IoT - CertainSafe - The Most Secure Cloud Storage Solution

Internet of Things

CertainSafe has developed a radically new paradigm for securing the Internet of Things:
MicroTokenization™ substitutes virtual tokens for data transmission and industrial commands.


Unlike conventional IoT firewall, identity and network defenses, with CertainSafe proprietary data is never actually transmitted between an application and a networked device. Instead tokens to govern instructions between controllers and paired devices.


Each command in an IoT process is reduced to byte-size transmission packets that are encrypted individually. MicroTokenization enables thousands of tokens to be generated per second, allowing lightning-fast management of even highly complex systems.


Our adapter-based architecture is easily portable across platforms and programming environments. For highly mission critical applications, like autonomous vehicles, we embed our MicroTokenization and MicroEncryption (MT&E) engine in chip firmware, and create unique, ultra-secure hardware pairs. For IoT networks with very large numbers of devices, we offer software-only solutions agnostic to communications protocols and networks that can scale to any size.


Security measures are introduced throughout our multi-layer architecture:

Tokens control specific data management functions, not entire systems.
Our tokens enable discrete controls on devices but are not a point of entry for rogue code. Hackers cannot leverage a token as an attack surface and penetrate more deeply into a system or device.
Each token and data transfer is individually MicroEncrypted.
Every token and data packet is encrypted. Even if AES could be cracked quickly, which it can't, no data would be exposed, only the one-time token. We can insert custom encryption if you Bring Your Own Keys.
Tokens are device-paired.
Tokens are configured to execute only on a specific pair of devices, and only tokens unique to the pair can execute a command.
Tokens are instantly obsolete and expire after each command.
New tokens are generated only after a previous transmission is proven legitimate. Thousands of token exchanges are sent per second.
Valid tokens are hidden by false tokens.
A huge and dynamically changing volume of digital chaff masks every legitimate token, in effect, creating a different sized haystack for each needle.
Every token exchange is time-delimited.
Tokens must be sent and received within tolerances set by an application policy. Messages that arrive too soon or too late are rejected.
Tokens continuously regenerate.
CertainSafe proprietary algorithms transform token pairs in real-time, creating a spoof-free and self-correcting feedback loop between controllers and devices.