-->
Toll Free
844-633-7734

Local
845-381-5539

COMMERCIAL COMMUNICATIONS LLC.
{a Connecticut LLC since 1995}
14 MONTGOMERY STREET
MIDDLETOWN NY, 10940

ComComLLC.Com

Fax:
845-344-2175

Email:
Feedback@comcomllc.com

QLS is a new patented security protocol that is exponentially more secure.
Applications include virtually all communicacations and information transmitals
Hacking, malware, check fraud, unsafe communications, etc.
are soon to be soon history.

The information in this presentation is either patent protected or the proprierty property of commercial communications LLC.

Summary:

QLS Encryption is more secure
than current protocols.
Encryption and logon are not transmitted over a network.
Parameters are autonomously genereated on authorised devices.
Parameters change autonomously without causing delay.
Mulitiple layers of changes preclude pattern recognition.

Un-authourized decoding
of even a very short (9 carchter) message requiers
9,762,060,000,000,000,000,000,000,000,000,000,000,000,000,000,000,
000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000
TIMES MORE EFFORT than conventional encryption.
AND, more importantly,
Un-authourized decoding of longer messages requires
even more exponentially difficult decoding and delay.
Un-authourized decoding becomes inpractical

QLS is easier to use yet
more secure than Multitasking or Keys
And yes, you can still use conventional logons.

QLS recognizes authorized devices.
Additional user inputs are not necessary.
Un-authorized devices are blocked.

Privacy
Qls does not have access to user messages.
Only authrorized devices can recieve information.
Only authrorized devices can sucessfully send information.
Third party verifications is not necessary

Cloud/Data storage
Information is stored using Qls encryption.
Different relationships can have different access limits.
Third party use of information can be controled by owner.

Obfuscation
Qls creates an exponentially more secure environment.
Qls can also provide proptietaty features
that further increase security.


Basic Practices:
Autonomous Encryption
Is exponentially more secure than current protocols!
   1) Identical parameters are independently
    generated on authorized devices.
2) Parameters are NOT transmitted via a networks.
3) Parameters change autonomously without causing delay.
4) Every one way comunication can be unique and be verified.
5) The ods against un-authorized decoding are astronomical.
    Autonomous Device Logon
Qls assures that only authorized devices have access.
1) Autonomous Device Logon do not require user input.
2) Yet it is exponentially more secure!

And yes, if you want, you can still use conventionable logons.
Absolute Authentication
Every one way comunication is confirmed.
1) Valid Qls encrypted and device logon are required to gain access.
2) Un-authorized devices, and any malicions content are blocked.
3) Messages altered in transit are detected!
Spyware, Malware, Ransomware, Dos, Vishing, Phone tracking, Tunneling,Virus,
Spoofing, Decoding, DNS.Man in middle,Deepfake, ero day, Injection, Voldemort.
Etc Can do NO harm
Hacking, Phishing, User ID's and Personal information.
Etc can no longer provide access.

 

 

Our most asked question is:
If it is so easy, why hasn't anyone else done it?
That is a good question.
You should ask "anyone else".
P.S. To do it half assed is easy. To do it right, is not that easy.
Our most common objections is
Encryption doesn't work that way!
Another good question. Yes current encrytion does not work this way.
However, this is a new unique and superier protocol.

The patent office yould not otherwise have approve it.

 

 

For more information please call
Toll Free    844-633-7734     Local    (001) 845-381-5539
Copyright 2020 - 2024 Commercial Comunications LLC. Non discolsure agreement may be required.

 

 

 

Sample Applications:
The information in this presentation is either patent protected or the proprierty of commercial communications LLC.
"Optional" = not required, may incur extra charge.  "Autonomous" = Values change automatically   "Customized" = Custom App
Malicious
Software
Un-Authorized devices
Un-authorized devices can not gain access.They can not install, modify, or activate axisting software.
Un-authourised devices and their content are eliminated.
Authorized devices
Scans for malicious software are only needed
on authorised devices that are suspect.
Credit &
Debit
Cards

"optional"
Each use changes Encryption
Duplicate, improper, and re-used devices are obvious and blocked. Even if proper user ID is provided.
The maximum financial risk is one transaction.
Even if the card has not been reported.
Check
Fraud

"optional"
Every check is verified.
The check signer sends a copy to the bank using Qls encrption.
The check presented to the bank must match the abovr.
Check fraud is elimenated.
Device
Logon

"Autonomous"
Device Logon requires no user action.
Access is limited to authorized devices.

Each one way communication must satisfy Qls criteria. Improper results cause a disqualification.
Un-authorizsed intrusions are blocked.
Cloud
Services

"optional"
"Relationships" have unique restrictions.
For example:
* One relationship might decodes data.
* Another might change account information.
* Some other may be allowed to do both.
You can control who has access to your information.
Software
Updates

Updates are criticial.
Computers, cell phones, satelites, cars, etc.
Qls Assures that:
Only authorized devices can comunicate.
Improper information results in disqualification.
Updates always come from and go to the correct parties.
Identity
Theft

"optional"
Information from newly opened accounts
is passed Via Qls for evaluation

Limited retained information is Qls encrypted
Application data that conflicts with or mimicks other existing account(s) is evaluated before the new account is opened.
Criminals can not use your identity.
EMAIL

"optional"

Qls constantly changes encryption.
It is exponentially superior
to common email protocols processing the same message.
*EMails are exponentially more secure.
*Longer emails are even more secure.
*Only authorized devices can receive emails
*In transit alterations are detected and regected.
Law
Enforsement

"optional"
Your comunications are your personal property.
Our process provides no means for us
to view your communications
There are two exceptions:
1) If you provide us with information
2) Warranted decoding assistance sought by law enforsemet
Messages
cell phones, phones, radios, etc.
"optional"
Most of these work via network.
Elements of which can be intercepted, decoded, and altered.

Qls constantly varyies encryption. Thus making interception impractical.

Medical
Government
Commercial Enterprice
"customised"
Multiple relationships and devices for larger enterprices requireng more flexibility, and control

The same basic Qls practices,
can be modified to suit your needs.

Military

Aero-Space
"customised"

Short Term Security
Communications are exponentially encrypted
Un-authorized decoding is impractical, and can be imposible .
Authorized decoding has no delay. Adversaries can not penetrate.
Long Term Activities
Autonomous encryption precludes interference.
Imbeded devices can later be activated as appropriate.
(explode, locate, activate, deactivate etc.)

Typical Instalations
Clasified Data (Max security)
Protect Utilities/Infrastrucure
QLS exlusive devices

Custom Configurations
for large scale operations

Confidential (High security)
Proprietary information,
medical records, research, etc

QLS exlusive devices
and/or qls cloud contractor
B to B (Variable security)
Secure data,payroll etc
Elimenat malicious activity

QLS or conventional to prep
then use Qls to transmit
Business/Consumer
Protect finanical transactions
Purchase Orders, etc.
Buyer can search without limits Then use Qls to pay
Consumer/Consumer
Personal pictures and private
messages are protected
Unauthorised access and changes are detected.
For more information call
Toll Free    844-633-7734     Local    845-381-5539
Copyright 2020 - 2024 Commercial Comunications LLC. Non discolsure agreement may be required.