PASERI

What’s secret sharing scheme?

paseri e1

The difference between Key encryption methods: General Key encryption technology is to encrypt the original data with key.

paseri e2

PASERI protects your data on notebooks and PCs from unwanted access. Comparable to the concept of a pirate's treasure map that is torn in parts, PASERI divides your data and saves it on different storage media, e.g. your notebook's hard disk and a USB memory drive. What makes PASERI different from today's security technologies? Known procedures like encryption and password protection are not safe when it comes to hacker attacks or careless use of passwords. PASERI closes this security gap by physically dividing the data onto two storage media and offers data security that has been certified by the German authority for product quality, the T?V. The data is divided in such a way, that the individual parts do not allow access, reading, changing or reconstruction of the original information. All you have to do for perfect data protection is to keep your mobile storage device, e.g. a USB memory stick, apart from your notebook or PC. How does PASERI work? After the installation of PASERI an additional virtual hard disk will be available in your Windows system. Once you have connected a mobile storage medium to your notebook or PC you can save the files you want to protect on your virtual hard disk and you can access, copy open, change or delete the files as usual. If you save a file on your virtual PASERI drive, the data is automatically divided.

Secret sharing scheme and the secret dispersion method library to run the AONT method based on OAEP at high speed. We have developed PASERI by the direction of Hideki Imai’s (IACR Fellow , National Institute of Advanced Industrial Science and Technology Research Center for Information Security length) guidance to introduce Whats Goichiro Hanaoka like ( our technical adviser , Doctor of Engineering , National Institute of Advanced Industrial Science and Technology Research Center for Information Security researcher ) of the original, it is carried out and implementation that enables further high-speed processing (patent pending ) , we are use in our products and services , and the sale of as a library . Library is built into the application, financial, protection of personal information and confidential information in various fields such as medical care, it is used in a safe transport and storage.

paseri e3