Redefining the digital dilemma of securing data: No locks, no break-ins

Posted on September 11, 2009. Filed under: Information Security | Tags: , , , , |

Move over digital cut-and-paste-guys and data hackers. You will soon be out of job, because the traditional way of data IP protection is moving over to a new patented mechanism enabled by Trinity Future-In.  Which means, the creative content you created, the logo of your company, the unique idea you documented, or the music you composed cannot be used by anyone without authorization.

It is estimated that the total magnitude of counterfeiting and piracy worldwide could well be several hundred billion dollars more.

The innovative mechanism of Trinity for protecting digital files is not based on the traditional use of a lock and key system. In this solution files become invisible or inactive and block unauthorized duplication.

With the expansion of the knowledge web through the Internet, easy availability and exchange of information has grown up. There is an increase in knowledge awareness. However piracy too has evolved with technology. If statistics are not wrong, an estimated USD 40 billion was lost in the year 2006 to software piracy globally. This figure goes up to around USD 60 billion this year.

Naturally, solutions to protect IP are the holy grail of the creative business. Writers, artists, designers, architects, software developers, gaming companies need to share their work, but must also keep it protected from unauthorized transmission and usage. Even lawyers and bankers need to keep their work from being illegally or surreptitiously copied and reused in a world that is going rapidly digital.

The traditional solution is to keep all files and data protected using simple user name login and passwords or using serial number pair schemes. These work like digital locks. Just break the lock or find an alternative key and the contents are most vulnerable. Biometric sensors and encryption are making things more difficult for pirates, but they are not user friendly nor are the contents secure from the expert hacker.

The answer to these problems has been created by a 25- member Bangalore-based startup called Trinity Future-In. Their goal:  to secure and to control the unauthorized duplication of digital assets and to provide a secure distribution media for both online and offline assets.

Trinity creates a method of protecting digital files that does not use a lock and key system. In this solution files become invisible or inactive and block unauthorized duplication. Critically, the digital data remains secured whether it is inside or outside the security device. Some Trinity products are capable of creating a log of all attempts to tamper with the system with computer serial numbers records and the date and time of the attempt.

The Trinity solutions work in simple ways. Course material can be displayed on a computer by the user but cannot be copied and therefore cannot be transmitted. In addition, a user cannot make a “screen dump” either on a computer’s clip board and transmit it or print the screen (normally done using the “PrtSc” key).

Tests conducted on some of the products by the Standardization Testing and Quality Certification (STQC) division of the Ministry of Communication & Information Technology confirm that the product is sound.

”The test cases employed and the results obtained conform to the claims made by Trinity Future- In with respect to protection of stored information,” says the test result.

Is this the solution for piracy, counterfeiting and any forms of unauthorized duplication?
For further information on Trinity’s products and solutions- refer

Make a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Liked it here?
Why not try sites on the blogroll...

%d bloggers like this: