Home
List your patent
My account
Help
Support us
Identity Protection Technologies-Encryption Synchronization Method
[Category : - Indentification and payment methods]
[Viewed 556 times]
Problems:
No exiting technologies can stop mass data breaches because they cannot prevent insider-assisted hacking and abusive legal process. Despite the massive number of U.S. patent grants in data security technologies, 2021 is the worst year in data breaches and all happened to those big technical companies, repeatedly. Now, 47% of U.S. residents have their identities data stolen. It is a matter of time to see their damages by identity theft. Even people's house titles can be stolen, criminals can escape from be arrested, and innocent people are caught as "criminals" to be prosecuted. There is no solution to ending all kinds of nightmares.
A Disruptive Solution:
A highest data security must be based on the "do not tell" principle, which must have the highest data security.
The claimed invention is a method for encryption synchronization and user authentication, which allows a user to set up an encrypted mark created by using an encryption algorithm and a user-provided encryption key. The true user or owner is one who can decrypt the mark. The method does not leave any information that would be used by server internal staff or an authentication service provider to acquire user account credentials or stored data (the data is useless), and thus preventing hackers from acquiring such information to be used to gain unauthorized access to stored user data. Other user data can be protected in the same way with the maximum data security.
How secure it is?
To crack such security, the hacker would need:
1.84×10^55 machines for one year; or
1.83×10^55 years by running one machine; or
Costs: 10^44 times of the Gross World Product (GWP).
So, the security measure will have same security like "do not tell" because the encryption cannot be cracked if the data are encrypted by using 256-bit algorithm. The nightmare of mass data breaches will be the history.
Financial informationI have developed a complete line of technologies reflected in four U.S. patents and foreign patents. The technologies will finally solve this $2.1 trillion of financial loss from data breaches. The true beneficial impacts are far more than the estimated damages. The real damages include consumers emotion, adverse impact on their health, U.S. government enforcement, tax revenues, corporations (stock, lost time and diminished performance due to employees) and insurance companies are not fully included.
If you have funding, skills or talents for bringing this line of technologies to the light of day in the world, please contact me. I will consider any possibilities.
Asking price:
Make an offer
[ Home
| List a patent
| Manage your account
| F.A.Q.|Terms of use
| Contact us]
Copyright PatentAuction.com 2004-2017
Page created at 2025-04-03 10:22:37, Patent Auction Time.