T H E   T R U S T E D   S Y S T E M


Secure Exchange Solutions. Inc. has developed and markets, under several U.S. patents, a fully integrated transaction system that delivers the trusted means for producing electronic transactions that are unique, secure and reliable for all business and legal purposes. The company's product suite, marketed as the Trusted System, delivers a comprehensive portfolio of features and services. The Trusted System offers to companies and governments a comprehensive platform from which creates a secure electronic environment that provides the framework for business and government applications to create new business processes that reduce the overall costs of business.


Secure Exchange Solutions’ Trusted System provides a framework to develop specific applications, e.g.: Medical, using an IT framework to manage, classify, protect and control valuable digital content and data, enabling collaboration across multiple enterprises. The Company's primary family of products emphasizes The Trusted System featuring identity tokens and the first system designed to work as a key to sophisticated cloud-based services. The Trusted System is an integrated system using a Virtual Java Machine on a dedicated token and is connected to an Internet Policy Server working as a bifurcated, identification/control service, which produces the key to sophisticated cloud-based content control services. The Trusted System is built on four technical pillars – (1) the Java Virtual Machine, (2) multi-gigabyte token, (3) modern cryptography and (4) the ubiquity of the Internet coupled with a Federated Identity Model Management Contract Infrastructure. Each of these technologies is of recent vintage and together demonstrate a wholly novel, patented approach to secure information control and persistent protection. It can be insured





Secure Exchange Solutions and its Trusted System offer industry and government the opportunity to complete the electronic commerce revolution by conducting transactions in a secure and auditable environment.  The market for such a process is vast.  Candidates include organizations that conduct multi-step, multi-party transactions of a lasting duration that are not available in today’s electronic commerce environment. While this description could apply to dozens of industries ranging from healthcare and manufacturing and to Internet retail and engineering,  SES has chosen initially developed applications for and concentrate its efforts on three market sectors:

Healthcare – “The Trusted Medical System” (Patient Centric Medicine)

Cyber Security: “The Phalanx System”  (Private Industry and Government)

 Internet of Things– “Praetorian  Prefect” (Under Development)




K E Y    S Y S T E M   C O M P O N E N T S


The Trusted System has been built on a Federated Identify Model that authenticates users of the  serialized tokens, to authorize the users to perform certain tasks, secure the data, provide a backend interface to 3rd party systems as well queue transactions when necessary.


Federated Identity Model – Federated Identity Model (FIM) provides a way to share user authentication information across a variety of domains. Secure Exchange Solutions’ Trusted System allows a user to authenticate once — single sign–on (SSO) — and then use that identity to access information across multiple security domains. Data sharing across domains creates efficiencies, and FIM is a powerful tool to control interoperability across multiple domains. By authenticating an individual in a new domain as a member of a group authorized for access, FIM can provides increased privacy and control for the user.


Authentication–The Trusted System authenticates any user that requests access to data that is secured as part of the system. The authentication mechanism is online against a certificate service that is hosted and controlled as part of the system (the trusted policy server). Every user is also linked to a public/private key pair certificate that identifies the user and token uniquely on the Trusted Policy Server. Hashed or encrypted information on the token allows the system to identify whether the user authenticating on the platform is the token owner or not.

Authorization–Any user that is authenticated is provided with only those rights and roles that have been granted by the system and by the token owner (if the user is not the token owner). The authentication credentials include unique user identifier, user password and access role so that the server can identify what type of access is requested and whether the user authenticating is the token owner or another user that is trusted and has the permissions to access the token data and the SES platform. The level of access then restricts what actions the user can perform and what data the user has access to at that time.


Encryption – Encryption must protect the data that is stored or transmitted using the token through the Trusted System. This is achieved via three mechanisms.


            •  Channel encryption. The encryption of the communication channel is VPN.
            •  Data encryption. Data encryption is used to protect data that is stored either centrally or on the tokens.
            •  Key-exchange. Key exchange provides a mechanism to verify that messages are sent from a valid party.