To better understand the flow of data through our algorithm, exhibit B is a graphic that illustrates from point of data origin to secure data in transit to self defined storage (cloud, multi cloud, local or hybrid).
Starting on the left, data is created on a device (PC, laptop, tablet, mobile device), the data is secured via an application integrated with our security. The data is then ingested into our security through an event based API integrated into the application. After the data is ingested, it’s run through our multi step algorithm that protects the data beyond encryption, making it quantum safe. Then data is randomly transmitted over the wire where it is randomly distributed into customer defined storage.