© 2018 SEED Protocol All rights reserved.
Enlist Data Owners and even Data Subjects in detecting misuse of protected data
Individualized encryption makes it easy to detect access attempts to Data Subject's key or vault
Data Owners and Subjects may additionally establish alert thresholds
Creates an “army” of breach detectors to keep data thieves from flying under the radar
Enhances existing intrusion detection and prevention efforts
Create an insurmountable cracking hurdle using individualized encryption
Encrypt API calls from protected software create vaults, identities and permissions
Each vault utilizes a unique key pair, protecting data about an individual or project
Key Master provides key creation, management and encrypts/decrypt services
Registry approves/denies all requests
Cloud Lockbox manages the encrypted data, file-based or database field assets
Create one authoritative source of data shared across organizations and applications
SEED-protected data may be securely shared
Varied level of access established by setting permissions via API calls
Provides solution to obtain consent and provide access for data subjects
Delivers ironclad identity masking that retains two-way mapping, revolutionizing applications such as medical research
The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections.
U.S. Provisional Application 61/553,883 (Nov 2011)
Robust Intellectual Property
Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.
Create an "offset" for each person's identity
SEED generates two tokens for each individual, an identity token and a masking token
Only the Key Master knows the relationship between the two
This identity "offset" supports transactional anonymity with attribution
Retains underlying strong identity assertion
Enables two-way communications without divulging identities
The Unique Core of the Invention
Key Master: Performs all crypto functions. Generates and manages unique keys per subject-application pairing. Responds only to authorized applications
Registry: Serves as meta directory of users, subjects and permissions. Requires independent authentication from a separate device.
Cloud Lockbox: Releases an encrypted file only after both an authenticated API call from the Key Master and approval by the Registry.
Secure Exchange of Encrypted Data
SEED Protocol distributes control across three core components to generate and manage virtual vaults:
Watch a short animation
Generates a union identity by mapping users and data subjects from multiple applications
Access to the SEED-protected data requires authentication to application as well as authentication to the data
Provides second factor authentication services to applications
Crowdsources intrusion detection by alerting users and, optionally, data subjects to speed detection of breaches
Patented design delivering unparalleled data integrity, privacy and security
Securely share one authoritative source of data across applications and organizations
Unify
Require independent authentication to retrieve the protected data from the Cloud Lockbox
Verify
Mask
Preserve anonymity while enabling two-way communications
Crowdsource breach detection to users/subjects, quickly detecting compromises
Watch
Guarantee authenticity and integrity with our high-performance blockchain
Ledger
Encrypt
Create an insurmountable cracking hurdle using individualized encryption
De-couples sensitive data from applications