed patented encryption PKMS2 and the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying our patent encryption to the data the data itself becomes meaningless outside of the enabled system. Secure Channels Inc Technology
  • 21. Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014 http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html Black Hat Hackers Fail to Crack Encryption Tech http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech Secure Channels Inc Technology Press release
  • 22. Unmatched Security for the Digital Ecosystem