{"id":2,"date":"2015-03-07T23:02:25","date_gmt":"2015-03-07T23:02:25","guid":{"rendered":"http:\/\/192.168.1.200\/metrarc\/?page_id=2"},"modified":"2018-10-25T12:03:51","modified_gmt":"2018-10-25T12:03:51","slug":"blog-post-1","status":"publish","type":"page","link":"https:\/\/www.metrarc.com\/","title":{"rendered":"Enabling Security Technology for Tomorrow"},"content":{"rendered":"<section class=\"vc_section_wrapper\"><div class=\"wpb_row row-fluid\">\n\t<div class=\"vc_col-sm-8 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_text_column wpb_content_element \">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>At METRARC<sup>TM<\/sup> we are using novel and promising technology for deriving secure encryption keys from the properties of digital systems, addressing a major area in the security domain, which is currently recognised as\u00a0inhibiting the economic expansion of online services. METRARC<sup>TM<\/sup> has developed novel solutions for increasing security which is relevant to many sectors including e-commerce, m-commerce, on-line and banking and Internet of Things(IoT).<\/p>\n<p>The digital revolution has transformed the way we create, destroy, share, process and manage information, and has brought many benefits which businesses, governments and consumers have become dependent upon. However, digital technology has also increased the opportunity for fraud and other related crimes; therefore it is vital to ensure the integrity and authenticity of such digital systems. Widespread adoption of encryption technology is seen, by most, as the solution to digital security problems, although in practice, established encryption systems are limited by their reliance on the storage of the keys used to encrypt and decrypt data as this is potentially inefficient and insecure. Metrarc&#8217;s technology has an additional level of security as there is no requirement to store encryption keys or an other encryption data.<\/p>\n\n\t\t<\/div> \n\t<\/div> \n\t<div class=\"wpb_text_column wpb_content_element  vc_custom_1531994414094\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Overview Video<\/h4>\n\n\t\t<\/div> \n\t<\/div> \n\t<div class=\"wpb_raw_code wpb_content_element wpb_raw_html\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<video width=\"320\" height=\"240\" controls>\n  <source src=\"MetrarcVideo_V1.mp4\" type=\"video\/mp4\">\n  Your browser does not support the video tag.\n<\/video> \n\t\t<\/div> \n\t<\/div> \n\t\t<\/div> \n\t<\/div> \n\n\t<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_raw_code wpb_content_element wpb_raw_html\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<a class=\"twitter-timeline\" href=\"https:\/\/twitter.com\/Metrarc_Ltd\" data-widget-id=\"585810598400757761\" height=\"500px\">Tweets by @Metrarc_Ltd<\/a> <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=\/^http:\/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+\":\/\/platform.twitter.com\/widgets.js\";fjs.parentNode.insertBefore(js,fjs);}}(document,\"script\",\"twitter-wjs\");<\/script>\n\t\t<\/div> \n\t<\/div> \n\t\t<\/div> \n\t<\/div> \n<\/div><\/section><section class=\"vc_section_wrapper\"><div class=\"wpb_row row-fluid\">\n\t<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"vc_separator wpb_content_element vc_el_width_100 vc_sep_color_grey\">\n\t<span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span>\n\t\t<span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\n\n\t\t<\/div> \n\t<\/div> \n<\/div><\/section><section class=\"vc_section_wrapper\"><div class=\"wpb_row row-fluid\">\n\t<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\" vc_box_border_mulled_wine \" src=\"https:\/\/www.metrarc.com\/wp-content\/uploads\/2015\/03\/105959135-360x200.png\" width=\"360\" height=\"200\" alt=\"105959135\" \/>\n\t\t<\/div> \n\t<\/div> <div class=\"iconBox\"><div class=\"textContent\"><h2 class=\"iconBoxTitle\">ICMetrics\u2122<\/h2><div class=\"theText\">The features are taken from the device, used to encrypt the data, and then discarded. To unencrypt, the reverse process is followed. The lack of templates means that files may be encrypted with much greater security than seen in other methods. The system possesses the significant advantage of removing the need to store any form of template for validating the user, hence directly addressing a major Achilles&#8217; heel of existing systems.<\/div><\/div><\/div>\n\t\t<\/div> \n\t<\/div> \n\n\t<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\" vc_box_border_grey \" src=\"https:\/\/www.metrarc.com\/wp-content\/uploads\/2015\/03\/175650797-360x200.png\" width=\"360\" height=\"200\" alt=\"175650797\" \/>\n\t\t<\/div> \n\t<\/div> <div class=\"iconBox icon\"><i class=\"fa fa-plus\"><\/i><div class=\"textContent\"><h2 class=\"iconBoxTitle\">Products<\/h2><div class=\"theText\">Data encryption, in general, is a fundamental tool for the protection of electronic data. However, if the security of encryption keys cannot be absolutely guaranteed, then the encryption cannot fully protect against fraudulent data manipulation.<\/div><\/div><\/div>\n\t\t<\/div> \n\t<\/div> \n\n\t<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t<div class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\" vc_box_border_grey \" src=\"https:\/\/www.metrarc.com\/wp-content\/uploads\/2015\/03\/104783210-360x200.png\" width=\"360\" height=\"200\" alt=\"104783210\" \/>\n\t\t<\/div> \n\t<\/div> <div class=\"iconBox\"><div class=\"textContent\"><h2 class=\"iconBoxTitle\">State-of-the-Art<\/h2><div class=\"theText\">METRARC\u2122 provides a more advanced method of producing the encryption keys than standard methods do.<\/p>\n<p>When keys are usually generated for the purpose of encrypting data, they are stored as templates. The METRARC\u2122 system does not store templates, as it operates on pioneering ICMetric technology; therefore it uses features of an individual device to generate an encryption key.<\/div><\/div><\/div>\n\t\t<\/div> \n\t<\/div> \n<\/div><\/section><section class=\"vc_section_wrapper\"><div class=\"wpb_row row-fluid\">\n\t<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t<\/div> \n\t<\/div> \n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"At METRARCTM we are using novel and promising technology for deriving secure encryption keys from the properties of digital systems, addressing a major area in the security domain, which is currently recognised as\u00a0inhibiting the economic expansion of online services. METRARCTM has developed novel solutions for increasing security which is relevant to many sectors including e-commerce, m-commerce, on-line and banking and Internet of Things(IoT). The digital revolution has transformed the way we create, destroy, share, process and manage information, and has brought many benefits which businesses, governments and consumers have become dependent upon. However, digital technology has also increased the opportunity for fraud and other related crimes; therefore it is vital to ensure the integrity and authenticity of such digital systems. Widespread adoption of encryption technology is seen, by most, as the solution to digital security problems, although in practice, established encryption systems are limited by their reliance on the storage of the keys used to encrypt and decrypt data as this is potentially inefficient and insecure. Metrarc's technology has an additional level of security as there is no requirement to store encryption keys or an other encryption data. Overview Video Your browser does not support the video tag. Tweets by @Metrarc_Ltd !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=\/^http:\/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+\":\/\/platform.twitter.com\/widgets.js\";fjs.parentNode.insertBefore(js,fjs);}}(document,\"script\",\"twitter-wjs\"); ICMetrics\u2122The features are taken from the device, used to encrypt the data, and then discarded. To unencrypt, the reverse process is followed. The lack of templates means that files may be encrypted with much greater security than seen in other methods. The system possesses the significant advantage [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.metrarc.com\/index.php?rest_route=\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metrarc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.metrarc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.metrarc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metrarc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2"}],"version-history":[{"count":63,"href":"https:\/\/www.metrarc.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/www.metrarc.com\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/www.metrarc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}