top of page
Business Applications for the Integrated Genomic Proteomic Security Protocols
•Subscription service for smartphone security app
•Peer-to-peer would be the simplest implementation
•Personal authentication services (digital bio-signatures)
•SaaS Subscription services
•Data at Rest, Data in Motion, Critical Network restoral data, Data integrity services
•Corporate Data Centers/Cloud data security
•Trusted 3rd party (Bio-Certificate Authorities)
•Digital Rights Management
• Network-Network Authentication, Virtual Private Networks
• Bio-firewalls
bottom of page