This Day On The Street
Continue to site
This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here

Validian 1st-To-Market With Major Cyber Security Breakthrough For Mobile Device Privacy

OTTAWA, July 30, 2013 (GLOBE NEWSWIRE) -- Validian Corp. (OTCQB:VLDI), the first-to-market with the next generation of cyber security technology for the management and protection of digital information, data and assets, today announced a major cyber security breakthrough for protecting the storage, access and transfer of Digital Information on mobile devices.  

A recent study on hardware encryption has noted that for hardware encryption, the cryptographic key is stored in a separate inaccessible portion of memory storage, thus making it more secure than software encryption. (See )

The context is that all Digital Information or data is encrypted with either an asymmetrical key (as in PKI) or a symmetrical key, but in either case that Digital Information or data is always decrypted by a symmetrical key. For both hardware encryption and software encryption, that decrypting symmetrical key is always stored on the end point hardware, which in the mobile sector is the smartphone or tablet. It may be more difficult to steal that hardware encryption key than a software encryption key, but hackers know where it is located and can steal these keys to decrypt encrypted data stolen during transit.

Changing the key even once is a major undertaking requiring recoding and re-downloading or re-installing to each and every end point and therefore smartphone and tablet. Replacing symmetrical keys for the U.S. banking industry only once took 11 months and cost over $100 million (Bloomberg/June 2011).

Conversely, Validian is the first and only technology in the world that dynamically changes these symmetrical keys for each and every data transfer, so that when a  symmetrical key is stolen, it is useless because it already is being replaced by a new symmetrical key that is only generated for the decryption of the particular transfer of encrypted Digital Information or data.

1 of 2

Check Out Our Best Services for Investors

Action Alerts PLUS

Portfolio Manager Jim Cramer and Director of Research Jack Mohr reveal their investment tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
Quant Ratings

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
Stocks Under $10

David Peltier uncovers low dollar stocks with serious upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
14-Days Free
Only $9.95
14-Days Free
Dividend Stock Advisor

David Peltier identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.

Product Features:
  • Diversified model portfolio of dividend stocks
  • Updates with exact steps to take - BUY, HOLD, SELL
Trifecta Stocks

Every recommendation goes through 3 layers of intense scrutiny—quantitative, fundamental and technical analysis—to maximize profit potential and minimize risk.

Product Features:
  • Model Portfolio
  • Intra Day Trade alerts
  • Access to Quant Ratings
Real Money

More than 30 investing pros with skin in the game give you actionable insight and investment ideas.

Product Features:
  • Access to Jim Cramer's daily blog
  • Intraday commentary and news
  • Real-time trading forums
Only $49.95
14-Days Free
14-Days Free


Chart of I:DJI
DOW 17,050.75 +138.46 0.82%
S&P 500 2,013.43 +15.91 0.80%
NASDAQ 4,810.7880 +19.6360 0.41%

Free Reports

Top Rated Stocks Top Rated Funds Top Rated ETFs