Cyber Security Survival Guide  

U.S. Patent Nos. 9,378,380 and 9,390,228,
U.S. Applications 15/952,530 and 15/170,981,

EU Patent Application 3 219 048

© 2017 SEED Protocol   All rights reserved.

Verify

Gatekeeper verifies user intent

SEED-Direct 2nd factor authentication bypasses the application software

Protected software may also verify 2nd factor authentication

Immediately detects and quarantines compromised user accounts and devices

Halts progression of ransomware

Supports identity management solutions

The Secure Exchange of Encrypted Data

Company   |   FAQ 

Watch 

Crowdsources alarm thresholds to users and even consumers

Uses machine learning to detect abnormal patterns of activity providing powerful behavioral detection

Benefits from individualized encryption of the protected data, a known set of users and a closed network

Operates across multiple applications and organizations

Encrypt 

Key Master provides encryption and key management services to the software

Generates unique lock and key for each consumer and/or project

Gatekeeper catalogs identities, encrypted files and permissions

Cloud Lockbox protects the encrypted data

Deposits and retrievals require triangulation across all three SEED components

Unify and Chain

Enables multiple applications to share the same SEED-protected data

Extends the encryption, visibility and control across applications, devices and organizations

Harmonizes identities and permissions spanning any business ecosystem

Delivers next-generation Blockchain with high throughput and low latency

Flexible structure and contents of blocks and chains to meet business rules

Flexibility - High Performance - Global Scalability

Get The Free Software Developer Slide Deck!

Securing an Enterprise

Seamless integration into any software 

SEED Protocol already operates on AWS and may be ported to any cloud or on-premise hosting environment

Supports cloud-native and hybrid applications

Data residency control and consumer access for full GDPR compliance

Standards-based open architecture

Offered as a licensed solution or PaaS

Turnkey development services available 

Utilizes a single source of data across applications, devices and organizations

Unify

Crowdsources alarm thresholds to keep thieves from flying under the radar

Watch

Encrypt

Automates individualized encryption to protect data at-rest and in-motion - an insurmountable cracking hurdle

Verifies user intent with SEED-Direct 2nd factor authentication to quarantine compromised accounts and devices 

Verify

Mask

De-identifies and enables two-way communications while maintaining anonymity 

Securely share a single source of data "jewels" and deploy next-gen blockchain

One Flexible Mechanism - A Menu of Powerful Features

Triangulation at the Core of the Invention

Key Masters:  Generate and manage keys and perform all encryption and decryption functions.  

Gatekeeper:  Manages identities and catalogs rights to access protected data.  

Cloud Lockbox:  Manages the encrypted data. May utilize any blend of cloud or on-premise storage.  

Richard Gibson

Executive Director

Health Record Banking Alliance 

"SEED addresses a significant problem in protecting and sharing sensitive personal data. Companies can add the Protocol to their existing infrastructure. Innovation can continue yet consumer data remains secure from a massive breach."

David Azoulay

CTO, Simplicité Software

"I am impressed with the elegant design and high performance of the SEED Protocol – an excellent solution for uniting a business ecosystem.  It was easy to integrate with our platform."

Customer Voices

Kristine Barr

Vice-President for Information Technology,

Holzer Health System

"The SEED Protocol offers a powerful solution for internal integration of our applications as well as a strong method of providing records to patients."

Karen Thomas

CEO, Agrin Health LLC

"We are really impressed with SEED’s thoughtful design – a great solution for securing our data."

Partners

Contact Us

Delivers next-gen blockchain featuring high performance and end-to-end security

Chain

The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections.

U.S. Application 15/952,530 [Filed 13 April 2018]
U.S. Patent No. 9,973,484
U.S. Patent No. 9,378,380
U.S. Patent No. 9,390,228
EU Patent Application 3 219 048
Feature Menu
Feature MenuFeature MenuFeature MenuFeature Menu

Secure Exchange of Encrypted Data

SEED Protocol distributes the elements of control to three separate components:

U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Harness encryption and triangulation to defeat cyber thieves and rogue insiders

Uniting a Business Ecosystem

Robust Intellectual Property

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.

Get The Free Software Developer Slide Deck!

Features In-Depth

Mask

Defend valuable company information before allowing third party access

De-identity to protect customer identities

Tokenizes sensitive fields

Enables two-way communications between researchers and subjects while retaining anonymity of subjects

Integrates both SEED-protected and non-SEED data sources

SEED-Chain

Next-generation blockchain delivering high performance with end-to-end security

Smart Contracts: Any two or more parties plus at least one verifier

Elections:  Including voter tracking of own ballot through counting process 

Trading:  Any commodity including crypto currencies, white-label ICO

Transaction Capacity:  30,000 blocks per day on a single instance of lowest power Key Master

Scalability:  Massive capacity using any number of distributed Key Masters

Low Overhead: Generate 10 blocks for a penny

Feature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048