Data Security Infrastructure News

Quantum computers and large super-computers are threatening existing digital security infrastructure. Some new process proposed and published as patents by Carrousel Digital allow to circumvent these deficiencies. The weakness of data security infrastructure come from the fact that computer facilities could break the encryption keys used in our IT systems, from communication to websites to login procedures.

Carrousel Digital has come up with some patented schemes to overcome this weakness. The two main schemes allow, for one secure signatures, for the other one secure data transport. Those schemes are mad available through licensing.

The safe signatures scheme shall embed a random number in the e-document to be certified, allowing for its signature with a one-time keys i.e. a secret used only once and that cannot be recomputed.

The safe data transmission scheme uses photons to transport the information, coding many bits on each photon and making sure the photons have not been copied or hijacked during transportation. This process is a step further Quantum Key Distribution (QKD) as it encodes the information on photons as opposed to solely generating random numbers. It can also use the quantum safe signature scheme to avoid the man in the middle attack to which non quantum safe signatures schemes are vulnerable.

Carrousel Digital has also come up with other procedures to allow the use of the above technologies, such as secure onetime key storage on memory and also such as safe distribution of pairs of one-time keys, using the internet. Contrarily to one might think of QKD, our data transmission scheme can also be organised centrally thanks to a photonic router that connects to all the terminals of a group with only one fibre, whereas QKD, sofar, had to use a direct optical fibre between each member of the group. 

The data transmission scheme is fault tolerant, allowing for data loss in the optical fibres , optical components and free space., allowing transmission for instance up to 200 km threw optical fibres or threw low orbit satellites, from the earth.

Our one time key distribution system allows for temporary storage of one time keys that can therefore also be used offline, enabling data security on offline data transfers that is on device to device transfer where the devices are talking to each other directly or threw a dedicated reader ; therefore providing a mean for securing e-cash : cash on a card, and e-identity documents that can be resilient to networks faults.

We have also an architecture for a fixed antenna  geo-localisation system that can be  an alternative to GPS but that also works indoor, and that can be used for instance to locate the receiving party of a cash transaction. Contrarily to current GPS, our geo-localisation  can emit signals from fixed antennas and might bring resilience to existing glocalization infrastructure.

Finally, we have devised an IP (intellectual property) allowing to chain offline transactions and allowing therefore for the verification , once a data-card reports to a server, that all transactions that occurred offline and that transmitted money to each other were funded.