Frequently Asked Questions

Gain access to and control of your confidential information. 

© 2016 SEED Protocol, LLC. All rights reserved.
U.S. Patent Nos. 9,378,380 and 9,390,228

SEED Protocol is cybersecurity solution.

Please help us inform and empower.

 

Contact Us

Why did you decide to use asymmetric encryption to protect data at rest?

People often react with puzzlement when they learn of the SEED Protocol’s unorthodox use of asymmetric encryption.  The conventional practice today, though, unnecessarily constrains the power of public-private key pairs, adhering to Diffie and Hellman’s original approach written in the late 1970’s.

Information security problems have changed dramatically in the intervening decades.  Rather than trying to intercept communications, most cyber thieves work from inside targeted systems, siphoning valuable data from a position of trust.  Rather than trying to trick an authentication system, they hijack user workstations through phishing attacks to gather passwords and circumvent other security roadblocks.  While solutions such as SSL/TLS play an important role, these traditional uses of asymmetric encryption leave many threats undiminished.

The SEED Protocol unleashes asymmetric encryption to play a more powerful role.  Coupled with our distributed cross-verification and 2nd factor authentication independent of the application, the Secure Exchange of Encrypted Data delivers a groundbreaking architecture for protecting data at-rest.  Further SEED enables sharing the sensitive data, with its original encryption intact, across applications, organizations and devices.

Cyber-thieves keep evolving.  We must not let doctrine deter our innovations in security and privacy.

Did you create your own encryption algorighm?

No - the SEED Protocol utilizes the GnuPG RSA libraries using 2,048 bit keys. Our solution can utilize any asymmetric encryption library. Large licensing customers may elect to have us make such a switch.  For customers outside the U.S. such a change would require approval from the U.S. Department of Commerce.    

Where is SEED hosted?

The SEED Protocol was developed on Amazon Web Services, offering tremendous scalability using their EC2, S3 and elastic load balancing services.  We can, though, port the SEED Protocol into any hosting environment based on customer requirements.  The Key Masters are also offered as hardware for on-site deployment (U.S. only).    

What are my Key Master options?

The Key Masters come in three flavors:

  1. Cloud-based shared, virtualized
  2. Cloud-based dedicated
  3. On-premise physical appliance      

Why not use web of trust with PGP and a hardware security module to "roll my own" solution?

There are options to cobble together existing open source solutions to achieve a fraction of the features of the SEED Protocol.  But why would you tackle the chore and assume the liability when our high performance, feature-rich solution is so cost-effective?  Consider the feature comparison below.  

Why does individualized encryption matter?  Won't quantum computing defeat all of today's encryption anyway?

One of the most unfortunate breaches in recent history occurred when cyber thieves stole the records for every American with a security clearance from the Office of Personnel Management.  Consider the following comparison of symmetric encryption and SEED Protocol's approach.  

The Secure Exchange of Encrypted Data

Home   |   Company