Harness the Power of Triangulation  

© 2018 SEED Protocol   All rights reserved.

Verify

SEED-Direct provides independent authentication, bypassing the protected software

Utilizes device-independent biometrics

Protected software may also verify 2nd factor authentication

Stops unauthorized retrievals - zero leakage

Quarantines compromised accounts

Halts progression of ransomware

Supports identity management solutions

The Secure Exchange of Encrypted Data

Company   |   FAQ 

Watch 

Crowdsources alarm thresholds to users and even consumers

Uses machine learning to detect abnormal patterns of activity providing powerful behavioral detection

Benefits from individualized encryption of the protected data, a known set of users and a closed network

Operates across multiple applications and organizations

Encrypt 

Key Master provides encryption and key management services to the software

Generates unique lock and key for each consumer and/or project

Gatekeeper catalogs identities, encrypted files and permissions

Cloud Lockbox protects the encrypted data

Deposits and retrievals require triangulation across all three SEED components

Unify

Enables multiple applications to share the same SEED-protected data

Extends the encryption, visibility and control across applications, devices and organizations

Harmonizes identities and permissions spanning any business ecosystem

Generates distributed indelible ledger 

Flexibility - High Performance - Global Scalability

Get The Free Software Developer Slide Deck!

Within an Enterprise

Seamless integration into any software using simple APIs or as a "native" development platform 

May be ported to any blend of cloud and on-premise hosting solutions

Data residency and consumer control capabilities for full GDPR compliance

Standards-based open architecture

Flexible business relationship options: 
   * Turnkey development
   * Platform as a Service
   * White-label license

 

Coalesces authoritative data spanning applications, organizations and devices

Unify

Blocks cyber thieves, rogue insiders and ransomware, quarantining compromises

Watch

Encrypt

Automates individualized encryption to protect data at-rest and in-motion, an insurmountable cracking hurdle

SEED-Direct independent authentication controls access to protected data 

Verify

Mask

De-identifies and tokenizes data for analytics plus enables two-way communications

Unifies data and privileges across applications and organizations, generates indelible ledgers

One Patented Mechanism - A Complete Information Assurance Toolkit

Richard Gibson

Executive Director

Health Record Banking Alliance 

"SEED addresses a significant problem in protecting and sharing sensitive personal data. Companies can add the Protocol to their existing infrastructure. Innovation can continue yet consumer data remains secure from a massive breach."

David Azoulay

CTO, Simplicité Software

"I am impressed with the elegant design and high performance of the SEED Protocol – an excellent solution for uniting a business ecosystem.  It was easy to integrate with our platform."

Customer Voices

Kristine Barr

Vice-President for Information Technology,

Holzer Health System

"The SEED Protocol offers a powerful solution for internal integration of our applications as well as a strong method of providing records to patients."

Karen Thomas

CEO, Agrin Health LLC

"We are really impressed with SEED’s thoughtful design – a great solution for securing our data."

Partners

Contact Us

Generates indelible ledgers to prove authenticity and data integrity (without complexity of blockchain)

Ledger

The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections.

U.S. Application 15/952,530 [Filed 13 April 2018]
U.S. Patent No. 9,973,484
U.S. Patent No. 9,378,380
U.S. Patent No. 9,390,228
EU Patent Application 3 219 048
National stage applications in India, Israel and Australia
Feature Menu
Feature MenuFeature MenuFeature MenuFeature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Protects information assets from corruption and misuse, defends against bad actors

Across an Ecosystem

Robust Intellectual Property

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.

Mask

De-sensitize valuable information before sharing with third parties

Mask identities

Tokenize sensitive fields

Enable longitudinal addition of data without re-identifying

Supports two-way communications while retaining anonymity of subjects

Integrates both SEED-protected and non-SEED data sources

Smart Contracts 

Any two or more parties may create a micro-chain

Block formation triggered by workflow milestones

Provides complete accountability

Simple to implement
Feature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Ledger

Generate distributed indelible ledgers from within SEED's secure platform

Delivering a scalable, less complex alternative to blockchain with end-to-end security

Trading 

True peer-to-peer operations

Trade any commodity including crypto currencies

Blocks in public or private chains

Encrypted messaging among traders

Elections 

Ballot anonymity using masking tokens

Distributed, multi-party validation

Voter tracking of own ballot through counting process

Enables e-Voting based on:

   - Initial face-to-face identification

   - Voluntary biometric registration

Triangulation Beginning in the Core of the Invention

Key Master:  Generates and manages individualized keys and performs all encryption/decryption functions 

Gatekeeper:  Manages identities, catalogs rights and approves/denies access to protected information and applications

Cloud Lockbox:  Manages the encrypted data utilizing any blend of cloud and/or on-premise storage solutions  

Secure Exchange of Encrypted Data

SEED Protocol distributes the elements of control across our three core components:

Split control delivers tremendous cyber resilience
Individualized encryption creates insurmountable cracking hurdle

Delivering rock-solid data integrity, availability, authenticity and confidentiality