SlideShare a Scribd company logo
Unmatched Security for the Digital Ecosystem
Data Breaches is the Increasing Threat
Identity Theft Resource Center
2014 Breach List: Breaches: 480 Exposed: 17,508,452
Report Date: 8/19/2014
Source: http://www.idtheftcenter.org/
Data ENCRYPTION is the answer
Secure Channels Patented Encryption will just do that.
Secure Channels patented encryption
works even if a private cloud is hacked,
because the only thing a hacker can
see is useless bits and bytes without
the set of encryption keys, pattern
keys, scripts, and source code required
to make any sense of it.
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi
Standard
SPHERE
SecureChannels Process Hardened Encry
ption Resource Envelopment
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi
Standard
PKMS2 Introduction
• PKMS2 is a radically new take on standard FIPS certified encryption
practices.
• PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or
Standard)
• One of the inherent difficulties with encryption is the use of a single
key or protocol to encrypt data. PKMS2 solves that problem.
Secure Channels Inc Patent Technology
PKMS2
PKMS2 Solution
• PKMS2 breaks a document into segments and encrypts each segment
individually.
• The protocol/password used per segment is based on a pattern key and can
be as simple or as complex as necessary. This pattern is user-derived and
thus can be as unique as the user wants.
• Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said
keys then the document in encrypted in a round robin fashion rolling
through the pattern.
• The document can be [optionally] initially encrypted as a whole resource
and then segmented and then the resultant encrypted segments can also
be encrypted as a while resource.
Secure Channels Inc Patent Technology
PKMS2
FIPS Certification
• Since PKMS2 only uses FIPS certified third party encryption libraries
then the resultant encrypted document, by definition, is also FIPS
certified.
• The segment size is based on the key bit strength formula (s/8 – 11)
bytes. The segments encrypted with passwords have the length
embedded in the resource.
Secure Channels Inc Patent Technology
PKMS2
Secure Channels Inc Patent Technology
PKMS2
Baked Shrimp
Melt a stick of butter in the
pan. Slice one lemon and layer
it on top of the butter. Put
down fresh shrimp, then
sprinkle one pack of dried
Italian seasoning. Put in the
oven and bake at 350 for 15
min. Best Shrimp you will EVER
taste:)
Ordinary Document
Apply initial
encryption pattern
with key 5 (yellow)
Initial optional encryption
Change angle to see layers
Segment 1 with Process 1
Encrypt
segment
#1 with
key 2 (red)
Encrypt
segment #3
with key 8 (blue)
Segment 3 with Process 3
Encrypt
segment #4
with key 7 (purple)
Segment 4 with Process 4
Encrypt
segment #5
with key 2 (red)
Segment 5 with Process 1
Encrypt
segment #6
with key 6
(green)
Segment 6 with Process 2
Encrypt
segment #7
with key 8 (blue)
Segment 7 with Process 3
Encrypt
segment #2
with key 6
(green)
Segment 2 with Process 2
Apply
optional
final
encryption
with key 4
PKMS2
applied – for
all practical
purposes, the
document is
immune to
hacker
decryption
Final Optional Encryption
Encrypt
segment #8
with key 7
(purple)
Segment 8 with Process 4
Secure Channels Inc
TECHNOLOGY
SPHERE
SecureChannels Process Hardened Encry
ption Resource Envelopment
SPHERE Defined
• SPHERE stands for SecureChannels Process Hardened Encryption and
Resource Enveloping. That might seem to be quite the verbiage but it
is very specific and descriptive. Let’s tear it apart and examine each
piece.
Secure Channels Inc Technology
Sphere
Process Hardened
One of the driving forces was the PKMS21 (Pattern Key, Multi Strength,
Multi Segment) process being patented. Once this patent was done
then all of a sudden SecureChannels had in its grasp the means it was
waiting for: the ability and means to secure data via encryption that
would render the data, for all intents and purposes, unbreakable.
Secure Channels Inc Technology
Sphere
Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
Process Hardened cont.
So here was a means to secure data in a data center but the world was
changing and becoming far more mobile. PKMS2’s depth of security
requires computing power that usually is not available on a mobile
platform. What was needed was a similar technique that would work
on mobile platforms. Fortunately, one of the early enterprise contract
required mobile platform usage so another process was already in
development. This new technique was born in the mobile world and
thus was able to provide a similarly high level of security on mobile
platforms.
Secure Channels Inc Technology
Sphere
Resource Enveloping
• What is needed to resolve a number of security issues is not to
physically surround the data center but to digitally surround the data.
SPHERE’s design is one of wrapping the data in such a way as to make
the data utterly useless without full knowledge of a number of
factors. In the past digital data security has relied solely on the
encryption patterns and key. If the pattern is known and the key is
known then the security of the data is zero. Where SPHERE is
different is that it wraps layered processes around the data in such a
way that it takes
Secure Channels Inc Technology
Sphere
Resource Enveloping cont.
• - knowledge of the manner in which the layers were applied;
• - knowledge of the standard and proprietary encryption patterns;
• - knowledge of all of the keys used;
• - knowledge of the pattern by which the keys were applied;
• - knowledge of the customer defined ‘uniqueness’ of the processing
• The data resource is wrapped or enveloped in such a way that it
creates an incalculable combination of possibilities to decrypt and
thus renders the data virtually unbreakable.
Secure Channels Inc Technology
Sphere
Resource Enveloping cont.
Due to the flexibility of SPHERE an entire scripting language was developed
to drive the encryption process. These scripts can be completely unique per
customer. Each encryption function is fully standalone and thus each script
can be uniquely created in almost an unlimited pattern. One customer might
encrypt their data with a script that specifies functions A,B,C whereas
another customer might specify the same functions but in B,A,C order. This
flexibility adds immeasurable depth to the security of the data. One
customer might use pictures for passwords whilst another might use
Japanese phrases. Since SPHERE has no limit to the number of functions;
number of keys/passwords; no limit to the size of said keys/passwords then
the ability to encrypt data to an unbreakable level is strictly under customer
control.
Secure Channels Inc Technology
Sphere
SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that
it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since SPHERE is
about enabling the customer to secure and encrypt THEIR data THEIR way
and under THEIR control.
Conclusion
• The question was asked earlier “Is the data worth protecting and if so then
how can it be done?” SecureChannels has developed SPHERE such that the
answer to the question is a resounding yes. As has been seen in the news
we can assume data will be stolen but by applying SPHERE to the data the
data itself becomes meaningless outside of a SPHERE enabled system.
Secure Channels Inc Technology
Sphere
SPHERE Deployed
• With the depth of PKMS2, the speed of SHIELD, SecureChannels finds
that it can deploy its security systems into enterprise data centers; PC
workstations; or mobile devices. The sky truly is the limit since
SPHERE is about enabling the customer to secure and encrypt THEIR
data THEIR way and under THEIR control.
Secure Channels Inc Technology
Sphere
Conclusion
• The question was asked earlier “Is the data worth protecting and if so
then how can it be done?” Secure Channels has developed patented
encryption PKMS2 and the answer to the question is a resounding
yes. As has been seen in the news we can assume data will be stolen
but by applying our patent encryption to the data the data itself
becomes meaningless outside of the enabled system.
Secure Channels Inc Technology
Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014
http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html
Black Hat Hackers Fail to Crack Encryption Tech
http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech
Secure Channels Inc Technology
Press release
Unmatched Security for the Digital Ecosystem

More Related Content

PPSX
Secure channels main deck
PDF
Defcon 22-weston-hecker-burner-phone-ddos
PPTX
VoIP Security 101 what you need to know
PDF
Data Access Network for Monitoring and Troubleshooting
PPTX
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
PDF
PPTX
Security in network
PPTX
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Secure channels main deck
Defcon 22-weston-hecker-burner-phone-ddos
VoIP Security 101 what you need to know
Data Access Network for Monitoring and Troubleshooting
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
Security in network
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System

What's hot (20)

PPTX
Voice encryption for gsm using arduino
PPTX
Making SIP Migration Easy
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PDF
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
PDF
581 517-525
PDF
Resume Of Ifthekharul Islam_2016_V1.5
PDF
HP Helion Webinar #5 - Security Beyond Firewalls
PPTX
How to do Cryptography right in Android Part Two
PDF
Talk2 esc4 muscl-ids_v1_2
PDF
The New Landscape of Airborne Cyberattacks
DOCX
Antony's Final Draft v7
PPT
Near field communication (NFC) in android
PDF
Global-WAN - The Swiss Neutral Data Haven
PDF
Home Automation Benchmarking Report
PDF
Palo alto networks NAT flow logic
PDF
Crack ios firmware-nlog2n
PDF
IoT security is a nightmare. But what is the real risk?
PDF
Ccna PrepCenter - IP Subnetting from Networkers
PDF
Hacking Trust Relationships Between SIP Gateways
PDF
Client side encryption without knowing its limits is a ticking time bomb!
Voice encryption for gsm using arduino
Making SIP Migration Easy
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
581 517-525
Resume Of Ifthekharul Islam_2016_V1.5
HP Helion Webinar #5 - Security Beyond Firewalls
How to do Cryptography right in Android Part Two
Talk2 esc4 muscl-ids_v1_2
The New Landscape of Airborne Cyberattacks
Antony's Final Draft v7
Near field communication (NFC) in android
Global-WAN - The Swiss Neutral Data Haven
Home Automation Benchmarking Report
Palo alto networks NAT flow logic
Crack ios firmware-nlog2n
IoT security is a nightmare. But what is the real risk?
Ccna PrepCenter - IP Subnetting from Networkers
Hacking Trust Relationships Between SIP Gateways
Client side encryption without knowing its limits is a ticking time bomb!
Ad

Similar to Secure Channels Presentation (20)

PDF
What Every Software Engineer Should Know About Security and Encryption
PDF
Blog secure channels inc
PPT
Distributed System by Pratik Tambekar
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
PPT
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
PDF
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
PDF
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
PDF
(eBook PDF) Corporate Computer Security 4th Edition by Randall J. Boyle
PPT
Introduction To PKI Technology
ODP
CISSP Week 20
PPT
Introduction to distributed security concepts and public key infrastructure m...
PDF
Secureview 3
PPTX
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
PPTX
How to write secure code
PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PPT
CHAPTER 14 CRYPTOGR AND NETWORK SECURITY
PDF
Practical Enterprise Security Architecture
PPTX
Eloi Sanfelix - Hardware security: Side Channel Attacks [RootedCON 2011]
PDF
ISSA: Cloud data security
What Every Software Engineer Should Know About Security and Encryption
Blog secure channels inc
Distributed System by Pratik Tambekar
Where data security and value of data meet in the cloud brighttalk webinar ...
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
(eBook PDF) Corporate Computer Security 4th Edition by Randall J. Boyle
Introduction To PKI Technology
CISSP Week 20
Introduction to distributed security concepts and public key infrastructure m...
Secureview 3
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
How to write secure code
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
CHAPTER 14 CRYPTOGR AND NETWORK SECURITY
Practical Enterprise Security Architecture
Eloi Sanfelix - Hardware security: Side Channel Attacks [RootedCON 2011]
ISSA: Cloud data security
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Secure Channels Presentation

  • 1. Unmatched Security for the Digital Ecosystem
  • 2. Data Breaches is the Increasing Threat Identity Theft Resource Center 2014 Breach List: Breaches: 480 Exposed: 17,508,452 Report Date: 8/19/2014 Source: http://www.idtheftcenter.org/
  • 3. Data ENCRYPTION is the answer Secure Channels Patented Encryption will just do that. Secure Channels patented encryption works even if a private cloud is hacked, because the only thing a hacker can see is useless bits and bytes without the set of encryption keys, pattern keys, scripts, and source code required to make any sense of it.
  • 4. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard SPHERE SecureChannels Process Hardened Encry ption Resource Envelopment
  • 5. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard
  • 6. PKMS2 Introduction • PKMS2 is a radically new take on standard FIPS certified encryption practices. • PKMS2 stands for Pattern Key Multi-Segment, Multi Strength (or Standard) • One of the inherent difficulties with encryption is the use of a single key or protocol to encrypt data. PKMS2 solves that problem. Secure Channels Inc Patent Technology PKMS2
  • 7. PKMS2 Solution • PKMS2 breaks a document into segments and encrypts each segment individually. • The protocol/password used per segment is based on a pattern key and can be as simple or as complex as necessary. This pattern is user-derived and thus can be as unique as the user wants. • Given ‘n’ number of keys/passwords/etc. and a pattern of usage of said keys then the document in encrypted in a round robin fashion rolling through the pattern. • The document can be [optionally] initially encrypted as a whole resource and then segmented and then the resultant encrypted segments can also be encrypted as a while resource. Secure Channels Inc Patent Technology PKMS2
  • 8. FIPS Certification • Since PKMS2 only uses FIPS certified third party encryption libraries then the resultant encrypted document, by definition, is also FIPS certified. • The segment size is based on the key bit strength formula (s/8 – 11) bytes. The segments encrypted with passwords have the length embedded in the resource. Secure Channels Inc Patent Technology PKMS2
  • 9. Secure Channels Inc Patent Technology PKMS2 Baked Shrimp Melt a stick of butter in the pan. Slice one lemon and layer it on top of the butter. Put down fresh shrimp, then sprinkle one pack of dried Italian seasoning. Put in the oven and bake at 350 for 15 min. Best Shrimp you will EVER taste:) Ordinary Document Apply initial encryption pattern with key 5 (yellow) Initial optional encryption Change angle to see layers Segment 1 with Process 1 Encrypt segment #1 with key 2 (red) Encrypt segment #3 with key 8 (blue) Segment 3 with Process 3 Encrypt segment #4 with key 7 (purple) Segment 4 with Process 4 Encrypt segment #5 with key 2 (red) Segment 5 with Process 1 Encrypt segment #6 with key 6 (green) Segment 6 with Process 2 Encrypt segment #7 with key 8 (blue) Segment 7 with Process 3 Encrypt segment #2 with key 6 (green) Segment 2 with Process 2 Apply optional final encryption with key 4 PKMS2 applied – for all practical purposes, the document is immune to hacker decryption Final Optional Encryption Encrypt segment #8 with key 7 (purple) Segment 8 with Process 4
  • 10. Secure Channels Inc TECHNOLOGY SPHERE SecureChannels Process Hardened Encry ption Resource Envelopment
  • 11. SPHERE Defined • SPHERE stands for SecureChannels Process Hardened Encryption and Resource Enveloping. That might seem to be quite the verbiage but it is very specific and descriptive. Let’s tear it apart and examine each piece. Secure Channels Inc Technology Sphere
  • 12. Process Hardened One of the driving forces was the PKMS21 (Pattern Key, Multi Strength, Multi Segment) process being patented. Once this patent was done then all of a sudden SecureChannels had in its grasp the means it was waiting for: the ability and means to secure data via encryption that would render the data, for all intents and purposes, unbreakable. Secure Channels Inc Technology Sphere
  • 13. Process Hardened cont. So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms. Secure Channels Inc Technology Sphere
  • 14. Process Hardened cont. So here was a means to secure data in a data center but the world was changing and becoming far more mobile. PKMS2’s depth of security requires computing power that usually is not available on a mobile platform. What was needed was a similar technique that would work on mobile platforms. Fortunately, one of the early enterprise contract required mobile platform usage so another process was already in development. This new technique was born in the mobile world and thus was able to provide a similarly high level of security on mobile platforms. Secure Channels Inc Technology Sphere
  • 15. Resource Enveloping • What is needed to resolve a number of security issues is not to physically surround the data center but to digitally surround the data. SPHERE’s design is one of wrapping the data in such a way as to make the data utterly useless without full knowledge of a number of factors. In the past digital data security has relied solely on the encryption patterns and key. If the pattern is known and the key is known then the security of the data is zero. Where SPHERE is different is that it wraps layered processes around the data in such a way that it takes Secure Channels Inc Technology Sphere
  • 16. Resource Enveloping cont. • - knowledge of the manner in which the layers were applied; • - knowledge of the standard and proprietary encryption patterns; • - knowledge of all of the keys used; • - knowledge of the pattern by which the keys were applied; • - knowledge of the customer defined ‘uniqueness’ of the processing • The data resource is wrapped or enveloped in such a way that it creates an incalculable combination of possibilities to decrypt and thus renders the data virtually unbreakable. Secure Channels Inc Technology Sphere
  • 17. Resource Enveloping cont. Due to the flexibility of SPHERE an entire scripting language was developed to drive the encryption process. These scripts can be completely unique per customer. Each encryption function is fully standalone and thus each script can be uniquely created in almost an unlimited pattern. One customer might encrypt their data with a script that specifies functions A,B,C whereas another customer might specify the same functions but in B,A,C order. This flexibility adds immeasurable depth to the security of the data. One customer might use pictures for passwords whilst another might use Japanese phrases. Since SPHERE has no limit to the number of functions; number of keys/passwords; no limit to the size of said keys/passwords then the ability to encrypt data to an unbreakable level is strictly under customer control. Secure Channels Inc Technology Sphere
  • 18. SPHERE Deployed • With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control. Conclusion • The question was asked earlier “Is the data worth protecting and if so then how can it be done?” SecureChannels has developed SPHERE such that the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying SPHERE to the data the data itself becomes meaningless outside of a SPHERE enabled system. Secure Channels Inc Technology Sphere
  • 19. SPHERE Deployed • With the depth of PKMS2, the speed of SHIELD, SecureChannels finds that it can deploy its security systems into enterprise data centers; PC workstations; or mobile devices. The sky truly is the limit since SPHERE is about enabling the customer to secure and encrypt THEIR data THEIR way and under THEIR control. Secure Channels Inc Technology Sphere
  • 20. Conclusion • The question was asked earlier “Is the data worth protecting and if so then how can it be done?” Secure Channels has developed patented encryption PKMS2 and the answer to the question is a resounding yes. As has been seen in the news we can assume data will be stolen but by applying our patent encryption to the data the data itself becomes meaningless outside of the enabled system. Secure Channels Inc Technology
  • 21. Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014 http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html Black Hat Hackers Fail to Crack Encryption Tech http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech Secure Channels Inc Technology Press release
  • 22. Unmatched Security for the Digital Ecosystem