More Related Content
Similar to ENT-Data-Sheet_Features-Benefits
Similar to ENT-Data-Sheet_Features-Benefits (20)
ENT-Data-Sheet_Features-Benefits
- 1. DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved.
FEATURES & BENEFITS
Entity Network Translation (ENT)
An Advanced, Fully Decentralized, Core Trust Technology
for Powerful, Trusted Micro-Networks & True Digital Ownership
ENT TECHNOLOGIES
9466 Black Mountain Road, Suite 250
San Diego, CA 92126
1.844.837.4696
www.ent.net
inquire@ent.net
- 2. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 1 of 9
Top 16 Benefits of ENT
ENT is an advanced, fully decentralized, core trust technology for
powerful, trusted micro-networks and true digital ownership.
The ENT system is more resilient and robust than PKI, more versatile and
efficient than the blockchain, and eliminates central authorities and manual key
management – resulting in some amazing benefits for today’s digital systems.
Owners Are In Control
Owners design and control
every aspect of their own
trusted micro-networks – from
identity to access to data – and
ENT enforces their rules.
True Digital Ownership
For the first time ever in the
digital space, ENT makes digital
assets and access as exclusive,
valuable and transferable as
real-world physical property.
Identity For Everything
Humans, devices, software,
data, groups, physical objects,
concepts like currency and
corporations – anything can
have a permanent identity.
Human Processes Are
Assets, Not Liabilities
ENT maps real-world trust,
accountability, roles and
processes directly into strong,
authentic digital networks.
Trusted Computing
Software processes and data
rights are enforced everywhere
for a lawful and predictable
environment across any
execution context.
Grid Computing
“Big data” processing without
centralization and loss of
privacy is possible using
commodity storage, compute
resources and bandwidth.
Scalable Security
Users set arbitrary levels of
access for their trusted
relationships – from open to
complex authorizations.
Robust Data Privacy
Data owners have full control
of their data’s exposure – from
public availability to military-
grade data masking.
Growth Is Beneficial
More proliferation means
more inter-woven, trusted
relationships. The system gets
stronger as it gets bigger.
Resilient, Robust
Decentralized design
eliminates single points of
failure and allows for rapid
recovery in case of disruption.
Versatile, Agile
From IoT to military to
healthcare and more, ENT is
useful for any purpose and
easily adapts to changes.
Interoperable
The system operates in a
standard way across difficult,
diverse domains and
execution environments.
Cost Effective, Efficient
Owner-driven provisioning
and discrete operations are
inexpensive and maximally
efficient, yielding high ROI.
Scalable Operation
ENT can scale to arbitrary
levels of operation – from
embedded processes to
complex global systems.
Stable Governance
ENT’s open standard and
governance model provides a
well-proven foundation for
real-world global trust.
- 3. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 2 of 9
Trust System Evolution: From Trust Domains to Trusted Micro-Networks
Current: Trust Domains
Centralized, not interoperable.
Domain owner issues, arbitrates & protects
identities & data. Very vulnerable.
Security is secondary, privacy not possible.
(Includes PKI, symmetric, PGP, blockchain)
ENT: Trusted Micro-Networks
Fully decentralized, interoperable.
Each entity has individual identity, trusted
connections, access levels, data ownership –
determined by owner, no central authority.
Exponential security & privacy is emergent.
Examples of Trusted Micro-Networks & Ownership
These are all direct entity-to-entity transactions. No third party authority or domain is involved.
Medical Records
Bob owns his medical record,
meaning he has exclusive,
transferable access to it and its
commodity storage location. His
doctor needs access. She signs
Bob’s required terms of use. She
now has directly permissioned,
time-limited access to the data.
Secure Actuation
A field squad leader must send a
drone navigation actuation
command through a specific
commodity mobile device and signal
source, and command must
authenticate the change as well. The
drone will not change without
authorization from all four entities.
Hardened Devices
Each processor on a device has
its own ENT identity, security
access, and data privacy. These
components form a trust
network. They can either be
accessed individually or vote
as a group to authenticate
device actions.
- 4. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 3 of 9
ENT Security: End-to-End, Arbitrary Levels of Strength
With ENT, security is a natural outcome of a decentralized system.
Resilient identity. No central points of failure. No external dependencies.
Entity-level access rules that scale to arbitrary levels. Heterogeneous encryption.
1) Decentralized, Resilient Identity: RKI-based ID
is owner-determined and not tied to a central
vulnerable authority or manual key process.
2) Precisely Scoped Network: Direct entity-to-entity
micro-networks with no third-party knowledge or
middleman. Reduced surface area for attack.
3) Integrated Entities, No External Dependencies:
Black box operation reduces attack vectors.
4) Owner-Determined, Explicit, Multi-Auth
Connections Only: Security access can scale
to arbitrary levels that exactly fit owner
needs. Unauthorized requests rejected.
5) Heterogeneous Encryption: Encrypted
channel can use any algorithm or method,
including custom. Diversity is desirable.
ENT Data Privacy: Decentralized System Mitigates Breach Risks
With ENT, data privacy is a natural outcome of a decentralized system.
Data partitioned into small pieces across many locations. Datum-level identity.
Datum-level access rules that scale to arbitrary levels. Advanced privacy techniques.
1) Per-Datum Access Authorization Rules: Data is
a first-class system entity with arbitrary levels of
access control for authorized entities.
2) Partitioning: Data exposure is limited to a single
source or record that is strongly identified and
changes locations across nodes. Eliminates
catastrophic breaches where attackers move
laterally through large data stores.
3) Authentic Schema for Data Assurance: Via
semantic matching, users can have
assurance of data composition, type and
what elements are being exposed.
4) Heterogeneous Encryption: Data encrypted
in transit at and rest. Encryption channel
can use any algorithm or method, including
custom. Diversity is desirable.
- 5. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 4 of 9
ENT Increases Developer ROI with a Standard Trust Stack
Developers simply plug their value-add applications into a global, uniform trust layer.
Drain on resources and liability are reduced because owners manage their own trust.
Current Tech: Manual/Fixed Stack, Low ROI
Stack is high-effort, custom, often duplicated.
Developers have full system visibility.
Manual, top-down administration of system.
High developer liability, low ROI.
ENT: Owner-Driven Platform, High ROI
ENT is pluggable, open standard trust layer.
Developers provide value-add app framework.
Owners manage their own system configuration.
Low developer liability, high ROI.
ENT System Components
ENT has just four simple components with many versatile deployment options.
1) Nodes: The node is ENT’s execution environment.
Nodes execute and enforce the user-determined,
authorized operations as directed by verinyms.
Nodes operate autonomously and run in a wide
variety of environments.
2) API: Standard programmatic access to the node.
3) User Interface: This is the “super-admin”
interface that gives an owner oversight and
administrative control for all their verinyms.
4) Verinyms: These are the most important
component in the ENT system. Verinyms are
uniform, integrated “virtual machine” objects
that represent any entity in the ENT system.
Verinyms have powerful RKI-based network
functionality such as identity, title, control,
resolution, storage and more. Verinyms
exchange authorized services with other
verinyms, carry their own data, and are mobile
across nodes – a fully decentralized system.
- 6. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 5 of 9
FEATURE BENEFITS
Relational Key
Infrastructure (RKI)
ENT’s system is built on RKI -
a new, patent-pending,
fundamental advancement
in asymmetric crypto
architecture.
Fundamental advancement in crypto architecture. Increases
the utility of asymmetric keys in systems.
Solves long-standing issues previously thought to be
intractable in asymmetric cryptography such as the
“continuity boundary” – maintaining credentials in the event
of a loss or compromise of private keys in a distributed
system.
Order-of-magnitude more strength, resilience, efficiency and
utility than current trust technologies like PKI, PGP,
symmetric logins and blockchains.
RKI patterns allow ENT to be built with an elegantly simple
recombinant construction. This reduces the surface areas for
exploits in the core system components.
The ENT system uses RKI patterns for robust, authentic
network services: Namespacing, title, control, group
behavior, distribution, routing, notifications and more.
With RKI, the robustness and resilience of a system actually
increases in correlation with an increase in participants.
FEATURE BENEFITS
Decentralized
Architecture Via
Verinyms
Verinyms are network entity
objects in the ENT system.
Verinyms are anything that
can be represented digitally:
Humans, devices, data & files,
software, groups, physical
objects and abstract concepts
like corporations or currency.
Verinyms operate like little
virtual machines, forming
direct and trusted connections
with each other. Verinyms are
Robust, fault-tolerant operation. No single points of failure.
Black box operation with no external code dependencies.
Reduces attack surface.
Discrete and trusted “closed circuit” verinym connections
limit visibility of transactions and eliminate man-in-the-
middle vulnerabilities and attacks.
Efficient, precisely scoped networking.
Only three simple components are required to operate and
configure verinyms. Simplicity reduces attack surface.
Addressable identity: Every network entity, including data, is
a first-class actor with a strong, durable and resilient identity
that is also a system-wide address for access, actuation and
transactions.
Infinite scalability: Network sizes, numbers of verinyms, and
numbers of transactions can scale to arbitrary levels.
- 7. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 6 of 9
device-independent, mobile
and self-contained -
transporting their own access
rules and data with them as
they move through the system.
Increased security: Data access, control, and other network
operations must be whitelisted at the individual verinym
level.
Increased privacy: Big data pools can be reduced to single
datum endpoints – less value per datum decreases the
incentive for data breach.
Increased privacy: Easier to apply advanced techniques for
limiting data visibility on smaller pieces of data.
High network availability: ENT nodes can run in any
commodity bandwidth, compute and storage environment.
High network availability: Entities can instantiate in any
ENT node, meaning they have maximum network mobility
for better performance and availability.
Uniform design means unified, interoperable platform –
even across different domains.
ENT is fully integrated platform that includes user
management, authentication, routing, storage and data
handling. Developers simply plug in their value-add
applications to the system for a high ROI.
Integration into existing systems can be incremental with
minimal impact to existing internal and external
infrastructure.
FEATURE BENEFITS
Autonomic Operation
and Enforcement
ENT is a self-governing
automated system that
enforces user-defined rules.
Machine-managed trust operations remove the need for
third-party oversight. Reduces security and privacy
vulnerabilities.
Machine-managed enforcement of user rules remove the
need for third-party arbitration. Reduces security and
privacy vulnerabilities.
Machine enforcement of user-defined rules means that
verinym owners can manage the entire trusted endpoint
lifecycle – issuance, provisioning, renewal, and deactivation.
High-quality trust with an exponential reduction in cost.
- 8. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 7 of 9
FEATURE BENEFITS
User-Determined
Rules & Administration
ENT eliminates centralized
administration and gives users
full provisioning and control
of their own identities,
security, privacy and trusted
networks.
Users request and provision their own verinyms with
authorization schemes and configurations that exactly fit
their use context and requirements. No third-party is ever
involved.
Users can configure the durability and resilience of their
verinym identities to arbitrary levels.
Users can configure the strength of their verinym security
and data privacy to arbitrary levels.
Users have exclusive ownership over their digital identities
and assets, and can build their value and exchange them just
like physical property.
Users completely control their verinym configuration and
connections – where it’s stored, who they allow to control it,
who is connected to its data and for how long, and more.
Users can map their real-world trust structures directly into
the digital space, creating a custom digital transaction
network that is predictable and trustworthy.
User-centric decentralized design means security and
privacy are always optimal and discrete at every entry point.
Users configure their own identities, authentication
requirements, routing, storage, and data management.
Application developers simply plug in their value-add
applications to the user’s pre-existing system for a high ROI.
Users can provision on-the-fly policy changes that are
instantly enforced across their verinym networks.
FEATURE BENEFITS
High-Assurance
System Operation
ENT has world-class, global
scale assurance features that
make it suitable for any kind
of trust application
Optional end-to-end encryption for data in transit and at rest
Heterogeneous algorithms for signing and encryption
mitigate the risk of systemic compromises
Authentic schema ensures that the composition of the data
being exchanged in the system conforms to a trusted format
and that users are aware of the privacy and security
implications of its various components (such as image
metadata that might reveal location).
- 9. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 8 of 9
The ENT components have a very slim footprint on the disk,
in memory and over the network. ENT’s efficient form and
operation suitable for applications in a wide variety of
environments - from slim edge sensors to embedded chips to
complex global networks.
ENT is environment agnostic, able to run on any commodity
hardware/software over any type of transport – 4G, WiFi,
Zigbee, Zwave, etc.
ENT’s architecture is very extensible, allowing for the
authenticated insertion of new components such as cutting-
edge or proprietary algorithms, network protocols, industry-
specific verinym services and so on.
Authentic and authorized pull-forward updates keep the
system free of legacy bugs and vulnerabilities.
The ENT API is a uniform software interface that allows
third-party applications to have automated control of
verinym provisioning and behavior in their domain.
The Enternet Manager UI allows users to have full visibility
and control of all their verinyms in an easy contact-manager
style interface. The UI is extensible to include remote
management, privacy metrics and data usage patterns, etc.
ENT is a simple open-standard technology that is easy to
deploy and inexpensive to operate – no prohibitive cost or
proprietary licensing requirements. ENT is designed to be a
global trust infrastructure that is accessible, stable, well-
governed and widely available in perpetuity - for anyone,
anywhere, for any purpose.
- 10. DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 9 of 9
ENT: A Next-Gen Trust Infrastructure for Modern Digital Systems
ENT is a next-generation trust infrastructure for our complex 21st century digital systems.
ENT's groundbreaking technology transforms connected systems like the Internet into a
uniformly safe, predictable, lawful and trustworthy environment.
ENT connects entities together directly in trusted micro-networks without any middleman.
An entity is anything that can be represented digitally - humans, devices, data & files, software,
physical assets, abstract concepts like corporations and currency, and groups of any or all of
these. Every entity has a uniform structure that lets it interoperate with any other entity, no
matter who owns it, as long as the owner allows it. Every entity has its own durable identity,
ownership, control, security and data privacy built in.
ENT's automated system is fully user-driven. Users have exclusive ownership over all their
entities, and can set security and privacy rules to whatever level fits their requirements. Users are
in complete control of their entity configuration and connections - where it's stored, who they
allow to control it, who's connected to its data, and more. Users can directly translate their offline
trusted relationships directly into the digital space. And because users own their entities, they can
build up their exclusive value and exchange them just like physical properties.
ENT is versatile, adaptive and useful for many purposes. ENT can ensure trusted transactions
between entities in all kinds of multi-trillion dollar marketplaces like the Internet of Things,
healthcare, government and military, banking, telecom, networking, transportation, physical
goods and anti-counterfeiting, supply chains and many more. ENT works in any environment,
from embedded components to commodity servers to complex global networks. ENT also works
over any connection, from 4G to WiFi to specialized signals like ZWave and Zigbee.
ENT is built on Relational Key Infrastructure (RKI), a fundamental advancement in crypto
systems. RKI is orders-of-magnitude more strong, resilient, efficient and broadly useful than
current technologies like PKI and blockchains. RKI also has the curious property of making a
system more secure and resilient when more entities are added to it.
ENT is a simple open-standard technology that is easy to deploy and inexpensive to operate.
ENT is designed to be a global trust infrastructure that is accessible, stable, always updated, well-
governed and available in perpetuity - for anyone, anywhere, for any purpose.
Contact us today for more information!