clevX “Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.”
- Antoine de Saint-Exupery
clever eXtention
   
BrandPad
ChargeX
CloudKey
DataLock
DataLockMgmt
DataLockRemote
DataLockRNG
DataMouse
DriveSecurity
FlashBack
FoldIT
PowerSmart
RFID Inline
TrustedToken
 
Help Us To  Help You

Technology Platforms and IP Portfolio

CloudKey™

Problem:

How to make cloud based resources secure from accidental or intentional exposure of user data.

Solution:

CloudKeys are based on DataLock® enabled drives. Data is encrypted / decrypted locally via a connected drive ("encryption translator device"). A block of clear data can be written to the drive and read back as cipher text. Likewise, a block of cipher text can be written and then read back as clear text. All crypto-parameters are stored and managed off-line and off-computer.

Security Measures:

  • Authentication – managed by DataLock® enabled CloudKey
  • Data in transit – encrypted by AES 256Bit CBC
  • Data at rest – encrypted by AES 256 bit CBC
  • Data protection – data is hidden from accidental exposure, intentional hacking, and from cloud provider.

There is no chance of accidental exposure of crypto-parameters. Cloud resident data can not be interpreted until processed by user's CloudKey.

Click here – to contact us about licensing opportunities.

Home | Technologies | Applications | Licensing | Media | Company