► Applications ► Communications ► COTS Platforms |
See the VS2document: "Value Proposition and Platform Overviews"
VS2 founders and developers authored 26 patents and each have, on average, 30+ years of computer design experience across a broad range of technologies including: hardware, fault tolerant, massively parallel, floating point, and graphics processors; routers, and compilers.
With unique patented and patent-pending technologies and a veteran team, our goal is to help create inherently secure and safe computing environments.
VS2 Core Team - click here
The VS2 team is available to help customers adapt these technologies to accomplish their missions.
Technologies |
|
Detects and protects against attacks on communications channels, content, or infrastructure… |
The problem:
Current encrypted communication technologies are not resistant to
Quantum attacks or are prohibitively computationally expensive.
An encryption algorithm that cannot change faster than an attacker's quantum computer can decipher it, risks the threat of stolen or compromised data.
The solution:
KSC (for Kaleidoscope Secure Channel) is a patents-pending technology that
like its namesake, changes its encryption scheme for every half-byte of data.
We believe that Kaleidoscope does this faster than quantum computers, currently under development around the world, can decipher them. These encryption schemes are selected randomly, with constantly increasing entropy, from literally billions of choices.
KSC can even be used, in conjunction with existing cyphers such as AES-256, to increase their resistance to attack. KSC's pending patents, for which most claims have been accepted by the USPO, are only awaiting final approval and issuance.
Current status:
Early iterations of the technology have been implemented and tested
successfully in a customer environment. Further development and productization are
required to produce final prototypes for new implementations.
Please refer to the following additional information:
► KSC Use Cases ► KSC Abstract and Characteristics ► KSC White Paper (available with signed NDA) |
Technologies |
|
Detects, protects, and provides continued operation through hardware faults or software anomalies… |
The problem:
Applications that are not self-protecting or self-correcting are vulnerable to attacks.
A single computer, or single copy of an application, cannot verify that it has not been compromised. Two copies cannot determine which has been compromised.
The solution:
xRA (for Extended Resilience Architecture) is a patented technology that
applies the concept of consensus to detect and correct executing application code in
real time using three or more computers and/or application replicas.
Much as Distributed Ledger/Blockchain technology creates and compares multiple copies of data to eliminate corruption, xRA creates application replicas and compares their execution results in real time. The resulting configuration helps to eliminate code corruption and enables continued operation in spite of equipment failures or code anomalies from any cause. The benefits are significantly increased failure resilience and improved cybersecurity.
Current status:
The technology is operational in prototype form and can be demonstrated today
in several implementations, including a local process control demonstration and a cloud
or hybrid-cloud based demonstration. xRA requires funding to obtain the technical
resources for productization and to create template based provisioning.
Please refer to the following additional information:
► xRA Use Cases ► xRA Technology Overview ► xRA IoT Demonstration Video |
We are seeking forward-looking organizations and investors with whom to team for the development of new solutions that advance the state of the art in the resilience of mission- and life-critical information systems and the secrecy of the vital data they manage.
If you are interested in learning more, please contact:
Tom Wetmore, Co-Founder and Chief Marketing Officer
(781) 424-4899
or
John Conway, Co-Founder and CEO