Secures Any Enterprise

© 2018 SEED Protocol   All rights reserved.

Contact Us: 
info@seed-protocol.com 
1 740 592 2950 

Verify

Multi-factor authentication focused on the protected data

Prevents unauthorized retrieval of protected data from the Cloud Lockbox

Independent authentication direct to the Registry thwarts malicious insiders

Quickly identifies hijacked user accounts

Delivers multifactor authentication to protected software

Integrates with identity management and single sign-on solutions


The Secure Exchange of Encrypted Data

Company   |   Services 

Watch 

Enlist Data Owners and even Data Subjects in detecting misuse of protected data

Individualized encryption makes it easy to detect access attempts to Data Subject's key or vault

Data Owners and Subjects may additionally establish alert thresholds

Creates an “army” of breach detectors to keep data thieves from flying under the radar

Enhances existing intrusion detection and prevention efforts

Encrypt 

Create an insurmountable cracking hurdle using individualized encryption

Encrypt API calls from protected software create vaults, identities and permissions

Each vault utilizes a unique key pair, protecting data about an individual or project

Key Master provides key creation, management and encrypts/decrypt services

Registry approves/denies all requests

Cloud Lockbox manages the encrypted data, file-based or database field assets

Unify

Create one authoritative source of data shared across organizations and applications

SEED-protected data may be securely shared

Varied level of access established by setting permissions via API calls

Provides solution to obtain consent and provide access for data subjects


Creates an authoritative source of data, encrypted once and securely shared across organizational boundaries and applications

Deploys high performance indelible distributed ledger based on our high performance blockchain, providing restricted related-party chains or public chains

Delivers ironclad identity masking that retains two-way mapping, revolutionizing applications such as medical research

The SEED Protocol intellectual property focuses on the systems and methods rather than the particular software implementation, granting us broad protections.

U.S. Patent No. 10,789,373 (Granted Sept 2020)
U.S. Patent No. 9,973,484 (Granted May 2018)
U.S. Patent No. 9,378,380 (Granted June 2016)
U.S. Patent No. 9,390,228 (Granted July 2016)

U.S. Provisional Application 61/553,883 (Nov 2011)

Feature Menu
Feature MenuFeature MenuFeature MenuFeature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Extends Across Any Business Ecosystem

Robust Intellectual Property

Exported according to U.S. Department of Commerce regulations under 5D002 classification as a "network infrastructure" item under License Exception ENC under Sections 740.17(a) and (B)(2)(i)(A) of the EAR.

Mask

Create an "offset" for each person's identity

SEED generates two tokens for each individual, an identity token and a masking token

Only the Key Master knows the relationship between the two

This identity "offset" supports transactional anonymity with attribution

Retains underlying strong identity assertion

Enables two-way communications without divulging identities

Generate indelible ledgers without the complexity of blockchain

Strong identity assertion ensures authenticity of parties

Transaction content verification provides data integrity

Block formation records transaction details in indelible ledger

Supports third party verification

Feature Menu
U.S. Patent Nos. 9,378,380 and 9,390,228, 
U.S. Applications 15/952,530 and 15/170,981, 
EU Patent Application 3 219 048

Ledger

The Unique Core of the Invention

Key Master:  Performs all crypto functions.  Generates and manages unique keys per subject-application pairing.  Responds only to authorized applications

Registry:  Serves as meta directory of users, subjects and permissions.  Requires independent authentication from a separate device.

Cloud Lockbox:  Releases an encrypted file only after both an authenticated API call from the Key Master and approval by the Registry.

Secure Exchange of Encrypted Data

SEED Protocol distributes control across three core components to generate and manage virtual vaults:

Split control delivers tremendous cyber resilience
Individualized encryption creates insurmountable cracking hurdle
Get The Free Software Developer Slide Deck!Contact Us
 

Learn More

Watch a short animation

De-couples sensitive data from applications, delivering robust cyber resilience

Generates a union identity by mapping users and data subjects from multiple applications

Access to the SEED-protected data requires authentication to application as well as authentication to the data

Provides second factor authentication services to applications

Crowdsources intrusion detection by alerting users and, optionally, data subjects to speed detection of breaches

Patented design delivering unparalleled data integrity, privacy and security

Securely share one authoritative source of data across applications and organizations

Unify

Require independent authentication to retrieve the protected data from the Cloud Lockbox

Verify

Mask

Preserve anonymity while enabling two-way communications

Crowdsource breach detection to users/subjects, quickly detecting compromises

Watch

Guarantee authenticity and integrity with our high-performance blockchain

Ledger

Encrypt

Create an insurmountable cracking hurdle using individualized encryption

De-couples sensitive data from applications

Healthcare Example