Beruflich Dokumente
Kultur Dokumente
1
This synergy and complementarity between these 3 people made
it possible to move from a project phase to marketable finalized
products.
2
Our objectives are the security and protection of data
transmission systems and of the personal data of users.
3
We also have a charter that boils down to 5 points:
1. Trust
2. Transparency
3. Security
4. Utility
5. Swiss Quality
4
I repeat:
5
The first thing you need to know is that all Alph@TaV Systems
Projects are linked together by a binary information processing
algorithm that we have designed and developed namely called
Alph@TaV Data-Fragmentation.
6
What characterizes Alph@TaV Systems tools and software is that
the end user really controls security and access to data according
to his needs, and this in a fully customizable way.
Either you are allowed to access secure data, either you are not,
and in this case nobody will be able to do anything about it,
including ourselves within Ex0-SyS.
7
Here is an overview of the tools and software that make up the
Alph@TaV Systems Projects suite:
8
Then we have Alph@TaV Network.
• Alph@TaV Network is a new kind of Network Protocol that
provides point-to-point secure transmission of binary
information with hardware identification over NON secured
networks.
9
Fifth tool: Alph@TaV Data-Fingerprint.
• Alph@TaV Data-Fingerprint makes it possible to extract a
unique digital data fingerprint from any files without the need
to entirety read them from the beginning to the end.
10
Comes after: Alph@TaV Cloud.
• Alph@TaV Cloud is an online securing and high data volume
reduction service. It is based on our Alph@TaV Network and
Alph@TaV Data-Slimmer projects.
11
Our latest project is THE Alph@TaV Pod.
• Alph@TaV Pod is the Ultimate Solution for all Alph@TaV
Systems projects bundled through a physical, scalable and
portable personal user hardware interface unit.
12
This current campaign is targeting our flagship product which is
currently in marketable version and for which we need support
to promote it and to go to next steps.
13
It secures your data, allowing you to encode all types of files and
folders, giving you absolute protection against all unauthorized
third parties access.
14
To conclude, here are the 5 characteristics that make Alph@TaV
Vault a useful and innovative software:
15
3) Hardware restriction capability
• Your computer’s hardware and your storage devices can also
serve as locks and can be used as physical access restrictions
to your secure data.
16
5) Quantum computers resistant solution
• The computing power does not anymore counts to secure or
decode datas.
From now only counts the way in which the binary
information has been fragmented and the means of being able
to be to access them if you are authorized and to finally give a
coherence back to the whole.
You will find all useful information about the Alph@TaV Vault
Software in the presentation brochure that is included in this
campaign, as well as on our website:
17
I repeat:
18
It also includes all important planned next software evolutions
updates and releases.
The Version 3 dot 0 will be the fully refactored one that will be
ported to be used on multi-OS platforms.
19
On behalf of the whole Ex0-SyS Team, thank you for having paid
attention to this presentation, we give you an appointment to
join the Ex0-SyS Projects.
You will be very welcome to follow the solutions that’s builds The
Great Wall of Secrecy.
20