DECENT Decryption Contract Enforcement Tool Logo

Protecting Your Data Just Became Safer and Easier

Using blockchain technology and a patent pending invention, Assured has built a lightweight, highly effective key management system which allows for higher levels of encryption, with legally warranted access ONLY to the device in question to support law enforcement investigations.

With DECENT™, the dilemma the FBI and Apple encountered in 2016 has been resolved—a win for both privacy rights and law enforcement.

To view this content as an infographic, please click on image below:

DECENT Decryption Contract Enforcement Tool Infographic Preview

What is DECENT™?

decent graphic with locks and key

DECENT™ is a software and cryptography system that provides emergency access to encrypted data without compromising its security.

DECENT™ manages data encryption keys, in a way which protects individual privacy rights, minimizes the risks of key loss or data loss, and allows emergency access to data.

DECENT™ is tied to a country-specific legal contract, which may provide for company-specific, customer-specific or device-specific right of access. Emergency access to the decrypted data is given only when the requirements of the legal contract have been satisfied.

The Three Keys

DECENT™ splits the data encryption/decryption process key into three keys, any two of which can perform decryption.

Key 1

Controlled by the data owner or their device.

Key 2

Retained by a trusted service provider, with safeguards and protocols in place, or even an enterprise IT department.

Key 3

Mathematically tied to a sophisticated legal contract using blockchain technology. Because none of the keys can perform decryption on their own, the risks of hacking or theft are virtually eliminated.

data encryption key showing 3 keys: User Key (Ku), Service Key (Ks) and Escrow Key (Ke)

2 Keys Required for Decryption

Transparency

Blockchain Currency Logo for DECENT transparency@1x-8

A blockchain-based protocol creates a public audit trail which documents any decryption event which was permitted by the contract, even when a participant is forced to act against their will.

The DECENT™ architecture can be integrated into Enterprise encryption systems, or it can be built into the firmware of devices such as smart phones.

DECENT™ eliminates the need for any single entity to store master decryption keys, thereby removing the risk of theft and other liabilities and burdens normally carried by device manufacturers or service providers when they store their customer’s decryption keys.

Typical Applications

Access to data provided without the owner’s cooperation if the owner is unavailable or under legal investigation.

Graphic showing cloud with a lock and devices around it

Access to data provided to the cloud backup of an encrypted device if that device and its stored decryption key are damaged or lost.

Possible Scenarios

Scenario #1: Telco and Government Pursuit of Authorized Investigations

A major Telco wants to differentiate themselves from their competitors by providing each customer with an encryption package that is integrated into the Telco’s OS. The encryption system can simply be pushed to customers via an update. In the past, perhaps your country’s government could access this Telco’s customer data at will. Not anymore. Privacy wins while authorized need-to-know access is seamlessly and quickly granted.

Service Provider Graphic
Graphic Showing Government Has No Decryption Key
Graphic Showing Government Has Golden Key to Decrypt Data
Global Law Graphic for Privacy

Because the Telco is now using a higher encryption system with DECENT™, the government will not be able to access it without following the pre-set written and approved rules built into DECENT™.

In the U.S., the government would need a court order before the data is released. The Golden Key* key will be made available to the government for only that phone for the authorized period of time. The blockchain may be instructed to create a brand new set of keys when the government’s use of their Golden Key expires.

The government doesn’t run the risk of public outcry over backdoor break-ins or surreptitious surveillance.

*What is a Golden Key?

Golden Key graphic with border

When the 3rd key is created and stored, it’s an escrow key. When it’s properly released, it transforms its function and becomes a Golden Key. The Golden Key then expires at the end of the authorized period when a fresh escrow key may be re-established.

Scenario #2: Mobile Device Manufacturer vs. Law Enforcement

A terrorist has attacked innocent civilians in your country. Though the terrorist dies during the attack, their smart phone is recovered. The phone could have valuable intel on future attacks, but it is locked and the smart phone manufacturer is unable or unwilling to break encryption on the phone to allow law enforcement to retrieve information. The manufacturer argues that if they weaken the design to enable law enforcement access, it hurts the security of every other smart phone, creating a serious privacy issue. Both parties have valid points, so how do you solve this ethical, practical and legal dilemma?

Cell phone with a question mark on the screen to illustrate how to unlock cell phone legally

Both parties have valid points, so how do you solve this ethical, practical and legal dilemma?

Block chain key graphic

In the U.S. and other nations, court orders authorize legitimate, limited access to someone’s smart phone, and DECENT™ provides swift, dedicated access. To protect everyone’s privacy, an approved court order triggers the release of a Golden Key which permits only one phone to be open without any impact on anyone else’s encryption.

With blockchain technology, Assured can generate billions of unique keys in short order, allowing each device to have a unique key with its own unique encryption code.

The precision and accuracy of the DECENT™ system is a powerful tool for both law enforcement and privacy advocates. Without having to resort to break-ins or backdoors, authorized parties can access data legally and ethically in real-world time while protecting the privacy rights of every other smart phone user.

Scenario #3: Rogue Insider Locks Corporate Data Threatening Enterprise Banner with Technology

Picture a disgruntled employee, recently fired from his job at a large corporate enterprise. The employee decides to get even by using their administrator credentials to lock the company’s entire data system.

It’s easy to envision this scenario; it has happened many times at both small and large businesses, resulting in chaos and expensive workarounds.

Graphic showing locked database
Graphic showing laptop with a lock on it to illustrate how to legally access data

Assured has developed sophisticated, high-level encryption systems for those that need them. More importantly, for everyone, DECENT™ resolves the dilemma. In the U.S. and other nations, court orders authorize legitimate, limited access to someone’s smart phone, and a Golden Key provides swift, dedicated access. To protect everyone’s privacy, an approved court order triggers the release of a Golden Key which permits only one phone to be open without any impact on anyone else’s encryption. With blockchain technology, Assured can generate billions of unique keys in short order, allowing each device to have a unique key with its own unique encryption code. The precision and accuracy of the DECENT™ system is a powerful tool for both law enforcement and privacy advocates. Without having to resort to break-ins or backdoors, authorized parties can access data legally and ethically in real-world time while protecting the privacy rights of every other smart phone user.

Isn’t it time for a DECENT™ Encryption Management System?

Manage emergency access to encrypted data with blockchain-based legal contracts.

Reasons to choose DECENT for encryption and decryption: #1 No reduction in the security of the encrypted data, #2 Data decryption is tied to a legal contract pre-dating encryption

4 reasons why DECENT™ is the best solution for individuals, businesses, manufacturers, service providers and law enforcement agencies:

Reasons 3 and 4 why DECENT is best encryption solution: #3 Creates an immutable audit trail, #4 Protects privacy rights and minimizes key or data loss
Why DECENT should be your encryption management system
DECENT Decryption Contract Enforcement Tool Logo

Be Bold: Protect Your Data with DECENT™ Encryption Management

Contact us today for a safer tomorrow.