Empowering the Internet of Things to ensure a flourishing society while protecting citizens' trust, privacy and confidence

 

more to come.....

Quantum-Grade Solutions


The Entropic Alphabet:

The entropic alphabet is comprised of letters expressed as degree of mixing two or more recognizable ingredients (entropic measurements). It allows intrinsic marking which can be read from any angle, and cannot be 'rubbed off.'

 
The Secure Enclosure:
Securing physical access to computers is an ongoing struggle, newly granted patents define (a) an 'egg shell' like breakable enclosure which cannot be tampered with, without making the tampering obvious, and (b) a pressurized secret mixture of gases within the enclosure, detecting any physical injury to the envelope.

 The Rock of Randomness:
The 'Rock of Randomness' is a compact lump of material of varied conductivity. The lump captures data implicitly through its structure, not in bit-wise form. Since hacking and remote data theft applies only to the explicitly digital realm -- the 'rock' is inherently secure.

An immediate application is to pack in the lump quantum-grade randomness, which is the essential ingredient in virtually every cryptographic protocol. These rocks may be installed in future computing devices and phones.Type your paragraph here.

We prepare threat analysis and provide cryptographic variety defense powered with randomness defense that would be unable to be cracked, neither with brute force, nor with mathematical advantage. High quality, large quantities of well-distributed, fast and effective randomness is rising to claim the pivotal role in the emerging cyber reality, IoT, Fin-Tech, Sharing economy and will change the privacy landscape and pose new law-enforcement challenges


use cases examples:


Rendering Quantum Threat to Financial Services

 reference to the challenge to be solved:
Michele Mosca, Co-Founder, Institute for Quantum Computing, University of Waterloo

Emerging technologies are harnessing quantum effects for more powerful computation, more secure communication, better sensing, and many more applications yet to be discovered. Can any of this help financial services? Maybe, but quantum computers will break the foundations of our current information and communication systems, including cloud computing, the internet, and payment systems. So before reaping the benefits of full-scale quantum computation, we must retool with new cryptographic foundations for cybersecurity designed to be safe in the quantum era. When is the quantum threat likely to become reality? Is your organization ready? Will your systems collapse? Will your current information assets be compromised in the future when quantum computers become available? Do vendors have this under control? Will blockchain survive? What can organizations do to protect against the quantum threat in a non-disruptive, cost-effective and timely manner?


Safe2Chat - Connecting people to people

The proposed framework is a website/App which could tailor-make an encryption package to be downloaded by both Alice and Bob for their ad-hoc use. The downloaded package will include the cryptographic algorithm and a unique key, which may be of any size (amount of randomness, by desire). After their secure exchange both Alice and Bob may ignore, or discard the downloaded App and restart the same procedure, with a different tailor-made package, exactly when needed. This framework allows for greater flexibility in managing the complexity aspects that ensures security.

 IoT Secured - connecting devices to devices
Securing IoT devices with Near Zero Computing Power

A new era of cryptography where the new technology of cheap and reliable memory allows even a simple smart element to be equipped with oodles of randomness which are processed bit-wise, fast and easy and provide guaranteed security.
Our proposed solution will allow sensors, readers, monitors, transponders of even very small size to receive and send information securely encrypted despite their low level computing capability and limited battery power.
Many of the IOT connected devices will be offered on a service basis where a time used, or resources used will become a basis for payment. We developed a protocol for digital money payment in real time (pay-as-you-go) for all services on the Internet of Things. No invoices, no collection, and no personal database to be hacked. Privacy and efficiency are nicely served.
This will allow people to use the Internet of Things and enjoy the great benefit of the Internet Protocol without worrying about negative side effects.

We have to prevent the ‘smart’ grid from becoming ‘foolish’,

and the Internet of Everything to become 'the Internet of Everything to be hacked'.


Asset protection:

We can implement our solutions with dedicated hardware that is battery friendly, and resists hacker’s attempt to use it for their own computations. Consider, for example, a car door lock that can be opened remotely. The lock needs to know that it gets the command from the proper source, not from a hacker.