One Patented Solution to Secure Your Software 

U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR

© 2017 SEED Protocol   All rights reserved.

SEED-DirectTM 2nd Factor 

Users authenticate directly with Registry, bypassing software, using SEED-Direct apps

Triangulates identity and permissions among the individual, the software and SEED

Enables immediate detection of user account hijackings and workstation malware

Supports multiple options for authentication including biometrics

The Secure Exchange of Encrypted Data

Company   |   FAQ 
 

Dissociative MaskingTM 

Defend valuable company information before allowing third party access, e.g. data scientists

De-identify to protect customer identities

Tokenize sensitive fields

Re-identify and re-associate as needed

Add to data longitudinally

Enable two-way communications while retaining anonymity

Integrate both SEED-protected and non-SEED data sources

Watchdog AITM 

Uses machine learning to detect abnormal patterns of activity providing powerful behavioral detection

"Crowdsource" breach detection to internal users and even consumers using SEED-Direct apps

Establishes user accountability

Creates personalized thresholds to keep thieves from "flying under the radar"

Operates across multiple applications and organizations

SEED Isolate & EncryptTM 

Distributes and compartmentalizes elements of control

Encryption functions and key management moved to Key Master

Key Master generates unique lock and key for each consumer and/or project

Sensitive data encrypted with individualized locks and stored in Cloud Lockbox

Identities and permissions cataloged in Registry

Access to protected data requires authenticated API calls

Deposits and retrievals require triangulation across all three SEED components

SEED-EcosystemTM 

Enables multiple applications to share the same SEED-protected data

Extends the encryption, visibility and control across applications, organizations and devices

Harmonize identities and permissions spanning any business ecosystem

Delivers Blockchain-like benefits without the unnecessary complexity

Flexibility - High Performance - Global Scalability

Get The Free Software Developer Slide Deck!

Harnessing triangulation to stop cyber thieves and rogue insiders in the enterprise

Seamless integration into any software 

Protects sensitive data at-rest and in-motion

Data residency control and consumer access for full GDPR compliance

Supports cloud-native and hybrid applications

Standards-based open architecture 

Unifies and secures any business ecosystem, delivering better-than-Blockchain benefits

SEED EcosystemTM

Deploys machine learning and crowdsourcing to detect and block unauthorized access

Watchdog AITM

SEED Isolate & EncryptTM

Compartmentalizes functions and automates encryption to defend against cyber thieves and insiders

Triangulates identity and permissions to immediately detect hijacked user accounts and infected computers

SEED-DirectTM  2nd Factor

Dissociative MaskingTM

De-identifies and tokenizes sensitive information for third party use, e.g. data science analysis 

Get The Free Software Developer Slide Deck!

Delivering better-than-blockchain features to unite any business ecosystem

Unparalleled Features in Cyber Security and Collaboration

Benefits for the IT Pros

Internals of Patented Mechanism

Key Masters:  Generate and manage a unique "lock and key" to protect the sensitive data about each person or project. Perform all encryption and decryption functions.  

Registry:  Manages identities and permissions, catalogs protected data files.  Registries communicate to retain unique identities and share data across extended community.

Cloud Lockbox:  Manages the encrypted data. Generates one-time, time-limited download tokens.  May utilize any blend of cloud or on-premise storage.  

Watchdog AI:  Adds an additional layer of triangulation.  Employs machine learning and crowdsourcing to keep thieves from "flying under the radar."

Richard Gibson

Executive Director

Health Record Banking Alliance 

"SEED addresses a significant problem in protecting and sharing sensitive personal data. Companies can add the Protocol to their existing infrastructure. Innovation can continue yet consumer data remains secure from a massive breach."

David Azoulay

CTO, Simplicité Software

"I am impressed with the elegant design and high performance of the SEED Protocol – an excellent solution for uniting a business ecosystem.  It was easy to integrate with our platform."

Customer Voices

Kristine Barr

Vice-President for Information Technology,

Holzer Health System

"The SEED Protocol offers a powerful solution for internal integration of our applications as well as a strong method of providing records to patients."

Karen Thomas

CEO, Agrin Health LLC

"We are really impressed with SEED’s thoughtful design – a great solution for securing our data."

Partners

Features In-Depth

Contact Us

Provides options for citizen control to authorize and monitor access plus review and contribute data

SEED-ConsumerTM

SEED-ConsumerTM 

SEED-Direct apps provide options to offer direct citizen engagement

Seek informed consent for access

Monitor activity 

Deposit and/or retrieve personal data

Participate in Watchdog AI training and breach detection 

Complete GDPR solution!

U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Application 15/170,981, 
EU Patent Application 3 219 048
Broad protection for the patented mechanism
(not software patents)
Back
BackBackBackBackBack

Secure Exchange of Encrypted Data

SEED Protocol triangulates internally as well, distributing the elements of control to three separate compoments.

Retain full control over applications and databases

Offloads cryptography functions including key management

Establishes user accountability with crowdsourced Watchdog

Dramatically lowers professional liability

Immediate Detection and Quarantine

Detects phishing-compromised users

Suspends access from hijacked accounts

Detects and blocks rogue insiders

Halts progression of ransomware

Watch SEED Protocol In-Action

U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, U.S. Application 15/170,981, EU Patent Application 3 219 048