Patented Cyber Security Breakthrough  

U.S. Patent Nos. 9,378,380 and 9,390,228,
U.S. Applications 15/952,530 and 15/170,981,

EU Patent Application 3 219 048

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR

© 2017 SEED Protocol   All rights reserved.

Power of Triangulation with SEED-Direct 2nd Factor Authentication

Authenticates users directly with Registry, bypassing application software

Methods include SMS, biometrics and proximity

Registry denies API calls lacking SEED-Direct 2nd factor user authentication

Protected software may also verify 2nd factor authentication

Full support for identity management solutions

The Secure Exchange of Encrypted Data

Company   |   FAQ 
 

Identity Masking and Tokenization

Defend valuable company information before allowing third party access

De-identify to protect customer identities

Tokenize sensitive fields

Re-identify and re-associate as needed

Add to data longitudinally

Enable two-way communications while retaining anonymity

Integrate both SEED-protected and non-SEED data sources

Watchdog 

Uses machine learning to detect abnormal patterns of activity providing powerful behavioral detection

Crowdsource Watchdog training and detection to internal users for involvement and accountability

Engage consumers to further extend crowdsourcing

Creates personalized thresholds to keep cyber thieves from "flying under the radar"

Operates across multiple applications and organizations

Micro Segmentation Encryption 

Distributes and compartmentalizes elements of control

Encryption functions and key management moved to Key Master

Key Master generates unique lock and key for each consumer and/or project

Sensitive data encrypted with individualized locks and stored in Cloud Lockbox

Identities and permissions cataloged in Registry

Access to protected data requires authenticated API calls

Deposits and retrievals require triangulation across all three SEED components

SEED-ChainTM 

Enables multiple applications to share the same SEED-protected data

Extends the encryption, visibility and control across applications, organizations and devices

Harmonize identities and permissions spanning any business ecosystem

Delivers next-generation Blockchain with high throughput and low latency

Flexible structure and contents of blocks and chains to meet business rules

Flexibility - High Performance - Global Scalability

Get The Free Software Developer Slide Deck!

Harnessing triangulation to stop cyber thieves and rogue insiders in the enterprise

Seamless integration into any software 

Protects sensitive data at-rest and in-motion

Data residency control and consumer access for full GDPR compliance

Supports cloud-native and hybrid applications

Standards-based open architecture 

Secure and unify any business ecosystem using next-gen blockchain supporting high transaction volume

SEED-ChainTM

Crowdsource thresholds and alerts to keep cyber thieves from flying under the radar

Watchdog

Micro Segmentation

Automates individualized and project-centric encryption including differential options

"Trust but verify" with SEED-Direct 2nd factor authentication

Power of Triangulation

Identity Masking

De-identify and tokenize sensitive information for longitudinal research 

Get The Free Software Developer Slide Deck!

Delivering next-generation blockchain to unite any business ecosystem

One Flexible Framework - A Menu of Powerful Features

Familiar Technologies United in a New Way

Key Masters:  Generate and manage a unique "lock and key" to protect the sensitive data about each person or project. Perform all encryption and decryption functions.  

Registry:  Manages identities and permissions, catalogs protected data files.  Registries communicate to retain unique identities and share data across extended community.

Cloud Lockbox:  Manages the encrypted data. Generates one-time, time-limited download tokens.  May utilize any blend of cloud or on-premise storage.  

Richard Gibson

Executive Director

Health Record Banking Alliance 

"SEED addresses a significant problem in protecting and sharing sensitive personal data. Companies can add the Protocol to their existing infrastructure. Innovation can continue yet consumer data remains secure from a massive breach."

David Azoulay

CTO, Simplicité Software

"I am impressed with the elegant design and high performance of the SEED Protocol – an excellent solution for uniting a business ecosystem.  It was easy to integrate with our platform."

Customer Voices

Kristine Barr

Vice-President for Information Technology,

Holzer Health System

"The SEED Protocol offers a powerful solution for internal integration of our applications as well as a strong method of providing records to patients."

Karen Thomas

CEO, Agrin Health LLC

"We are really impressed with SEED’s thoughtful design – a great solution for securing our data."

Partners

Features In-Depth

Contact Us

Provide consumer access and control over the data about them, exceeding GDPR

SEED-ConsumerTM

SEED-ConsumerTM 

SEED-Consumer apps provides options for direct citizen engagement

Execute informed consent

Monitor access to data about them 

Deposit and/or retrieve personal data

Participate in Watchdog training and breach detection 

A complete GDPR solution!

U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

(Patented the systems and methods rather than the particular software implementation)

Broad Patent Protections
Back
BackBackBackBackBack

Secure Exchange of Encrypted Data

SEED Protocol distributes the elements of control to three separate components:

Watch SEED Protocol In-Action

U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048