Protect Information Assets Everywhere  

© 2018 SEED Protocol   All rights reserved.

Contact Us: 
info@seed-protocol.com 
1 740 592 2950 

Verify

Deploy multi-factor authentication focused on the protected data

Delivers application-independent authentication

Prevents unauthorized retrieval of sensitive data

Quarantines compromised accounts 

Detects phishing compromised workstations

Halts progression of ransomware

Supports identity management solutions

The Secure Exchange of Encrypted Data

Company   |   Services 

Watch 

Crowdsource breach detection to data owners/subjects

"Army" of breach detectors quickly quarantine compromises

Individualized encryption simplifies activity tracking and breach identification

Operates across multiple applications and organizations

Encrypt 

Create an insurmountable cracking hurdle using individualized encryption

Key Master provides encryption and key management services to the software

Generates unique lock and key for each consumer and/or project

Registry catalogs identities, encrypted files and permissions

Cloud Lockbox protects the encrypted data

Deposits and retrievals require triangulation across all three SEED components

Unify

Securely share one authoritative source of data across organizations and applications

Extends the encryption, visibility and control across applications, devices and organizations

Harmonizes identities and permissions spanning any business ecosystem


Flexibility - High Performance - Global Scalability

Get The Free Software Developer Slide Deck!

Within an Enterprise

Integration Options

API Calls: Leverage straightforward API calls from your application to enable SEED features

Built-In: Develop the application using SEED as a secure platform for “native” integration

Securely share one authoritative source of data across organizations and applications

Unify

Crowdsource breach detection to data owners/subjects, quickly quarantining compromises

Watch

Encrypt

Create an insurmountable cracking hurdle using individualized encryption

Deploy multi-factor authentication focused on the protected data, spanning multiple applications

Verify

Mask

Build anonymity into applications yet retain traceability and two-way communications

Unifies data and privileges across applications and organizations, generates indelible ledgers

A Patented Information Assurance Toolkit

Richard Gibson

Executive Director

Health Record Banking Alliance 

"SEED addresses a significant problem in protecting and sharing sensitive personal data. Companies can add the Protocol to their existing infrastructure. Innovation can continue yet consumer data remains secure from a massive breach."

David Azoulay

CTO, Simplicité Software

"I am impressed with the elegant design and high performance of the SEED Protocol – an excellent solution for uniting a business ecosystem.  It was easy to integrate with our platform."

Customer Voices

Kristine Barr

Vice-President for Information Technology,

Holzer Health System

"The SEED Protocol offers a powerful solution for internal integration of our applications as well as a strong method of providing records to patients."

Karen Thomas

CEO, Agrin Health LLC

"We are really impressed with SEED’s thoughtful design – a great solution for securing our data."

Partners

Contact Us

Guarantee authenticity of parties and integrity of data with indelible ledgers

Ledger

The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections.

U.S. Application 15/952,530 [Filed 13 April 2018]
U.S. Patent No. 9,973,484
U.S. Patent No. 9,378,380
U.S. Patent No. 9,390,228
EU Patent Application 3 219 048
Feature MenuFeature MenuFeature MenuFeature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Protects information assets from corruption and misuse, defends against bad actors

Across an Ecosystem

Robust Intellectual Property

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.

Mask

SEED generates two tokens for each individual, an identity token and a masking token

Only the Key Master knows the relationship between the two

This identity "offset" supports transactional anonymity

Retains underlying strong identity assertion

Enables two-way communications without divulging identities

Generate indelible ledgers without the complexity of blockchain

Strong identity assertion ensures authenticity of parties

Transaction content verification provides data integrity

Block formation records these details in indelible ledger

Supports third party verification

Feature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Ledger

Triangulation at the Core of the Invention

Key Master:  Generates and manages individualized keys and performs all encryption/decryption functions 

Registry:  Manages identities, catalogs rights and approves/denies access to protected information and applications

Cloud Lockbox:  Manages the encrypted data utilizing any blend of cloud and/or on-premise storage solutions  

Secure Exchange of Encrypted Data

SEED Protocol distributes the elements of control across our three core components:

Split control delivers tremendous cyber resilience
Individualized encryption creates insurmountable cracking hurdle

Delivering rock-solid data integrityprivacy and security

 

Learn More