Investors Hangout Stock Message Boards Logo
  • Mailbox
  • Favorites
  • Boards
    • The Hangout
    • NASDAQ
    • NYSE
    • OTC Markets
    • All Boards
  • Whats Hot!
    • Recent Activity
    • Most Viewed Boards
    • Most Viewed Posts
    • Most Posted
    • Most Followed
    • Top Boards
    • Newest Boards
    • Newest Members
  • Blog
    • Recent Blog Posts
    • Recently Updated
    • News
    • Stocks
    • Crypto
    • Investing
    • Business
    • Markets
    • Economy
    • Real Estate
    • Personal Finance
  • Market Movers
  • Interactive Charts
  • Login - Join Now FREE!
  1. Home ›
  2. Stock Message Boards ›
  3. Stock Boards ›
  4. Zerify Inc (ZRFY) Message Board

This is HUGE!!! I am TOO EXCITED to wait until the

Message Board Public Reply | Private Reply | Keep | Replies (10)                   Post New Msg
Edit Msg () | Previous | Next


Post# of 82690
(Total Views: 1246)
Posted On: 08/13/2018 12:51:48 AM
Posted By: Hate Liars
This is HUGE!!! I am TOO EXCITED to wait until the morning to post this. The below link is directly from ACS (Advanced Cyber Security) website. ACS (which is using Strikeforce' technology) is integrated in to Intel's Trusted Platform Module AND chip!!! Keystroke technology is NOW INTEGRATED into Intel's Module's and Chips. WOW !!

https://docs.wixstatic.com/ugd/5870e3_af261a2...07e37f.pdf

Below is the full article and I put the key paragraph here :

KTLS™ (Keystroke Transport Layer Security) protocol is currently
integrated in to Intel’s TPM
for
enterprise endpoint desktop
deployments. If Intel (or other)
TPM is available for mobile
devices KTLS™ protocol can be
deployed.

If a TPM (Trusted Platform Module) chip is available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public
key cryptosystem), which resides on the TPM chip (and never leaves it).
• The encrypted Session Key is stored in secure memory shared by all KTLS™
system components. The TPM Master Key Pair is generated by the TPM chip
every time the computer is powered up. This can be accessed via the NULL
hierarchy.
• If a TPM chip is not available for access to the KTLS™ system components, the
Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key)
comprised of a combination of a hard coded part and a randomly generated part.


Introduction to ACS Keystroke Transport Layer Security™ (KTLS™)

Up until now, enterprises and government agencies
have lacked the ability to fully protect their endpoints
from a zero day keylogger, the single biggest threat that is
leveraged in the first stages of almost all advanced
threats. A keylogger, a primary component of all malware
and advanced persistent threats, is a type of surveillance
software that has the capability to record every keystroke
an employee makes on their keyboard. In addition, most
keyloggers come with the ability to change their form
(polymorphic) and go on undetected as they quickly
spread between the endpoints within the Enterprise.
KTLS ™ Protocol’s basic premise is that strong
cryptography should always begin at Ring 0 and not only
at Layer 4, Transport Layer, of the OSI.

KTLS™ Overview:
Keystroke Transport Layer Security™ (KTLS™) is an ACS
patented cryptographic protocol that provides for the
encryption and transport of keystrokes originating from the
kernel at the time of secure boot, entry in to any
application, web application or web browser. While SSL
and TLS begin strong cryptography at Layer 4 or, the
Transport Layer within OSI, KTLS™ begins strong
cryptography from the kernel level at ring 0 and encrypts
all keystrokes.
KTLS™ protocol can be utilized in both endpoint desktop
(PC and MAC) and endpoint mobile (IOS and Android)
environments as a primary component of endpoint
security. Endpointlock™ is the commercial product name
by which KTLS™ protocol is implemented within an
enterprise.
The primary goal of the patented KTLS™ protocol is to
provide strong cryptography at the time of keystroke entry
to protect the initial transmission of usernames and
passwords (as required by HIPPA, PCI 8.2.1 and 8.2.1a
and Homeland Security’s Critical Infrastructure Protection
Guidelines (“CIP”) and subsequent keystrokes entered in
to any program or application.

WWW.ADVANCEDCYBERSECURITY.COM

U.S. Department of Defense
TPM Requirements
The United States Department of
Defense (DoD) specifies that
"new computer assets (e.g.,
server, desktop, laptop, thin
client, tablet, smartphone,
personal digital assistant,
mobile phone) procured to
support DoD will include a TPM
version 1.2 or higher where
required by DISA STIGs and
where such technology is
available." The TPM is
anticipated to be used for device
identification, authentication,
encryption, measurement, and
device integrity.

KTLS™ protocol is currently
integrated in to Intel’s TPM for
enterprise endpoint desktop
deployments. If Intel (or other)
TPM is available for mobile
devices KTLS™ protocol can be
deployed
.

WWW.ADVANCEDCYBERSECURITY.COM

When secured by KTLS™ protocol, connections between the keystroke and
applications have the following properties:
• Keystroke Cryptography begins within the kernel at Ring 0.
• Both encryption and decryption occur directly within the application without any
modification to the application required.
• The keys for this symmetric encryption are generated uniquely for each
connection and are based on a shared secret that is generated directly from the
Trusted Platform Module (“TPM”).
• The negotiation of a shared secret is both secure (the negotiated secret is
unavailable to Keyloggers and cannot be obtained, even by an attacker who
places himself in the middle of the connection) and reliable (no attacker can
modify the keystroke transmission during the negotiation without being detected
and kernel layer alerts being generated).
• The Key management is the management of cryptographic keys. KTLS™ uses
the AES algorithm with a key size of 256 bits to encrypt keystrokes. AES is a
symmetric encryption scheme. The same key is used to encrypt and decrypt.
• The Session key is generated once per session (KTLS™ loaded/unloaded). It
can be generated either by a TPM chip (if it is there), or else by a built-in Random
Number Generator.
• If a TPM chip is available for access to the KTLS™ system components, the
Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public
key cryptosystem), which resides on the TPM chip (and never leaves it).
• The encrypted Session Key is stored in secure memory shared by all KTLS™
system components. The TPM Master Key Pair is generated by the TPM chip
every time the computer is powered up. This can be accessed via the NULL
hierarchy.
• If a TPM chip is not available for access to the KTLS™ system components, the
Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key)
comprised of a combination of a hard coded part and a randomly generated part.

Beyond our imagination ???


(22)
(0)




Zerify Inc (ZRFY) Stock Research Links


  1.  
  2.  


  3.  
  4.  
  5.  






Investors Hangout

Home

Mailbox

Message Boards

Favorites

Whats Hot

Blog

Settings

Privacy Policy

Terms and Conditions

Disclaimer

Contact Us

Whats Hot

Recent Activity

Most Viewed Boards

Most Viewed Posts

Most Posted Boards

Most Followed

Top Boards

Newest Boards

Newest Members

Investors Hangout Message Boards

Welcome To Investors Hangout

Stock Message Boards

American Stock Exchange (AMEX)

NASDAQ Stock Exchange (NASDAQ)

New York Stock Exchange (NYSE)

Penny Stocks - (OTC)

User Boards

The Hangout

Private

Global Markets

Australian Securities Exchange (ASX)

Euronext Amsterdam (AMS)

Euronext Brussels (BRU)

Euronext Lisbon (LIS)

Euronext Paris (PAR)

Foreign Exchange (FOREX)

Hong Kong Stock Exchange (HKEX)

London Stock Exchange (LSE)

Milan Stock Exchange (MLSE)

New Zealand Exchange (NZX)

Singapore Stock Exchange (SGX)

Toronto Stock Exchange (TSX)

Contact Investors Hangout

Email Us

Follow Investors Hangout

Twitter

YouTube

Facebook

Market Data powered by QuoteMedia. Copyright © 2025. Data delayed 15 minutes unless otherwise indicated (view delay times for all exchanges).
Analyst Ratings & Earnings by Zacks. RT=Real-Time, EOD=End of Day, PD=Previous Day. Terms of Use.

© 2025 Copyright Investors Hangout, LLC All Rights Reserved.

Privacy Policy |Do Not Sell My Information | Terms & Conditions | Disclaimer | Help | Contact Us