top of page

Business Applications for the Integrated Genomic Proteomic Security Protocols

•Subscription service for smartphone security app

•Peer-to-peer would be the simplest implementation

•Personal authentication services (digital bio-signatures)

•SaaS Subscription services

•Data at Rest, Data in Motion, Critical Network restoral data, Data integrity services

•Corporate Data Centers/Cloud data security

 •Trusted 3rd party (Bio-Certificate Authorities)

•Digital Rights Management

• Network-Network Authentication, Virtual Private Networks

• Bio-firewalls

bottom of page