Summary FAQ Customers Contact TOC
Let us work together!
Some planned projects
Discover the unlimited possibilities.
If P=NP Participate See also
TPVS shares its novel and
technology with the world by adding a new layer of protection to
hardware products. Its use can lead to unexpected and otherwise
security and privacy features. This is much more than just a better
data protection, it is a whole new experience, it can provide unbounded
potential and enormos added vualue both for your company and your
Our policy is openness, as much as possible about our technology, plans and intentions. So, if you are from the press, media or Internet news services, and if you have any question about our projects, the universal program encryption (UPE) technology or TPVS itself, feel free to contact us. You are always welcome!
Here are the titles and very brief descriptions of our future projects. They are among the patentable inventions (about 300) of TPVS based on our universal program encryption (UPE) technology. We add new and new titles as time and our business policy allows.
If you have any idea for further projects or you have a special need, feel free to contact us. We also offer consulting services and assistance on how to enhance existing or new products by TPVS powerful and flexible universal program encryption (UPE) technology.
Preventing reverse engineering - general tools
Encryption of executables - One send us his executables, we transform it to an encrypted program by UPE. It is a very ambitious project, but allows a wide range of applications and new business models. If applied in its full power without restrictions and care, it may be very controversial.
Blind encryption of executables - The previous, without knowing what we encrypt. This might be very controversial, even dangerous. But with responsible, traceable and responsible business partners and some restrictions it can have very exciting promises.
Partially open source software - Some technology is open, some is secret. A possibility to flexibly merge the open source and closed products. Any open source software which uses UPE will be of this type.
Tamper-proof, secure operation systems - This is a very big and strategically important project for TPVS to make a secure computing environment with the possibility of patenting it. TPVS surely will not do it alone.
Secure program encryption
Encryption proof systems - The issuer can prove what he does without revealing how to do it.
Tamper-proof software authorization - One can run only certain software on a machine, from a list or from certain developers. Total policy control. Protection against a wide range of viruses, worms. It uses our secure key hiding technology.
Off line copy protection of audio / video and software - This is what the software and recording industry needs. This solution is for those who suffer from crackers, pirates and copyright unfriendly peer-to-peer file distribution systems. It uses the secure key hiding technology.
Copy protection of digital content and software in a networked environment - In such environments one can achieve total control over the copies of software and other digital content by a very simple and fast tamper-proof server-client relationship provided by us. It uses our secure key hiding technology.
DRM (Digital Right Management) systems - A tamper-proof enhancement of DRM systems. Actually, this extension makes them really secure, provided severe content degradation is not tolerated.
Signed digital pictures / video / music etc - Copyrighted products can be viewed / listened only if certain conditions are met.
Copyright friendly file sharing systems - Peer-to-peer file sharing systems could be updated to be copyright friendly. The recording industry could gain its control back over its content - provided the crackers do not tolerate excessive quality degradation of content. Flexible and secure solutions.
Software-police virus / worm solutions - This may be a little controversial. One could release viruses / worms which send warning or block usage if software / music file etc is found which is expired or violates copyright law in any other way.
Media content integrity protection
Mass media content integrity protection - Your message gets through the hands of lot of different parties. Someone in the middle may tamper with it for example by applying subliminal manipulation. They may steal your ad revenue, break the law or use it for covert political control or influence. Even if caught you cannot prove who and where the tampering happened. We can prevent this by our tamper-proof devices and intrusion detection.
Secure distributed and peer-to-peer computing
Secure anonymous distributed peer-to-peer computing and file access - You can use the computing resources and files of other guys, what they are willing share with you, without being able to find out the ID of each other and tampering with unshared files and resources. The worst nightmare of the recording industry and law enforcement without other solutions.
Secure e-commerce solutions - All the necessary tools are implemented on a tamper-proof software.
Secure viral marketing solutions - No one can change your message, implement malicious code into software carrying your viral marketing campaign, so you can unleash your viral marketing software solutions without fearing the "wild". It uses our secure key hiding technology. One of the most promising application.
Secure identification - New solutions for an old problem.
Privacy friendly personalized advertisements - EU compatible personalized advertisement and customer service. Your customer gets personalized ads and customer service while preserving his / her privacy. Dissolves the contradiction between privacy concerns (like EU rules) and the needs of the information economy. On large scale hardware solutions may turn out to be necessary.
Anonymous revealing of (checked) private info - One can provide a lot of info about himself, without revealing his ID. The info may be used only to compute aggregated functions, like correlation, variance, expected value etc. Personalized service can be received and provided without possibility of identification.
Secure, tamper-proof shopping carts - No access to maintenance passwords, credit card numbers, etc. anymore. A must for e-commerce.
Connection of info to ID's - New methods for an old problem. New solutions to identification based on biological data.
Voting systems and financial applications
Distributed voting - Complicated voting protocols becomes possible without a center.
Distributed anonymous company boards - Build your anonymous companies in a distributed environment.
Distributed anonymous stock market - A possibility for a truly global stock market without any national control. Serious political concerns.
Bets on the future - Experts can build virtual, imagined companies in a secure environment. They fund research which fill the hole in their plans. This is toward the privatization of research. Secure market for patent / copyright holders, core specialists and R & D. An extremely challenging and promising project. It may help to mobilize the estimated 6 trillion USD value sitting in dormant patents. May solve the structural under-sourcing of scientific research. At the end scientists and engineers salary may beat financial experts' and technological development speed up ...
Inflation proof electronic money, money with spending restrictions - Users may check the policy of the issuer and take part in the decisions what and how the money is used for.
Distributed working environments
Secure distributed software development - A must for web based software developers.
Remote fabrication control - No one can change or find out your production methods.
Secure distributed offices - An office does not have to be in a room.
Remote administration tools - One may provide a secure backdoor and well defined access rights for maintenance purposes to trusted companies or persons. It may mean the dawn of a new service industry. A must. (Well, this is actually the same as one of the most fearsome possible application of UPE, the secure tamper-proof backdoor... Things are very tricky.)
Structured access to databases - One can build every type of restrictions into access to the (/its) database. Infinitely many applications.
Blinded search in databases - One can search and make aggregate info retrieval, statistics in remotely stored databases without revealing the search terms or any other info.
Personalized anonymous medical and genetic databases - A compromise between privacy and the needs of genetic research. May be revolutionary in medicine.
Secure anonymous financial databases - Government, banks, etc. may collect detailed financial data without having access to private info and identity. The info may be used only to compute aggregated functions, like correlation, variance, expected value etc. It may make anonymous or privacy friendly taxation possible. May provide a solution to a big political problem related to e-commerce.
Personalized privacy friendly search engines - Personalized search and data retrieval, without revealing one´s ID and preferences. May cause an upgrade in search engine technology. For big applications probably a special hardware (FPGA) is needed.
Mails with one key - For sending private messages to crypto dummies. Encrypted mail is opened if conditions are met. Not really secure against devoted professionals, but (it is) safe against the intrusion of most people or organizations.
Secure mail system solutions - A protection against several kinds of attacks, like cleptography (key stealing) or executable modification of some popular mail systems. It uses our secure key hiding technology.
Secure quotation and signature technology for discussion groups - Automatically transfer signatures to part of messages if they are copied.
New generation tamper-proof remailers - Tamper-proof version of mixmaster type remailers. You are secure even if all are run by the same provider... No more info can be gained than by the usual traffic analysis. May send steganized messages to message pools. Can be securely run by individuals having ordinary internet account. All the usual political problems arise, or even much worse.
Anonymous tamper-proof mailing lists - A server runs thousands of mailing lists. By a secure key exchange, one can participate in some of them without making it possible for anybody to figure out to which one. Using remailers the connection to the mail server can be anonymous. By merging with a tamper-proof remailer, it may make traffic analysis substantially far more difficult. All the usual political problems arise.
Secure browsers and web servers
In browsers: Logging in / out securely - No password catches anymore.
Secure web servers - A new layer of security is added by the secure key hiding technology. Only signed homepages are presented. The site cannot be defaced (i.e. its content modified) even if hacked. DOS (denial of service) attacks are still possible. It has strategic importance in the development plans of TPVS. A must for everybody who runs a site with any importance.
Law enforcement related
Restricted cryptography - It allows, for example, to encrypt only credit card numbers and personal data but not other type of text. A must for e-commerce in countries where using strong cryptography is banned. Might be controversial because it may encourage restriction on using cryptography where it is still allowed.
Tamper-proof intrusion detection - Even if you are hacked, you may collect enough evidence to send the guys to prison or more.
Unbreakable site blocking / filtering - No more scandal because of the list of blocked sites. This one nobody can circumvent. The usual political problems. Our view is that the list of blocked sites should be open, but the owner may decide that his resources can be used for what.
Distributed PK infrastructure - As its title indicates. A must.
Distributed secure tamper-proof clock - As the title indicates. New methods for an old problem.
Sending messages / programs for the future - As the title indicates. New methods for an old problem.
Secure Internet infrastructure
Tamper-proof site authentication - No more unwanted redirection. VeriSign tries sg like this, but their system can be circumvented, if the site is hacked and the key hiding technology is cracked. By making it impossible, one can build a truly secure site authentication infrastructure.
Secure annotation technology - You can annotate your massage to sites, documents, without anyone being able to remove it. Might be very controversial.
Anonymous web access - Similar to remailers, but for the web. But, in this case, traffic analysis can be a problem if one wants fast access. All the usual political problems arise.
WWW marries USENET - Optimal secure hypertext file distribution system and caching using other people resources without allowing modification of content.
Protection against distributed denial of service (DDOS) attacks - The vulnerability to distributed denial of service type attacks is probably one of the biggest and most fearsome weakness of the Internet. So far there is no real protection against it. By anonymous and tamper-proof sharing (and protecting) of computer resources during an attack one can rise the stakes dramatically. It seems that no other way to protect against such an attack if automated mass break ins are feasible and routing is an essential feature of the network.
Password protection - A popular method for password protection and storage is that the sequence 0000... encrypted by the password as an encryption key is stored in a file. If someone has access to this file, then he can mount a brute force attack. Even pre-compute dictionaries of weak passwords and store it on large discs. This is a popular method to make mass break ins, as a prerequisite of several forms of DDOS attacks and even low budget crackers can do it. To prevent this we provide tamper-proof password protection solutions. The password file is so inherently connected and merged with the system that even its encrypted form cannot be acquired without downloading a huge set of data, which in most case is not feasible covertly.
Secure tying of networks - One can use the most secure software if an attacker breaks in and change it to something else. If hardware and software are not inherently interconnected, then there is only one protection against such a "brain surgery". One can tie his software and data to other parts of the system and the network so as that if its integrity is hurt, then it stops or modifies service. If its usage is widespread, it may occur that the attacker has to covertly download and upload the whole network in very short time, which is not feasible.
Optimizing chips to run encrypted programs - UPE can cause sometimes substantial slowdown. By optimizing chips for UPE, we can beat it.
Credible photo / video / audio recording / phone calls etc - After the commercial availability of real time video tampering, not even live TV can be trusted anymore. We loose the last bastions of credibility, if we do not build trust in the recording of events. By tamper-proof signature, time stamping and GPS data we can gain back our right to be credibly informed.
FPGA implementation of mission critical parts of encrypted software - Solution to the very difficult task of beating the slowdown barrier.
Tamper-proof usage meters - From TV channels to electricity consumption...
Smart- and info-card solutions - Smarter and more flexible solutions for a difficult problem.
Tamper-proof alarm systems - Burglars will play with your system till the end of the universe, till they physically decay or till the police arrives.
Copy protection by tamper-proof hardware - Watermarking documents and tamper-proof copy machines, so that recorders recognize it and allow copying only if authorized. If they usage is mandatory, in the long run it can increase copyright protection of things which are traditionally not well protected, like books, articles, magazines, music, films. Also may solve the problem of preventing faithful banknote copying as copy technology improves dramatically.
Tamper-proof tracking devices, data collection - Well, a new form of prison is feasible this way. Mild offenders can spend (part of) their term outside of prison under very close supervision. It may help to improve their adapting to society after their prison term and may result in more successful behavioral correction programs. Also may provide legally binding evidence. Naturally, a lot of political, ethical and human right problems arise.
Assistance and advice to develop secure computing environment and copy protection.
Optimization of software for encryption and security - UPE decreases performance. A consultation for reengineering to optimize to specific needs.
Consulting for developing secure organizations.
We support preventive
research by our free consulting
the possible dangers caused by UPE.
Quantum computing & cryptography
If quantum computing is feasible, implement UPE for quantum computers - P. Shor's fast factoring algorithm for quantum computers causes a lot of headaches to cryptographers. Although no algorithm is known for quantum computers which crack UPE, we cannot exclude it, so try to be prepared for that.
Cryptography if there are quantum computers or P=NP
Cryptography if there are quantum computers or
P=NP - Life should not stop here for TPVS and cryptography ...
Really big keys are still useful. True program verification is also
possible for programs running in non-deterministic polynomial time.
Only two extremes work. Total isolation or maximal connectedness and
And hundreds of other possible applications ...
If you are willing to participate or invest in some of the above projects, you have any idea for further (possibly joint) projects or you have particular (/specific) needs not mentioned here, feel free to contact us. We also offer consulting services and assistance on how to enhance existing or new products by the powerful and flexible universal program encryption (UPE) technology of TPVS.
See also our development plans.
Summary FAQ Customers Contact TOC