Ket Shadowing PPT 17-Mar-2015

Post on 17-Aug-2015

87 views 9 download

Transcript of Ket Shadowing PPT 17-Mar-2015

KEY SHADOWING

A RADICAL BREAKTHROUGH IN ENCRYPTION TECHNOLOGY

   

THESE COMPANIES PROVIDE BEST PRACTICES SECURITY FOR YOUR DATA:

Google Drive Amazon’s Cloud Apple’s iCloud Box Dropbox

YOU MAY ALSO MANAGE YOUR OWN SECURE DATA STORAGE.

IF SOMEONE LOSES OR GIVES AWAY THEIR KEY, A BAD ACTOR CAN GET INTO YOUR BOX REGARDLESS OF THE UNDERLYING SECURITY.

THERE IS A PROBLEM: EXISTING TECHNOLOGY IS A DIGITAL VERSION OF A ONE LOCK BOX.

I  

KEY SHADOWING TECHNOLOGY LETS YOU MAKE A DIGITAL MULTI-LOCK BOX:

I  I   I  

YOU PICK HOW MANY “LOCKS” EXIST.

KEY SHADOWING TECHNOLOGY ALSO LETS YOU PICK HOW MANY “KEYS” EXIST:

YOU CAN HAVE MORE KEYS THAN LOCKS.

I  

AS LONG AS YOU HAVE AS MANY KEYS AS LOCKS, YOU CAN OPEN THE BOX.

I   I  

I  

ANY COMBINATION OF ENOUGH KEYS CAN BE USED.

I   I  

IF YOU DO NOT HAVE ENOUGH KEYS, YOU CANNOT OPEN THE BOX:

I  I   I  

THE BOX CAN STILL BE OPENED AS LONG AS YOU HAVE ENOUGH KEYS LEFT.

WITH KEY SHADOWING, YOU CAN ALSO DESTROY A KEY WITHOUT THE KEY-HOLDER EVEN KNOWING.  

WHY THIS MATTERS: •  ANY ONE BAD ACTOR CANNOT GET INTO OR

GIVE ACCESS TO YOUR BOX

•  YOU CAN DESTROY ONE OR MORE KEYS AND STILL GET INTO YOUR BOX AS LONG AS ENOUGH KEYS REMAIN AVAILABLE

KEY SHADOWING TECHNOLOGY IS PATENT PENDING. THE UNDERLYING TECHNOLOGY INVOLVES N-DIMENSIONAL MATH AND IS UTTERLY UNIQUE.

IF YOU WISH TO PARTICIPATE IN MONETIZING THIS RADICAL NEW TECHNOLOGY, PLEASE CONTACT…

DANE BUTZER (614) 205-3241

DBUTZER@YMAIL.COM