Ket Shadowing PPT 17-Mar-2015
-
Upload
bob-hughes -
Category
Documents
-
view
87 -
download
9
Transcript of Ket Shadowing PPT 17-Mar-2015
KEY SHADOWING
A RADICAL BREAKTHROUGH IN ENCRYPTION TECHNOLOGY
THESE COMPANIES PROVIDE BEST PRACTICES SECURITY FOR YOUR DATA:
Google Drive Amazon’s Cloud Apple’s iCloud Box Dropbox
YOU MAY ALSO MANAGE YOUR OWN SECURE DATA STORAGE.
IF SOMEONE LOSES OR GIVES AWAY THEIR KEY, A BAD ACTOR CAN GET INTO YOUR BOX REGARDLESS OF THE UNDERLYING SECURITY.
THERE IS A PROBLEM: EXISTING TECHNOLOGY IS A DIGITAL VERSION OF A ONE LOCK BOX.
I
KEY SHADOWING TECHNOLOGY LETS YOU MAKE A DIGITAL MULTI-LOCK BOX:
I I I
YOU PICK HOW MANY “LOCKS” EXIST.
KEY SHADOWING TECHNOLOGY ALSO LETS YOU PICK HOW MANY “KEYS” EXIST:
YOU CAN HAVE MORE KEYS THAN LOCKS.
I
AS LONG AS YOU HAVE AS MANY KEYS AS LOCKS, YOU CAN OPEN THE BOX.
I I
I
ANY COMBINATION OF ENOUGH KEYS CAN BE USED.
I I
IF YOU DO NOT HAVE ENOUGH KEYS, YOU CANNOT OPEN THE BOX:
I I I
THE BOX CAN STILL BE OPENED AS LONG AS YOU HAVE ENOUGH KEYS LEFT.
WITH KEY SHADOWING, YOU CAN ALSO DESTROY A KEY WITHOUT THE KEY-HOLDER EVEN KNOWING.
WHY THIS MATTERS: • ANY ONE BAD ACTOR CANNOT GET INTO OR
GIVE ACCESS TO YOUR BOX
• YOU CAN DESTROY ONE OR MORE KEYS AND STILL GET INTO YOUR BOX AS LONG AS ENOUGH KEYS REMAIN AVAILABLE
KEY SHADOWING TECHNOLOGY IS PATENT PENDING. THE UNDERLYING TECHNOLOGY INVOLVES N-DIMENSIONAL MATH AND IS UTTERLY UNIQUE.
IF YOU WISH TO PARTICIPATE IN MONETIZING THIS RADICAL NEW TECHNOLOGY, PLEASE CONTACT…
DANE BUTZER (614) 205-3241