0 Replies Latest reply on Oct 6, 2018 10:46 AM by nialld

    how do I submit a business proposal for an opportunity to use a patent pending technology

    nialld Lurker

      The technology uses public key cryptography to implement two-person integrity for privileged operators of secure networks, servers and databases. The technology reduces incidences of errors that can compromise sensitive information. More importantly, the technology protects against a variety of attacks including the insider threat attacks and a variety of external attacks such as social engineering attacks or password compromise attacks.


      I am an individual inventor looking for a corporate partner to develop, integrate, and market the technology as a security option for protecting sensitive data. The technology offers an additional layer of protection for sensitive data such as health care data, proprietary information, personal identifiable information and other types data that should be protected from compromise or modification.