Beyond the DNS, Hushmesh develops and operates the "Cryptographic Name System" ™ (CNS ™), a global and universal namespace for all types of entities in both the real-world and the metaverse. Stem IDs are truly random 256-bit identifiers generated and managed within Confidential Computing environments. Thanks to their size and randomness, Stem IDs are both identifiers AND secret keys simultaneously. This inherently solves the binding of a primary identifier with a primary key: they are one and the same. An unlimited number of unique identifiers and keys can then simply be derived from each Stem ID to encrypt and bind any data to any entity with global cryptographic assurance of authenticity.
|
Eliminate Identity Fraud with Cryptographic Identity ™
Equip your employees, partners and customers with person-centric, cryptographic identities that preclude social engineering and insider threats.
|
Eliminate Transaction Fraud with Automated Cryptography
Automate cryptography for your employees, partners and customers to secure logins, preclude transaction tampering, and protect cryptographic keys at all times.
|
Personal Trustees give people physical agency over their own cryptographic identity. They can self-enroll their phone, self-recover with a new phone, and self-revoke their lost or stolen phone entirely on their own and in person. By enabling self-service cryptographic identities, Trustees eliminate the need for anyone else to manage it, or tamper with it. Removing this vulnerability is the only way to preclude social engineering, insider threats and hence identity theft once and for all. "You alone" must be you, so that "only you" can be you.
|
Managing identities centrally makes your organization vulnerable to human errors, social engineering, insider threats and identity fraud. Give everyone their own virtual or physical Trustee for one-to-one, direct identity assertion and cryptographically secure transactions. Focus on authorization and access control built on unclonable cryptographic identities. Connect directly and uniquely with each physical person, and preclude all other humans from tampering with others' connections. |
Even with the best cybersecurity team, securing your supply chain and digital ecosystem is exponentially complex and costly. Your attack surface grows beyond your direct control in a never-ending battle. As a human-centric network, the mesh spans across corporate boundaries and unifies identity, authentication and data security. Eliminate all weak links by inviting, or requiring, your partner organizations to rely on unclonable cryptographic identities for their own employees. |
Blockchains have a fundamental trust and usability issue: trusting transactions implicitly requires trusting the keys they were signed with. Do you trust that people can actually manage cryptographic keys, when they cannot even manage passwords? On the mesh, Trustees automate key management and shield humans from it. Each Trustee can individually sign, verify, encrypt and decrypt data and transactions, with unique personal keys, on behalf of their human owner. |
Every Trustee is a trustworthy personal cryptographic server for its human owner. It can generate an unlimited number of unique keys for each human and each application on the Mesh. Relying-party applications can derive their own cryptographic "Cells" as defined by random "Cell Keys" and derived "Cell Numbers". Applications can then encrypt any content with a "Cell Key", and store it encrypted at some "Cell Number" storage location. Applications can achieve arbitrary "Cell Lines" with conventional chaining operations. |
© 2022 Hushmesh Inc., a Delaware Public Benefit Corporation
|