On a personal level, encryption is what keeps our personal data secure. Whether shopping online or doing our banking, encryption scrambles data to ensure hackers can’t misuse this information. On or about 600 BC, the ancient Spartans used a device called a scytale to send secret messages during battle. This device consisted of a leather strap wrapped around a wooden rod, and the message could only be deciphered when the reader used the correct sized rod to reveal the message – and this first cypher was created.
Over the years, encryption methods have evolved with the advancement of technology. Now, powerful computers provide the means for encrypting information. But, because these methods exist in a world full of hard and fast rules, the adage, “that which can be built can be broken” fairly posits the state of encryption within the cybercrime community today.
Hackers using an array of mega-processors and software tools, given enough time, can gain access to almost any encrypted data, communications system, infrastructure or control system. Refer to this website’s Impact page for examples of some of the most prolific thefts of data or systems control in history.
The purpose behind Analog Guard™ begs one essential question: “Is there a simple explanation for why converting digital to analog makes it difficult or near impossible to hack or decipher whatever is being encrypted?”
All existing software tools for decrypting digital data are only capable of digital encryption. Even if there were developed software tools that could handle analog encryption of digital data, the time required for processing would bring them out of phase [with the data stream] even if they could find the beginning of each phase/cycle.
This is not the case with hardware tools for decrypting analog encryption of digital data (which do not exist and we intend to develop), that will require the encryption code as an input, therefore they will be synchronized with the “wave” (a feature that a hacking tool would not be capable of because all hacking tools apply the “trial and error” method).
That means hacking analog encryption of streamed digital data would be essentially impossible, hacking recorded [analog] encrypted digital data would only be possible using (currently non-existent) hardware tools and extremely difficult unless the hacker has the encryption keys in advance…
It would also be essentially impossible to hack pre-recorded analogically encrypted digital data with any software tools because no hacking software tools would apply an input of the analog encryption key. Software tools are incapable of that as software code has to be digital, and specifically wave processing software has no encryption/decryption/hacking capabilities [they can’t have such], not to mention that they convert all the data to digital in order to handle it, otherwise they’re “handicapped.” Streamed “analog encrypted’ digital data would be completely protected against hacking.
Recorded analogically encrypted digital data could only be hacked using hardware tools that currently do not exist and would be extremely expensive to develop (millions of dollars) and impossible to hack using any software for previously mentioned reasons.
There are already effective hacking software tools for deciphering digitally encrypted digital data, including very high-quality ones and [most] cyber terrorists have them. Therefore no one could say that digitally encrypted digital data is safe. As we all know, even the Pentagon, which is considered the institute with the highest security measures (including data security, of course) that applies the hardest to crack digital encryption keys was successfully hacked. Therefore, digital encryption could never be considered “hack proof,” whether the data is streamed or saved.
Carefully considering the above, a picture of what Analog Guard™ is, or will be capable of doing, regarding analog encryption becomes much clearer. Analog Guard™ will be a “lock” unto digital treasures unlike any other; and will likely be unbreakable for many years to come.
In summary, digital data encryption is under constant attack by more sophisticated, ever evolving, digital approaches to hacking.
The object of cyber-security is to create a data “lock” that can’t be “picked.” To do that, using the Analog Guard™ system, digital communications/control signals are encoded using analog methods (rather than digital) by applying integrated analog signal modulation and demodulation techniques. The last layer of analog security derives from utilizing our patented, award-winning, Signal Advance temporal-shift detection technology.
By integrating these analog technologies and modulation methods, remote access is essentially eliminated. As a result, unlike digital encryption methods, remote “hacking” would be virtually impossible. Onsite (local) or pre-recorded signal “decryption” would become extraordinarily difficult and data extraction even more daunting due to the sheer complexity of the resultant modulation function used to encode the data. It is believed that demodulating analog encrypted signals will require a new level of sophisticated signal analysis equipment along with analog signal expertise well beyond the skillset of even the most advanced hackers today.
In summary, Analog Guard™ is actively developing the next generation of hardware encryption to advance well ahead of adversaries.
Digital data, the “1’s and 0’s”, can be manipulated using sophisticated math designed to crunch iterations and permutations of 1’s and 0’s until such iterations and permutations achieve the desired result. “Every company will be hacked…” and the standard response to these events comes more in the form of “bolt on” versus “built in.” Analog Guard™ will change that. (Quote from Roger Grimes, Herjavec Group, 2019 Official Annual Cybercrime Report).
Just as encryption techniques have (and continue) to evolve to meet the ever-greater demand placed on security by countless scores of hackers, including those that are international and government-funded, so too have analog encryption methodologies been forced to evolve. Yet, the fundamental differences between the two remain the same; and just as encryption protocols have evolved from 128 to 192 and now 256-bit encryption, so too is analog encryption evolving from the use of a single methodologies to the integration of multiple methods – including the implementation of a proprietary temporal methodology based on Signal Advance’s proprietary technology, thereby, making decrypting the analog encrypted data extremely challenging if not impossible.
It comes down to the differences. 256-bit encryption can still be hacked given the sophisticated hacking tools available to the upper strata of hackers. That said, however, using multiple analog techniques coupled with Signal Advance technologies would make remote hacking virtually impossible and local hacking (connected to the analog host) extremely difficult – especially in real-time.
The Analog Guard™ technology, as a Signal Advance product, substantiates its claims of near impossible hacking due to its incorporation of Signal Advance’s temporal advancement technology.
To date, Signal Advance has acquired the following patents:
Patent | Patent No. | Date Granted | |||
China | ZL 200880015288.2 | Nov. | 2012 | ||
United States | 8452544 | May | 2013 | ||
Mexico | MX/A/2009/00921 | Apr. | 2014 | ||
Europe | EP 08 75 4879.8 | Jan. | 2017 | ||
India | 3465/KOLNP/2009 | Aug. | 2019 |
The European patent was validated in France, Germany, Ireland, Italy, Spain, Switzerland (and Lichtenstein) and the United Kingdom based on demographics and per capita spending on medical and other technologies that could benefit from the implementation of Signal Advance technology as well as analog encryption.
Additional patent submissions related to specific applications, Signal Advance circuit configurations, and signal processing techniques to improve signal fidelity, the implementation of Signal Advance technology to analog encryption as well as the various combinations of analog modulation methodologies are in preparation. In addition, In addition, the “ANALOG GUARD” trademark has been published by the USPTO.
IP defense strategy is based on the implementation of application-specific Signal Advance technology designs, and novel analog modulation methods enabling novelty and non-obviousness in patent claims. In addition, the associated analytical methods remaining trade secrets. Potential infringers would have to expend undue time and money to develop such methods to pursue individual applications. This application-specific approach and related trade secrets gives Signal Advance, and a significant competitive advantage with its Analog Guard™ technology.
ENCRYPT/DECRYPT: DATA STORAGE SCENARIO
-
-
-
-
Prevents captured files from being exposed, utilized or manipulated
-
Protects stored data regardless of location
-
-
-
ENCRYPT/DECRYPT: COMMUNICATION / CONTROLS
-
-
-
-
-
-
Secures transmitted signals – including data
-
Prevents captured signals from being utilized or manipulated
-
-
-
-
-