jPOCKET Security             MyInstantID.com 

Home
Advance
Custom
FAQs
Tutorial
Security
Contact
Sign In

  Superior to other solutions.
  • MyInstantID.com provides the strongest encryption algorithm (AES/Rijndael with 256bit key), which is an integral part of every document in the form of a jPocket. In that way you can completely manage your private information by having all components under your control. With jPOCKET technology your “open text” is never exposed because it never leaves your document. The exposed or lost document (in form of a computer file) does not constitute a security risk.
     
  • In June 2003, the US Government announced that AES may be used for clasified information:
    "The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use."  ...more.  
    This marks the first time that the public has had access to a cipher approved by NSA for TOP SECRET information.
     
  • The target applications are storage and emergency access of protected information. For confidential sharing of protected information amongst trusted users additional password management and password selection strategies may be considered. … more.
     
  • Other solutions use encryption process-centric architecture. In this way, by controlling one or more critical segments in the process, the central “authority” (instead of you) controls the whole process. This is suitable for business and other structured organizations where “the authority” role is clearly defined and managed under prioritized criteria. So, for goverment national security has more priority than your individual privacy. For comercial application maximazing the profit is ultimate busines goal while the risk of compromizing your privacy is calculated into busines strategy. Do-it-yourself is the only approach wher your privacy is the first priority.
     
  • In preparation for big scale disasters (flood, earthquake, etc.) your document can be easily multiplied, freely distributed and stored to multiple locations for easy emergency access and recovery. With other business oriented services (using traditional technology) the storing and protecting personal information can be significantly burdened in legal requirements.
     
  • This is an open process and anybody with minimum software knowledge (basic level found in books “HTML/JavaScript for Dummies”, “Teach yourself JavaScript in 24hours” or similar), can inspect the provided open source code to determine there is no backend-key or “Trojan Horse” code included. This is not the case with commercial code which doesn't provide access to source code neither garanty that there is no malicious back-door code.
     


  © 2006     InstantGlobe