Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

10/5/2012
09:12 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

DeTron Unveils QDK Encryption

QDK establishes public key encryption directly between the sender and receiver certifying the user's identity

SAN FRANCISCO, USA -- (September 27, 2012) -- DeTron Inc., today announced the availability of QDK (Quantum Direct Key), a true innovation in personal trusted identity technology and the first to meet the evolving global demands for cloud-based applications and services. Built with a proprietary algorithm, QDK satisfies all the key elements necessary to protect and empower the individual in a world dominated by cyber-activity: privacy, security, interoperability and ease of use.

QDK is a highly advanced yet efficient, cost-effective and best of all, virtually unbreakable technology. Unlike Public Key Infrastructure (PKI) which requires a third-party to process and issue a security certificate from an independent database, QDK establishes an Encryption Public Key directly between the sender and recipient, certifying the individual's unique identity. Because the system requires only the sender and recipient, it simplifies and strengthens the exchange of information.

QDK functions by generating a pair of public and private keys from two public and secret seed matrices Mp (public) and Ms (secret). The KMC (Key Management Center) is the only owner of Ms and it is always offline. The private key is generated by the KMC from the user's ID:

The public key is generated by any user using known ID:

Mp and the key generation mapping gp(.) are distributed to the user after encryption.

"QDK is the first technology capable of solving the secured cloud identity problem," said Steve Chao, Chief Extraction Architect of DeTron. "As the White House announced last year, the potential for fraud and the weakness of privacy protections found in current online solutions involving user names and passwords preclude better alternatives. If we are going to reach the next level of trust as a society in cyberspace, we must establish a reliable trusted identity solution. QDK is that answer."

The uses for QDK are manifold and will positively impact the entire spectrum of online and digital applications. Cloud-based healthcare and financial records, more secure e-mail, identity-based

- more -

DeTron Inc. Introduces QDK Technology, Enabling True Personal Trusted Identity For Cloud Era--Page 2

cryptography for client side security in Web applications, and public key encryption and signature generation in Web browsers, are just some of the uses. QDK will even support Code Signing--the process of enabling software developers to digitally "sign" applications to confirm authorship and guarantee that code has not been subsequently altered.

To facilitate the acceptance and use of QDK encryption for e-commerce, DeTron Inc. has developed a special device to host a QDK chip. The device will allow users to quickly and securely complete purchases of digital goods and/or services such as music downloads. As an enabler of such

transactions, QDK will outperform DRM (Digital Rights Management) protection for copyrighted material or other forms of digitized intellectual property.

In April 2011, the Obama administration unveiled its "National Strategy for Trusted Identities in Cyberspace". The initiative's goal is to establish a framework whereby private-sector companies and organizations would join to create, test, verify and distribute a voluntary "single credential" solution for Americans. The credential, suitable for deployment on a smartphone, smart card or token, would eliminate the need to remember multiple passwords. Individuals would be able to use the credential to accomplish a host of activities, from banking, shopping, and electronic health record access, to other uses such as browsing the Web with anonymity when desired.

About DeTron:

DeTron Inc. is a leader in global solutions that protect sensitive personal information on wireless devices. The company designs, manufactures and markets integrated hardware and software that delivers secure access to email, phone, text messaging (SMS and MMS), Internet, and mobile applications. Supporting all major wireless network standards, DeTron also partners with third-party developers and manufacturers to create products and services offering assured secure wireless connectivity. Founded in 2012 and based in San Francisco, California USA, DeTron has offices in North America, Europe and Asia-Pacific. Visit DeTron at http://www.detrontech.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...