SlideShare a Scribd company logo
Unmatched Security for the Digital Ecosystem
Data Breaches is the Increasing Threat
Identity Theft Resource Center
2014 Breach List: Breaches: 480 Exposed: 17,508,452
Report Date: 8/19/2014
Source: http://www.idtheftcenter.org/
Data ENCRYPTION is the answer
Secure Channels Patented Encryption will just do that.
Secure Channels patented encryption
works even if a private cloud is hacked,
because the only thing a hacker can
see is useless bits and bytes without
the set of encryption keys, pattern
keys, scripts, and source code required
to make any sense of it.
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi
Standard
SPHERE
SecureChannels Process Hardened Encry
ption Resource Envelopment
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi
Standard
PKMS2 Introduction
• PKMS2 is a radically new take on standard FIPS certified encryption
practices.
• PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or
Standard)
• One of the inherent difficulties with encryption is the use of a single
key or protocol to encrypt data. PKMS2 solves that problem.
Secure Channels Inc Patent Technology
PKMS2
PKMS2 Solution
• PKMS2 breaks a document into segments and encrypts each segment
individually.
• The protocol/password used per segment is based on a pattern key and can
be as simple or as complex as necessary. This pattern is user-derived and
thus can be as unique as the user wants.
• Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said
keys then the document in encrypted in a round robin fashion rolling
through the pattern.
• The document can be [optionally] initially encrypted as a whole resource
and then segmented and then the resultant encrypted segments can also
be encrypted as a while resource.
Secure Channels Inc Patent Technology
PKMS2
FIPS Certification
• Since PKMS2 only uses FIPS certified third party encryption libraries
then the resultant encrypted document, by definition, is also FIPS
certified.
• The segment size is based on the key bit strength formula (s/8 – 11)
bytes. The segments encrypted with passwords have the length
embedded in the resource.
Secure Channels Inc Patent Technology
PKMS2
Secure Channels Inc Patent Technology
PKMS2
Baked Shrimp
Melt a stick of butter in the
pan. Slice one lemon and layer
it on top of the butter. Put
down fresh shrimp, then
sprinkle one pack of dried
Italian seasoning. Put in the
oven and bake at 350 for 15
min. Best Shrimp you will EVER
taste:)
Ordinary Document
Apply initial
encryption pattern
with key 5 (yellow)
Initial optional encryption
Change angle to see layers
Segment 1 with Process 1
Encrypt
segment
#1 with
key 2 (red)
Encrypt
segment #3
with key 8 (blue)
Segment 3 with Process 3
Encrypt
segment #4
with key 7 (purple)
Segment 4 with Process 4
Encrypt
segment #5
with key 2 (red)
Segment 5 with Process 1
Encrypt
segment #6
with key 6
(green)
Segment 6 with Process 2
Encrypt
segment #7
with key 8 (blue)
Segment 7 with Process 3
Encrypt
segment #2
with key 6
(green)
Segment 2 with Process 2
Apply
optional
final
encryption
with key 4
PKMS2
applied – for
all practical
purposes, the
document is
immune to
hacker
decryption
Final Optional Encryption
Encrypt
segment #8
with key 7
(purple)
Segment 8 with Process 4
Secure Channels Inc
TECHNOLOGY
SPHERE
SecureChannels Process Hardened Encry
ption Resource Envelopment
SPHERE Defined
• SPHERE stands for SecureChannels Process Hardened Encryption and
Resource Enveloping. That might seem to be quite the verbiage but it
is very specific and descriptive. Let’s tear it apart and examine each
piece.
Secure Channels Inc Technology
Sphere
Process Hardened
One of the driving forces was the PKMS21 (Pattern Key, Multi Strength,
Multi Segment) process being patented. Once this patent was done
then all of a sudden SecureChannels had in its grasp the means it was
waiting for: the ability and means to secure data via encryption that
would render the data, for all intents and purposes, unbreakable.
Secure Channels Inc Technology
Sphere
Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
Resource Enveloping
• What is needed to resolve a number of security issues is not to
physically surround the data center but to digitally surround the data.
SPHERE’s design is one of wrapping the data in such a way as to make
the data utterly useless without full knowledge of a number of
factors. In the past digital data security has relied solely on the
encryption patterns and key. If the pattern is known and the key is
known then the security of the data is zero. Where SPHERE is
different is that it wraps layered processes around the data in such a
way that it takes
Secure Channels Inc Technology
Sphere
Resource Enveloping cont.
• - knowledge of the manner in which the layers were applied;
• - knowledge of the standard and proprietary encryption patterns;
• - knowledge of all of the keys used;
• - knowledge of the pattern by which the keys were applied;
• - knowledge of the customer defined ‘uniqueness’ of the processing
• The data resource is wrapped or enveloped in such a way that it
creates an incalculable combination of possibilities to decrypt and
thus renders the data virtually unbreakable.
Secure Channels Inc Technology
Sphere
Resource Enveloping cont.
Due to the flexibility of SPHERE an entire scripting language was developed
to drive the encryption process. These scripts can be completely unique per
customer. Each encryption function is fully standalone and thus each script
can be uniquely created in almost an unlimited pattern. One customer might
encrypt their data with a script that specifies functions A,B,C whereas
another customer might specify the same functions but in B,A,C order. This
flexibility adds immeasurable depth to the security of the data. One
customer might use pictures for passwords whilst another might use
Japanese phrases. Since SPHERE has no limit to the number of functions;
number of keys/passwords; no limit to the size of said keys/passwords then
the ability to encrypt data to an unbreakable level is strictly under customer
control.
Secure Channels Inc Technology
Sphere
SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that
it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since SPHERE is
about enabling the customer to secure and encrypt THEIR data THEIR way
and under THEIR control.
Conclusion
• The question was asked earlier “Is the data worth protecting and if so then
how can it be done?” SecureChannels has developed SPHERE such that the
answer to the question is a resounding yes. As has been seen in the news
we can assume data will be stolen but by applying SPHERE to the data the
data itself becomes meaningless outside of a SPHERE enabled system.
Secure Channels Inc Technology
Sphere
SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds
that it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since
SPHERE is about enabling the customer to secure and encrypt THEIR
data THEIR way and under THEIR control.
Secure Channels Inc Technology
Sphere
Conclusion
• The question was asked earlier “Is the data worth protecting and if so
then how can it be done?” Secure Channels has developed patented
encryption PKMS2 and the answer to the question is a resounding
yes. As has been seen in the news we can assume data will be stolen
but by applying our patent encryption to the data the data itself
becomes meaningless outside of the enabled system.
Secure Channels Inc Technology
Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014
http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html
Black Hat Hackers Fail to Crack Encryption Tech
http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech
Secure Channels Inc Technology
Press release
Unmatched Security for the Digital Ecosystem

More Related Content

What's hot

Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduinoiruldaworld
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
IntelePeer
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TWD Industries AG
 
581 517-525
581 517-525581 517-525
581 517-525
idescitation
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Ifthekharul Islam
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond Firewalls
BeMyApp
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
Arash Ramez
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
Sylvain Martinez
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
Priyanka Aash
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7Antony Law
 
Near field communication (NFC) in android
Near field communication (NFC) in androidNear field communication (NFC) in android
Near field communication (NFC) in android
Mindfire Solutions
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
TWD Industries AG
 
Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking Report
Synack
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
Alberto Rivai
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2n
nlog2n
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
Ccna PrepCenter - IP Subnetting from Networkers
Ccna PrepCenter - IP Subnetting from NetworkersCcna PrepCenter - IP Subnetting from Networkers
Ccna PrepCenter - IP Subnetting from Networkers
🎯Renatho Sinuma MBA™®🎓
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!
Priyanka Aash
 

What's hot (20)

Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduino
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
581 517-525
581 517-525581 517-525
581 517-525
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
 
HP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond FirewallsHP Helion Webinar #5 - Security Beyond Firewalls
HP Helion Webinar #5 - Security Beyond Firewalls
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
The New Landscape of Airborne Cyberattacks
The New Landscape of Airborne CyberattacksThe New Landscape of Airborne Cyberattacks
The New Landscape of Airborne Cyberattacks
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
Near field communication (NFC) in android
Near field communication (NFC) in androidNear field communication (NFC) in android
Near field communication (NFC) in android
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
 
Home Automation Benchmarking Report
Home Automation Benchmarking ReportHome Automation Benchmarking Report
Home Automation Benchmarking Report
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Crack ios firmware-nlog2n
Crack ios firmware-nlog2nCrack ios firmware-nlog2n
Crack ios firmware-nlog2n
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Ccna PrepCenter - IP Subnetting from Networkers
Ccna PrepCenter - IP Subnetting from NetworkersCcna PrepCenter - IP Subnetting from Networkers
Ccna PrepCenter - IP Subnetting from Networkers
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Client side encryption without knowing its limits is a ticking time bomb!
Client side encryption without knowing  its limits is a ticking time bomb!Client side encryption without knowing  its limits is a ticking time bomb!
Client side encryption without knowing its limits is a ticking time bomb!
 

Similar to Secure Channels Presentation

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
mdhar123
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extension
DESMOND YUEN
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
Gregory McNulty
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
Gregory McNulty
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
NRB
 
Matrix
MatrixMatrix
Matrix
Sashank Dara
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
How PUF Technology is Securing Io
How PUF Technology is Securing IoHow PUF Technology is Securing Io
How PUF Technology is Securing Io
Abacus Technologies
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
 

Similar to Secure Channels Presentation (20)

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Intel software guard extension
Intel software guard extensionIntel software guard extension
Intel software guard extension
 
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW TO FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMSREAD ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
READ ON HOW FUTURE PROOFING TODAY’S SECURE SYSTEMS
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Matrix
MatrixMatrix
Matrix
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
How PUF Technology is Securing Io
How PUF Technology is Securing IoHow PUF Technology is Securing Io
How PUF Technology is Securing Io
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Secure Channels Presentation

  • 1. Unmatched Security for the Digital Ecosystem
  • 2. Data Breaches is the Increasing Threat Identity Theft Resource Center 2014 Breach List: Breaches: 480 Exposed: 17,508,452 Report Date: 8/19/2014 Source: http://www.idtheftcenter.org/
  • 3. Data ENCRYPTION is the answer Secure Channels Patented Encryption will just do that. Secure Channels patented encryption works even if a private cloud is hacked, because the only thing a hacker can see is useless bits and bytes without the set of encryption keys, pattern keys, scripts, and source code required to make any sense of it.
  • 4. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard SPHERE SecureChannels Process Hardened Encry ption Resource Envelopment
  • 5. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard
  • 6. PKMS2 Introduction • PKMS2 is a radically new take on standard FIPS certified encryption practices. • PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or Standard) • One of the inherent difficulties with encryption is the use of a single key or protocol to encrypt data. PKMS2 solves that problem. Secure Channels Inc Patent Technology PKMS2
  • 7. PKMS2 Solution • PKMS2 breaks a document into segments and encrypts each segment individually. • The protocol/password used per segment is based on a pattern key and can be as simple or as complex as necessary. This pattern is user-derived and thus can be as unique as the user wants. • Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said keys then the document in encrypted in a round robin fashion rolling through the pattern. • The document can be [optionally] initially encrypted as a whole resource and then segmented and then the resultant encrypted segments can also be encrypted as a while resource. Secure Channels Inc Patent Technology PKMS2
  • 8. FIPS Certification • Since PKMS2 only uses FIPS certified third party encryption libraries then the resultant encrypted document, by definition, is also FIPS certified. • The segment size is based on the key bit strength formula (s/8 – 11) bytes. The segments encrypted with passwords have the length embedded in the resource. Secure Channels Inc Patent Technology PKMS2
  • 9. Secure Channels Inc Patent Technology PKMS2 Baked Shrimp Melt a stick of butter in the pan. Slice one lemon and layer it on top of the butter. Put down fresh shrimp, then sprinkle one pack of dried Italian seasoning. Put in the oven and bake at 350 for 15 min. Best Shrimp you will EVER taste:) Ordinary Document Apply initial encryption pattern with key 5 (yellow) Initial optional encryption Change angle to see layers Segment 1 with Process 1 Encrypt segment #1 with key 2 (red) Encrypt segment #3 with key 8 (blue) Segment 3 with Process 3 Encrypt segment #4 with key 7 (purple) Segment 4 with Process 4 Encrypt segment #5 with key 2 (red) Segment 5 with Process 1 Encrypt segment #6 with key 6 (green) Segment 6 with Process 2 Encrypt segment #7 with key 8 (blue) Segment 7 with Process 3 Encrypt segment #2 with key 6 (green) Segment 2 with Process 2 Apply optional final encryption with key 4 PKMS2 applied – for all practical purposes, the document is immune to hacker decryption Final Optional Encryption Encrypt segment #8 with key 7 (purple) Segment 8 with Process 4
  • 10. Secure Channels Inc TECHNOLOGY SPHERE SecureChannels Process Hardened Encry ption Resource Envelopment
  • 11. SPHERE Defined • SPHERE stands for SecureChannels Process Hardened Encryption and Resource Enveloping. That might seem to be quite the verbiage but it is very specific and descriptive. Let’s tear it apart and examine each piece. Secure Channels Inc Technology Sphere
  • 12. Process Hardened One of the driving forces was the PKMS21 (Pattern Key, Multi Strength, Multi Segment) process being patented. Once this patent was done then all of a sudden SecureChannels had in its grasp the means it was waiting for: the ability and means to secure data via encryption that would render the data, for all intents and purposes, unbreakable. Secure Channels Inc Technology Sphere
  • 13. Process Hardened cont. So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms. Secure Channels Inc Technology Sphere
  • 14. Process Hardened cont. So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms. Secure Channels Inc Technology Sphere
  • 15. Resource Enveloping • What is needed to resolve a number of security issues is not to physically surround the data center but to digitally surround the data. SPHERE’s design is one of wrapping the data in such a way as to make the data utterly useless without full knowledge of a number of factors. In the past digital data security has relied solely on the encryption patterns and key. If the pattern is known and the key is known then the security of the data is zero. Where SPHERE is different is that it wraps layered processes around the data in such a way that it takes Secure Channels Inc Technology Sphere
  • 16. Resource Enveloping cont. • - knowledge of the manner in which the layers were applied; • - knowledge of the standard and proprietary encryption patterns; • - knowledge of all of the keys used; • - knowledge of the pattern by which the keys were applied; • - knowledge of the customer defined ‘uniqueness’ of the processing • The data resource is wrapped or enveloped in such a way that it creates an incalculable combination of possibilities to decrypt and thus renders the data virtually unbreakable. Secure Channels Inc Technology Sphere
  • 17. Resource Enveloping cont. Due to the flexibility of SPHERE an entire scripting language was developed to drive the encryption process. These scripts can be completely unique per customer. Each encryption function is fully standalone and thus each script can be uniquely created in almost an unlimited pattern. One customer might encrypt their data with a script that specifies functions A,B,C whereas another customer might specify the same functions but in B,A,C order. This flexibility adds immeasurable depth to the security of the data. One customer might use pictures for passwords whilst another might use Japanese phrases. Since SPHERE has no limit to the number of functions; number of keys/passwords; no limit to the size of said keys/passwords then the ability to encrypt data to an unbreakable level is strictly under customer control. Secure Channels Inc Technology Sphere
  • 18. SPHERE Deployed • With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control. Conclusion • The question was asked earlier “Is the data worth protecting and if so then how can it be done?” SecureChannels has developed SPHERE such that the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying SPHERE to the data the data itself becomes meaningless outside of a SPHERE enabled system. Secure Channels Inc Technology Sphere
  • 19. SPHERE Deployed • With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control. Secure Channels Inc Technology Sphere
  • 20. Conclusion • The question was asked earlier “Is the data worth protecting and if so then how can it be done?” Secure Channels has developed patented encryption PKMS2 and the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying our patent encryption to the data the data itself becomes meaningless outside of the enabled system. Secure Channels Inc Technology
  • 21. Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014 http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html Black Hat Hackers Fail to Crack Encryption Tech http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech Secure Channels Inc Technology Press release
  • 22. Unmatched Security for the Digital Ecosystem