MicroToken Exchange® (MTE) Commander Advantages

MTE Commander, when deployed for securing ‘Commands’ or small data transmissions, is so powerful that there is no need for encryption.

MTE Commander

MTE Commander eliminates ‘key management’, the biggest vulnerability and burden when using encryption. When using encryption by itself the implementor must be very diligent and deliberate about:

  • How and where the encryption key is stored

    • If the encryption key is stored unsecured or in a vulnerable or accessible place, then it is easy for an attacker to compromise the encrypted data. Even the strongest lock in the world is useless if you leave the key in it.
  • How the key is fetched when encrypting or decrypting a piece of data

    • If the key is recalled in an unprotected manor from its stored location it could expose it to someone that should not have it.
  • Using the same key for all data

    • If the same encryption key is used for all data being sent, then it only takes a cyber-criminal one brute force attack to get access to all the sensitive information being transmitted between endpoints.
  • Changing encryption keys often

    • Like passwords, if encryption keys are not frequently changed, then it leaves data vulnerable to prolonged attacks that are hard to detect.

MTE Commander Differentiating Value

When MTE Commander is deployed, there are a series of significant features that provide a new paradigm for the securing of data transmissions, and/or commands.

  • No Key Management Required

    • Every single piece of data or command that is sent is uniquely secured, ensuring that even if one transmission is somehow compromised it does not make subsequent transmissions vulnerable. With MTE, the ‘real’ key is never sent nor is it ever stored. Instead, at the time of data transmission, an MTE command is sent utilizing MicroTokens which provide instructions to the receiving endpoint. These instructions can only be understood by the receiving end-point which will instantly build a decryption key for that singular piece of data. The new decryption key is used and instantly obsolete and can never be used again. This patented process happens in milliseconds.
  • MTE MicroTokens are different every time even if sending the same exact message or command.

    • MTE Commander requires a pairing process between end-points. This paring process keeps end-points in sync with one another. Simultaneously, there are additional protocols which are constantly changing so the everchanging MicroTokens which are used to represent the data and/or commands, can always be interpreted by the intended recipient.
  • Once a valid MicroToken is used within a communication stream, it is instantly obsolete never to be used again in that communication.

    • This eliminates pattern recognition capabilities that are common with encryption.
  • No chance of packet manipulation / injection.

    • If the MTE receives a packet that has been altered in any way it will detect this manipulation and discard the packet, not even attempting to utilize any part of the detokenization process.
  • MTE can detect and will throw an error if a packet is dropped.

    • This could be an indication that an attacker is listening to or attempting to manipulate a communication between endpoints, allowing the hosting system to appropriately respond, stopping an attack before it starts. Additionally, it could simply be a flaw in the transmission delivery which will require a ‘resend’ to the intended party. If this were to occur, it becomes an entirely new transmission that is 100% different from the original transmission packet.
  • There are additional layers of intelligence built into the MTE packets that ensure they arrive in time and weren’t held and released back into the stream of communication.

    • This ensures that an intended transmission arrives on time and was not held by an attacker and released back into the stream of communication at a different moment in time. This feature is not possible with encryption. If a packet is valid once, it is valid until the encryption key is changed.