SUBROSA

8
Unmatched Security Solutions For The Digital Ecosystem Brought to you by

Transcript of SUBROSA

Unmatched Security Solutions For The Digital Ecosystem

Brought to you by

Data Breaches is the Increasing ThreatIdentity Theft Resource CenterTotals for All Categories, 2014: # of Breaches: 761 # of Records: 83,176,279Source: http://www.idtheftcenter.org/

Data ENCRYPTION is the answerSecure Channels Patented Encryption will just do that.

Secure Channels patented encryption works even if a private cloud is hacked, because the only thing a hacker can see is useless bits and bytes without the set of encryption keys, pattern keys, scripts, and source code required to make any sense of it.

SUBROSASimple User Based Resource

Orientated Segmented Architecture

SUBROSA: “Under the Rose" and is used in English to denote secrecy or confidentiality, similar to the Chatham House Rule. The rose as a symbol of secrecy has an ancient history.

SUBROSA is a new paradigm for generating and utilizing complex keys based on a user's own understanding and selection of segments of resources (images, documents, audio clips, videos, etc.) that the user can easily identify thus the architecture being user based and resource oriented.

Before SUBROSA 1980s

technology Average hack

and crack time less than 5 minutes

Users can change for additional security

Need to remember any/all passwords

2007 technology Average hack

and crack time less than a few minutes

Users can NOT change due to print being unique

Once obtained users MUST abandon this option

The broken standard Biometrics…the myth

SUBROSANumbers, characters and/or prints are easily hacked; Imaginations are not…

Select pictures, objects, .wav files, etc.

Select 2+ in sequential order

Divide each object into as many as 64 individual elements, each with it’s own set of keys

Each element in all objects are now locked and encrypted and done so in RANDOM order making it nearly impossible to hack, let alone…CRACK

Welcome to

SUBROSA“The end of passwords” Next generation “object and element

based” data security and protection

A simple 4 image/object security blanket, with 150 random elements to include random multi-length keys per element in random order, yet ALL must be opened and unlocked in sequential order. Good luck!!!

Secure Channels Inc.16400 Bake Parkway, ste 100

Irvine, CA 92618855.825.6766

www.securechannels.com