Thank you for the reply.
I would like to discuss my idea with Solid representative(s) in the hopes of getting my idea to market.
I’ll explain more later, but I really believe the world market is SCREAMING for my idea, and Solid could help get it out there, and far better accomplish their idea of making a system to protect the ownership of intellectual property.
For the moment, I’ll suffice to say, I believe, that whoever gets my idea to market first, wins, because at the end of the day, my idea is not susceptible to hacking/coercion at the server level; thus truly ensuring the protection of IP all the while decentralizing the sharing/management of IP.
That said, I hope I’m not coming too late into Solid’s time line, that they would otherwise not have the time to even hear/consider other ideas.
I have an idea that has not been done in any manner even slightly so, as otherwise, efforts like Solid would not be needed.
My idea centers around a “ Client Driven Encryption/Obfuscation System ”. Not a encryption algorithm, but a client driven system.
The primary goal of my idea is to protect intellectual property and the management and sharing of the IP to customers, clients, and audiences.
To accomplish this goal, the key ingredient is to have a searchable, sortable, partially searchable, and wild card searchable system, that no matter what, never lets intellectual property leave one’s client machine unencrypted/un-obfuscated, but is still searchable/sortable by customers/clients/audiences.
This means, anything from the network card of a owner/customer/client/audience’s machine, to ALL servers in between them and the IP, can not be decrypted/de-obfuscated. Literally, the servers/machines, between clients/owner never get the IP data and/or its management or sharing of the IP unencrypted/un-obfuscated.
To further clarify that latter point, this is not an encryption method.
- There are not “keys” public/private.
- No standard algorithms of any kind for encryption including the searching and sorting of encrypted data.
- No concept of the servers having any data down to even the register that is unencrypted/un-obfuscated.
- No “hint-based” algorithms.
- The servers only and ever see BLOBs of meaningless data, that only the clients of the client driven system can see/understand.
- There is not even the concept of 1 single server with my idea. In fact, the more servers, the more secure with redundancy the protection becomes.
No one has done anything close to my idea.
As for why I want to rush getting a dialog going with Solid representatives, I believe the world has realized how dangerous and monopolizing it is to have any central IP storage/distribution/platform like youTube, Google, Facebook. And I believe, there is going to be a rush to get something standardized as soon as possible.
Fortunately for my idea, I see no one, even slightly close to solving the Searchable, Sortable, Partially Searchable, and Wild Card Searchable client driven system.
Not even slightly close. I see organizations trying to develop algorithms, with “hints” and they are astronomically way off, cause if ANY server can at any time see IP data or the management/sharing of the IP data unencrypted/un-obfuscated, then the system is a failure. Through either hacking and/or coercions, the system can be defeated at the server level. I’ve solved this problem.
My idea is not subject to such failure, because the servers (plural) never get the IP data or the management/sharing of the IP unencrypted/un-obfuscated.
With my idea, even if hackers got onto every server, they;d still have nothing. Even if the admin personnel over all server could be coerced for money or by threats, my idea will not fail.
And my idea also includes a final client side obfuscation protection, that even if the client, whether IP Owner, customer, audience get compromised, there is a final obfuscation level protection, which is why I always include obfuscation with my statement: “ Client Driven Encryption/Obfuscation System “.
Summary of my idea:
- Servers never get anything unencrypted/un-obfuscated.
- Thus hacking/coercion done at even ALL servers accomplishes nothing.
- Searchable, sortable, partially searchable, and wild card searchable encryption/obfuscation system
- No encryption algorithms, no hints, no public/private keys, no single search/sort algorithms for encryption.
- Final client level obfuscation protection, even if client machines compromised.
Next Steps:
- Have dialogs via emails to phone with Solid representatives, to see if Solid is interested in my idea.
- Eventually, get face to face meetings.
- If need be, to work with such dialogs to further explain how my idea would work, help IP ownerships, and be profitable.
- Discuss means to seek funding through government grants/contracts to get my idea to market and standardized.