As information on the CipherDrive Network is transformed into sub-block packets for client-to-client communications, CipherDrive will produce two one-half key sets that will be combined by content creators and recipients into a single common to both parties key that is utilized to cipher encode and decode transmitted sub-blocks and their tens-of-thousands of bit cipher encodings.
How CipherDrive’s Client-to-Client Communication Works
CipherDrive networking is based on the unique production of half a cipher key on a primary network and second half a key on a secondary network, both of which are ciphered and sent to the content creator and content recipient. The content creator will combine the two half keys to encode and send encrypted content to the recipient, while the content recipient will assemble the two half keys to decrypt the content.
This dual half/half key architecture is monitored by DynAlysis Software Analytics, Inc a testing and reporting agency whose independent evaluation confirms that CipherDrive’s primary network never sends its half keys to its secondary network, and conversely that the secondary network never sends its half keys to the primary network.
ASIC Chip Set Performance Enhancers
CipherDrive’s client-to-client networking will be facilitated by ASIC chips, which enhance speeds and provide protection from the inspection and corruption caused by key loggers, memory readers, social media feeds, and other AI sensors and devices that steal and manipulate confidential data. Porous, easily compromised devices will be transformed into secure computing conduits at the end-to-end points of our seamless network.