QLS Encryption is more secure than current protocols.
Encryption and logon are not transmitted over a network.
Parameters are autonomously genereated on authorised devices.
Parameters change autonomously without causing delay.
Mulitiple layers of changes preclude pattern recognition.
Un-authourized decoding
of even a very short (9 carchter) message requiers
9,762,060,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000
TIMES MORE EFFORT than conventional encryption.
AND, more importantly,
Un-authourized decoding of longer messages requires
even more exponentially difficult decoding and delay.
Un-authourized decoding becomes inpractical
|
|
QLS is easier to use yet
more secure than Multitasking or Keys
And yes, you can still use conventional logons.
QLS recognizes authorized devices.
Additional user inputs are not necessary.
Un-authorized devices are blocked.
|
Privacy
Qls does not have access to user messages.
Only authrorized devices can recieve information.
Only authrorized devices can sucessfully send information.
Third party verifications is not necessary
Cloud/Data storage
Information is stored using Qls encryption.
Different relationships can have different access limits.
Third party use of information can be controled by owner.
Obfuscation
Qls creates an exponentially more secure environment.
Qls can also provide proptietaty features
that further increase security.
|
Basic Practices:
Autonomous Encryption
Is exponentially more secure than current protocols!
1) Identical parameters are independently generated on authorized devices.
2) Parameters are NOT transmitted via a networks.
|
3) Parameters change autonomously without causing delay.
4) Every one way comunication can be unique and be verified.
5) The ods against un-authorized decoding are astronomical.
|
|
Autonomous Device Logon
Qls assures that only authorized devices have access.
1) Autonomous Device Logon do not require user input.
2) Yet it is exponentially more secure!
And yes, if you want, you can still use conventionable logons.
|
Absolute Authentication
Every one way comunication is confirmed.
1) Valid Qls encrypted and device logon are required to gain access.
2) Un-authorized devices, and any malicions content are blocked.
3) Messages altered in transit are detected!
|
Spyware, Malware, Ransomware, Dos, Vishing, Phone tracking, Tunneling,Virus,
Spoofing, Decoding, DNS.Man in middle,Deepfake, ero day, Injection, Voldemort.
Etc Can do NO harm
Hacking, Phishing, User ID's and Personal information.
Etc can no longer provide access.
|
|
Our most asked question is:
If it is so easy, why hasn't anyone else done it?
That is a good question.
You should ask "anyone else".
P.S. To do it half assed is easy. To do it right, is not that easy.
|
|
Our most common objections is
Encryption doesn't work that way!
Another good question. Yes current encrytion does not work this way.
However, this is a new unique and superier protocol.
The patent office yould not otherwise have approve it.
|
|
Sample Applications:
The information in this presentation is either patent protected or the proprierty of commercial communications LLC.
"Optional" = not required, may incur extra charge. "Autonomous" = Values change automatically "Customized" = Custom App
Malicious Software
|
Un-Authorized devices
Un-authorized devices can not gain access.They can not install, modify, or activate axisting software.
Un-authourised devices and their content are eliminated.
|
Authorized devices
Scans for malicious software are only needed
on authorised devices that are suspect.
|
|
|
|
Credit & Debit Cards
"optional"
|
Each use changes Encryption
Duplicate, improper, and re-used devices are obvious and blocked.
Even if proper user ID is provided.
|
The maximum financial risk is one transaction.
Even if the card has not been reported.
|
|
|
|
Check Fraud
"optional"
|
Every check is verified.
The check signer sends a copy to the bank using Qls encrption.
The check presented to the bank must match the abovr.
|
|
Check fraud is elimenated.
|
|
Device Logon
"Autonomous"
|
Device Logon requires no user action.
Access is limited to authorized devices.
|
Each one way communication must satisfy Qls criteria.
Improper results cause a disqualification.
|
Un-authorizsed intrusions are blocked.
|
|
|
Cloud Services
"optional"
|
"Relationships" have unique restrictions.
For example:
* One relationship might decodes data.
* Another might change account information.
* Some other may be allowed to do both.
|
|
You can control who has access to your information.
|
|
Software Updates
|
Updates are criticial.
Computers, cell phones, satelites, cars, etc.
|
Qls Assures that:
Only authorized devices can comunicate.
Improper information results in disqualification.
|
|
Updates always come from and go to the correct parties.
|
|
Identity Theft
"optional"
|
Information from newly opened accounts
is passed Via Qls for evaluation
Limited retained information is Qls encrypted
|
Application data that conflicts with or mimicks other existing account(s)
is evaluated before the new account is opened.
|
|
Criminals can not use your identity.
|
|
EMAIL
"optional"
|
Qls constantly changes encryption.
It is exponentially superior to common email protocols processing the same message.
|
*EMails are exponentially more secure.
*Longer emails are even more secure.
*Only authorized devices can receive emails
*In transit alterations are detected and regected.
|
|
|
|
Law Enforsement
"optional"
|
Your comunications are your personal property.
Our process provides no means for us
to view your communications
|
There are two exceptions:
1) If you provide us with information
2) Warranted decoding assistance sought by law enforsemet
|
|
|
|
Messages
cell phones, phones, radios, etc.
"optional"
|
Most of these work via network.
Elements of which can be intercepted, decoded, and altered.
Qls constantly varyies encryption.
Thus making interception impractical.
|
|
|
|
Medical Government Commercial Enterprice
"customised"
|
Multiple relationships and devices for
larger enterprices requireng more flexibility, and control
|
The same basic Qls practices, can be modified to suit your needs.
|
|
|
|
Military Aero-Space
"customised"
|
Short Term Security
Communications are exponentially encrypted
Un-authorized decoding is impractical, and can be imposible .
Authorized decoding has no delay. Adversaries can not penetrate.
|
Long Term Activities
Autonomous encryption precludes interference.
Imbeded devices can later be activated as appropriate.
(explode, locate, activate, deactivate etc.)
|
|
|
|
Typical Instalations
Clasified Data (Max security)
Protect Utilities/Infrastrucure
QLS exlusive devices
Custom Configurations
for large scale operations
|
|
Confidential (High security)
Proprietary information, medical records, research, etc
QLS exlusive devices
and/or qls cloud contractor
|
|
B to B (Variable security)
Secure data,payroll etc Elimenat malicious activity
QLS or conventional to prep
then use Qls to transmit
|
|
Business/Consumer
Protect finanical transactions Purchase Orders, etc.
Buyer can search without limits
Then use Qls to pay
|
|
Consumer/Consumer
Personal pictures and private messages are protected
Unauthorised access and changes are detected.
|
|
|
|
|