Extend Triangulation to Wherever Your Data Flows

© 2018 SEED Protocol   All rights reserved.

Contact Us: 
info@seed-protocol.com 
1 740 592 2950 

Verify

Multi-factor authentication focused on the protected data

Prevents unauthorized retrieval of protected data from the Cloud Lockbox

Independent authentication direct to the Registry thwarts malicious insiders

Quickly identifies hijacked user accounts

Delivers multifactor authentication to protected software

Integrates with identity management and single sign-on solutions


The Secure Exchange of Encrypted Data

Company   |   Services 

Watch 

Enlist Data Owners and even Data Subjects in detecting misuse of protected data

Individualized encryption makes it easy to detect access attempts to Data Subject's key or vault

Data Owners and Subjects may additionally establish alert thresholds

Creates an “army” of breach detectors to keep data thieves from flying under the radar

Enhances existing intrusion detection and prevention efforts

Encrypt 

Create an insurmountable cracking hurdle using individualized encryption

Encrypt API calls from protected software create vaults, identities and permissions

Each vault utilizes a unique key pair, protecting data about an individual or project

Key Master provides key creation, management and encrypts/decrypt services

Registry approves/denies all requests

Cloud Lockbox manages the encrypted data, file-based or database field assets

Unify

Create one authoritative source of data shared across organizations and applications

SEED-protected data may be securely shared

Varied level of access established by setting permissions via API calls

Provides solution to obtain consent and provide access for data subjects


Simple Path to Adoption

Get The Free Software Developer Slide Deck!

Secure an Enterprise

Engage features as needed using API calls from any application - no “forklift” required

Migrate to Encrypt from existing encryption tools

Deploy Verify for enterprise-wide multifactor authentication

Implement Ledger as high-performance alternative to Blockchain

Utilize Mask for next-gen de-identification

Leverage Unify to replace lower-security file sharing solutions

Augment intrusion detection with Watch

Securely share one authoritative source of data across organizations and applications

Unify

Crowdsource breach detection to data owners/subjects, quickly quarantining compromises

Watch

Encrypt

Create an insurmountable cracking hurdle using individualized encryption

Deploy multi-factor authentication focused on the protected data, spanning multiple applications

Verify

Mask

Build anonymity into applications yet retain traceability and two-way communications

Share one authoritative source of data across organizations and applications

One Patented Solution - A Complete Information Assurance Toolkit

Richard Gibson

Executive Director

Health Record Banking Alliance 

"SEED addresses a significant problem in protecting and sharing sensitive personal data. Companies can add the Protocol to their existing infrastructure. Innovation can continue yet consumer data remains secure from a massive breach."

David Azoulay

CTO, Simplicité Software

"I am impressed with the elegant design and high performance of the SEED Protocol – an excellent solution for uniting a business ecosystem.  It was easy to integrate with our platform."

Customer Voices

Kristine Barr

Vice-President for Information Technology,

Holzer Health System

"The SEED Protocol offers a powerful solution for internal integration of our applications as well as a strong method of providing records to patients."

Karen Thomas

CEO, Agrin Health LLC

"We are really impressed with SEED’s thoughtful design – a great solution for securing our data."

Partners

Guarantee authenticity of parties and integrity of data with indelible ledgers

Ledger

The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections.

U.S. Application 15/952,530
U.S. Patent No. 9,973,484
U.S. Patent No. 9,378,380
U.S. Patent No. 9,390,228
EU Patent Application 3 219 048
Feature Menu
Feature MenuFeature MenuFeature MenuFeature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Protects information assets, defending against cyber criminals from the outside and inside

Unite a Business Ecosystem

Robust Intellectual Property

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.

Mask

Create an "offset" for each person's identity

SEED generates two tokens for each individual, an identity token and a masking token

Only the Key Master knows the relationship between the two

This identity "offset" supports transactional anonymity with attribution

Retains underlying strong identity assertion

Enables two-way communications without divulging identities

Generate indelible ledgers without the complexity of blockchain

Strong identity assertion ensures authenticity of parties

Transaction content verification provides data integrity

Block formation records transaction details in indelible ledger

Supports third party verification

Feature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Ledger

Triangulation - the Unique Core of the Invention

Key Master:  Generates and manages individualized keys, provides encryption and decryption services to applications

Registry:  Manages identities, catalogs rights,  approves/denies access, and provides multi-factor authentication to applications

Cloud Lockbox:  Manages the encrypted data, both file-based and database fields 

Secure Exchange of Encrypted Data

SEED Protocol distributes control across three core components:

Split control delivers tremendous cyber resilience
Individualized encryption creates insurmountable cracking hurdle

Delivering rock-solid data integrityprivacy and security

Get The Free Software Developer Slide Deck!Contact Us
 

Learn More

Watch a short animation