alt text

Amera delivers quantum resistant solutions for your products today.

Amera solves the problem of generating and distributing high entropy symmetric encryption keys without exposing or storing the keys themselves. The equivalent to “Spooky action at a distance”, our AmeraKey® technology makes it possible to synchronize randomness from multiple locations. With applications in Enterprise, Consumer, and IoT the AmeraKey® library provides the ultimate security for your critical data.
AmeraKey®

Cutting-edge Patented Security

AmeraKey® is a licensable IP library comprised of patented cutting-edge quantum resistant encryption technology that individual users and companies can use to secure access to data. It provides a quantum hardened solution by solving the problem of distributing symmetric keys to remote Users and eliminating encryption keys based on insecure passwords. It delivers thousands of encryption keys, user authentication codes and device authentication codes, gives the User the ability to change encryption and authentication on the fly and completely does away with passwords. It eliminates third party authorizations and token injection, augments the use of digital certificates, and provides quantum resistant encryption of a signed document. AmeraKey® serves applications in enterprise, data collaboration (including file transfers and storage), communications (including video conferencing, text messaging and email), secure document signing and IoT and is the premier solution to providing quantum resistant security.
AmeraKey® allows a user generate encryption keys from a picture and a pin. To synchronize those keys with another user, one simply shares the picture and pin. With these parameters, each user can generate thousands of high entropy encryption keys. The keys themselves are neither stored nor transmitted between parties resolving the problem of third-party key storage. Through the sharing of an encryption token, keys can be generated on the fly either during a data session or after a data session. The encryption tokens are one time use. A user can change pictures and pins during the data session and generate a brand-new set of keys. Clever use of the encryption token will allow Users to change both the method of harvesting pixels as well as which key to use in the next data session. Encryption keys may be generated using multiple pictures yielding more keys with higher entropy. With AmeraKey®, the User is always in control of the keys, the keys are never transmitted outside of the local User device and much like quantum generated keys, the keys are completely device independent as key generation does not rely on device models. With AmeraKey® the problem of key sharing presented by symmetric encryption, the storage of keys by third parties and the myriad of issues associated with asymmetric encryption are resolved.
Let's get in touch

Contact us for more information about AmeraKey® and what it can do for you.

© 2023, All Rights Reserved.
Home Products Our Technologies