Right Data at the Right Time to Produce the Right Insights. Safely.
Innovate how data is accessed and shared without losing control.
- Simplify data aggregation with trusted execution environment
- Manage and control access policies into your sensitive data
- On demand secure enclave insertion at scale
Innovation Leader for Solving Complexity in Data and App Collaboration Safely
Database system for protecting and securing stored data using a privacy switch. *US 10,860,735 Issued 08/2020
A system and method is provided for storing user data records in a database to protect stored data from data breaches, where each of the user data records including a plurality of user attributes. One or more user attributes in each of the user data records is designated as a private attribute and is obfuscated and replaced by credentials that can be verified by a verifying entity without disclosing the private attributes. Applications of the privacy switch technology are shown for handling data breaches in database systems, thereby providing fundamental improvements to the security and utility of database technology.
Consistency and consensus management in decentralized and distributed systems. *US 10,686,601 Issued June 2020
A method for achieving consensus amongst a distributed and decentralized set of computers, devices or components in a network interacting via messaging is presented. The method does not rely on the availability of an overall ledger that is consulted for every interaction. Rather, the interacting components communicate directly with each other via messages that contain proofs of consistency that may be used to achieve local consistency amongst the interacting components. Local consistency guarantees global consistency. For regulatory and record keeping purposes, use of an overall ledger may be contemplated for regulatory and record keeping purposes. The latter may be updated by the interacting devices via an asynchronous updating mechanism.
Policy Controlled Sharing of Data and Programmatic Assets *US 17/939,314
Patent shows how a first and second isolated and protected computing environment can be constructed using hardware-provided encryption/decryption keys. A method is described by which the second environment may generate a certificate and present it to the first environment verifying its integrity. Methods are described by which encryption and decryption keys may be shared between the first and second environments.
System and Method for Securely Processing Data Containing PII, Private and Confidential Information *US 63/440,165
Patent shows how data containing PII, private and confidential information can be encrypted using encryption keys generated by programs running in isolated and trusted computing environments. Methods are shown for creating and sharing encrypted assets. Methods are shown associating access policies with encrypted data and code assets.
System and Methods for sharing and trading user data and preferences between computer programs while preserving user privacy. *US 10,320,781 Issued June 2019
Systems and methods are provided which allow computer programs or other entities to share user data and information so that users may be authenticated, and their preferences shared among entities in networked environments and machines. Cryptographic credentials are generated for these purposes. While the credentials can be shared to provide entities with user authentication and preference data, a salient feature of the sharing technology is that the user is always in control of, and integral to, the sharing protocol. Moreover, the sharing preserves the privacy of the user's data.
Testing and other data communicated using trust models in decentralized and distributed systems. *US 11,522,705 Issued Dec 2022
A method for communicating information relating to test results of a user (e.g., patient) includes obtaining test results of a user, deriving an assertion from the test results and a proof associated with the assertion. A method is shown to verify the proof that the assertion correctly represents the test results without revealing the underlying test results.
User controlled trusted and isolated computing environments. *US 11,409,846 Issued Aug 2022
Systems and techniques described herein are concerned with providing supervisory control of computer programs. A method for executing application code defining a computer program includes providing a “kill switch” to the operator, which allows the operator to disable the computer program without becoming aware of the state and data of the computer program.
System and method establishing a trust model for shared content on the Internet. *US 11,218,315 Issued Jan 2022
A method is provided for validating an assertion provided by a web resource. The method includes using cryptographic credentials, an assertion and an associated proof. The method involves verifying the proof that the assertion accurately reflects the data underlying the assertion without revealing the underlying data.
System and methods for maintaining user privacy in applications providing products and/or services. *EP 3494484A1 Issued April 2022
Decentralization of application programs is a growing trend. It is known that user data communicated to different components of a transaction or application may be linked to derive a composite profile of users. A system and methods are presented that maintain user data privacy in decentralized networks, possibly containing multiple sensor devices. Applications to controlling smart devices and service portability across providers are shown.
Co-founders meet in fall 2021 to leverage emerging trends in hardware support for cryptographic features leading to fully encrypted memory for protected execution environments. Data and code assets can remain encrypted at rest, in transit and during use. SafeLiShare is founded in August 2021.
SafeLiShare raises seed round funding in Spring 2022 from Taiwania, Ta Ya and Forth Ventures. Initiates PoC trial with customer prospect. Announces beta version of secure data platform providing protection, access control and privacy to data and application workloads containing shared assets. Public Key Infrastructure (PKI) is managed by programs executing in isolated and protected execution environments. Distributed authorization policies are enforced in TEEs.
SafeLiShare extends its data platform to support secure collaborative computing. Multiple organizations may contribute data and code assets with their associated authorization policies. Application workloads are constructed and executed in TEEs preserving specified policies.
“The emerging trend in computing technology is that application executions and PKI management are moving into protected memory spaces where encrypted data will be decrypted and all actions recorded by immutable audit logs. Certain protections will become obsolete while others will become available natively.
Organizations need to keep pace with this sea change or lose ground to fast moving competitors. The situation is analogous to the Internet's use of encrypted communications.”
“The challenge is that while organizations are increasing their use of data, they often struggle to do it securely and with compliance. SafeLiShare seeks to reverse the never-ending cycles of adding more protections which could have been handled very differently with Confidential Computing ubiquity.”
Dr. Cheng Wu , General Partner
Taiwania Capital Management
The SafeLiShare leadership team is comprised of visionaries with decades of distributed computation, network protocols, cloud security and ML experience. Every team member is obsessed with delivering customer value and protecting them from the evolving threat landscape.
SafeLiShare simplifies data policy enforcement, allowing organizations to quickly access data without sacrificing security
March 23, 2023
Eliminate Attack Surface from Inside Out – Shamim Naqvi
SafeLiShare delivers tamperproof security from inside out across clouds and eliminate algorithmic complexity attacks and reverse never-ending cycles of defense using policy controlled Confidential Computing with secure enclave technology.
March 17, 2023
Defining Confidential Computing
Confidential Computing (CC) refers to a set of technologies and practices that aim to protect data while it is being processed in computer systems.
Curious about SafeLiShare
Want to discover how to make your data collaboration easy a drop of command? We’re here to help.