09:12 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

DeTron Unveils QDK Encryption

QDK establishes public key encryption directly between the sender and receiver certifying the user's identity

SAN FRANCISCO, USA -- (September 27, 2012) -- DeTron Inc., today announced the availability of QDK (Quantum Direct Key), a true innovation in personal trusted identity technology and the first to meet the evolving global demands for cloud-based applications and services. Built with a proprietary algorithm, QDK satisfies all the key elements necessary to protect and empower the individual in a world dominated by cyber-activity: privacy, security, interoperability and ease of use.

QDK is a highly advanced yet efficient, cost-effective and best of all, virtually unbreakable technology. Unlike Public Key Infrastructure (PKI) which requires a third-party to process and issue a security certificate from an independent database, QDK establishes an Encryption Public Key directly between the sender and recipient, certifying the individual's unique identity. Because the system requires only the sender and recipient, it simplifies and strengthens the exchange of information.

QDK functions by generating a pair of public and private keys from two public and secret seed matrices Mp (public) and Ms (secret). The KMC (Key Management Center) is the only owner of Ms and it is always offline. The private key is generated by the KMC from the user's ID:

The public key is generated by any user using known ID:

Mp and the key generation mapping gp(.) are distributed to the user after encryption.

"QDK is the first technology capable of solving the secured cloud identity problem," said Steve Chao, Chief Extraction Architect of DeTron. "As the White House announced last year, the potential for fraud and the weakness of privacy protections found in current online solutions involving user names and passwords preclude better alternatives. If we are going to reach the next level of trust as a society in cyberspace, we must establish a reliable trusted identity solution. QDK is that answer."

The uses for QDK are manifold and will positively impact the entire spectrum of online and digital applications. Cloud-based healthcare and financial records, more secure e-mail, identity-based

- more -

DeTron Inc. Introduces QDK Technology, Enabling True Personal Trusted Identity For Cloud Era--Page 2

cryptography for client side security in Web applications, and public key encryption and signature generation in Web browsers, are just some of the uses. QDK will even support Code Signing--the process of enabling software developers to digitally "sign" applications to confirm authorship and guarantee that code has not been subsequently altered.

To facilitate the acceptance and use of QDK encryption for e-commerce, DeTron Inc. has developed a special device to host a QDK chip. The device will allow users to quickly and securely complete purchases of digital goods and/or services such as music downloads. As an enabler of such

transactions, QDK will outperform DRM (Digital Rights Management) protection for copyrighted material or other forms of digitized intellectual property.

In April 2011, the Obama administration unveiled its "National Strategy for Trusted Identities in Cyberspace". The initiative's goal is to establish a framework whereby private-sector companies and organizations would join to create, test, verify and distribute a voluntary "single credential" solution for Americans. The credential, suitable for deployment on a smartphone, smart card or token, would eliminate the need to remember multiple passwords. Individuals would be able to use the credential to accomplish a host of activities, from banking, shopping, and electronic health record access, to other uses such as browsing the Web with anonymity when desired.

About DeTron:

DeTron Inc. is a leader in global solutions that protect sensitive personal information on wireless devices. The company designs, manufactures and markets integrated hardware and software that delivers secure access to email, phone, text messaging (SMS and MMS), Internet, and mobile applications. Supporting all major wireless network standards, DeTron also partners with third-party developers and manufacturers to create products and services offering assured secure wireless connectivity. Founded in 2012 and based in San Francisco, California USA, DeTron has offices in North America, Europe and Asia-Pacific. Visit DeTron at

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.