ArmorGuard Network
ArmorGuard is protected by overlaid interdependent protections. Every message is locked, relocked, and then cross locked by four keys, and six ciphering systems that are far beyond the internet’s public and private Rivest, Shamir and Aldeman (RSA) key systems.

ArmorGuard is accessed through a client side application that functions as an easy to use point and click file manager and control panel that administers all network services across JumPedal’s autonomous dual network system. With development this initial network application will be upgraded to include: messaging, audio, video, database functionality and supporting hardware that will provide the infrastructure for a host of value added developments, and strategic partner integrations.

Start Free Trial
for Windows
No credit card required.

ArmorGuard is accessed through a client side application that functions as an easy to use point and click file manager and control panel that administers all network services across JumPedal’s autonomous dual network system. With development this initial network application will be upgraded to include: messaging, audio, video, database functionality and supporting hardware that will provide the infrastructure for a host of strategic partnerships, value added developments, and integrations.

Why is ArmorGuard So Special?

How It Works.

Two Independent Server Clouds

First Line of Defense

ArmorGuard distinguishes itself by operating two completely autonomous server network clouds: a primary network cloud, and a secondary network cloud.

Each message’s content is subdivided into a series of subblock puzzle pieces that place some portion of the message on a primary network and the remaining portion on an independent secondary network, and never place all of a message’s subdivided pieces in any one place. To hack a message, there would need to be a perfectly synchronized assault on each of the two networks, without alerting either of them. But, because each of the networks operate independently, this synchronization is not possible. Even if one network were to be compromised, it would only hold a portion of a message, forcing a hacker to attack the second network, which would be in full defense mode having been alerted to a possible attack.

Two Independent Server Clouds

First Line of Defense

ArmorGuard distinguishes itself by operating two completely autonomous server network clouds: a primary network cloud, and a secondary network cloud.

Each message’s content is subdivided into a series of subblock puzzle pieces that place some portion of the message on a primary network and the remaining portion on an independent secondary network, and never place all of a message’s subdivided pieces in any one place. To hack a message, there would need to be a perfectly synchronized assault on each of the two networks, without alerting either of them. But, because each of the networks operate independently, this synchronization is not possible. Even if one network were to be compromised, it would only hold a portion of a message, forcing a hacker to attack the second network, which would be in full defense mode having been alerted to a possible attack.

Cipher Keys Generated in Half Key Sets,
Each Half Key by an Independent Network

Second Line of Defense

ArmorGuard introduces a new generation of cipher key sophistication by producing cipher keys in two half key sets. Each half key is produced independently of the other half key in a process that precludes unauthorized parties, including JumPedal, from ever having both keys. The only person that ever holds both keys is the client that originated the network request.

  • Message transmission or storage is initiated by a client request for network authorization, which creates two half cipher keys, one created by the network’s primary network and one by the secondary.
  • When a client desires to send a copy of a message to a recipient, the network’s independent servers will transmit its half keys to the client system for assembly, decoding, and re-encoding with a second set of half keys. This decoding and re-encoding ensures that the client’s keys are never transmitted to a third party under any circumstance, not even for the handling of a single message, as every message has its own unique keys.
Network Keys
Communications

Two Independently constructed keys,
one embedded in the other with
inter-dependent authorizations.

ArmorGuard has been engineered to contain a unique system of cross-locking dependencies that require multiple authorizations. Each one half key with a hidden internal key, will be transmitted to a client’s device where the four key parts are cross validated, and then assembled into a single whole key.

  • The most important part of any vault are the keys and the people that hold them. ArmorGuard’s two one-half keys and two hidden keys produce a complicated system of cross-linked relationships that divides each message’s keys into four parts, two visible and two hidden and delivers these keys by two different networks.
  • It is an impossible system for any hacker to approach: where are the keys and how do they find them when they are in two different places? How do they know that there are two invisible keys? And even if they know, how do they uncover them? And if they are lucky enough to do that, how do they reassemble them into an assembled key?
Cross Linked Keys

JumPedal’s Nested Key-in-Key processes give you full control of your information, as you are the only person that has all the keys.

One-After Another Encryption Cascade

Fourth Line of Defense, Applies Six Uniquely Layered Ciphers

Once the cipher keys have been delivered to a client application and a complete key assembled from its four interlocking parts, message ciphering begins. The first component of ciphering defines the organization of the applied ciphers that can be organized into hundreds of thousands of unique arrangements. The second applies one on top of another layered application of the following listed ciphers.

  • XOR CIPHER
    XOR ciphering (pronounced “ZOR”) is a very effective, though commonly applied cipher. JumPedal utilizes the XOR cipher to randomize input messages.
  • SUBBLOCK DIVISION OF INFORMATION
    Randomized messages are subdivided into fixed bit length packets and randomly assigned alpha-numeric identifiers that remove any relationship to the original message name.
  • RANDOM NOISE INSERTION
    Random noise is inserted into each of a message’s subblocks in a process that adds complexity to the message’s ciphering.
  • INTERWEAVE INDEX MODULATORS
    The bit indexes of each of a message’s subblocks are scrambled. Scrambling can be accomplished by any one of tens of thousands of unique index scrambling methods, each with their own indexing arrangement.
  • ONE-TIME PAD
    The perfect One-Time Pad cipher is encoded into each individual subblock to further randomize the resulting ciphers.
  • STATISTICALLY UNIFORM STORAGE TERMINAL
    Having completed ciphering encrypted information, subblocks are placed into a data terminal for storage and transmission. Each terminal contains tens of thousands of similar bit length ciphered subblocks, each within a randomized alpha-numeric identifier. All virtually identical in their randomized structure, and naming conventions that make it impossible for a hacker to know how many subblocks create a message and which of tens of thousands of subblocks create the message. After all this complexity, a hacker would have to place ciphered subblocks into their original order and then reverse each of the cascade ciphers that encrypted the information.
Performance Reporting
ArmorGuard provides advanced reporting that documents
the cipher complexity of the network’s cipher-randomizations,
and their performance metrics.
  • ArmorGuard’s four lines of defense, six ciphering methods, and supporting systems make hacking of JumPedal’s technology an impossible proposition.
  • The ciphering of a message transforms its plain text into complex cipher text that no one can read except the people that are intended to read it, as the more complex the language the more difficult it is to hack the ciphered message.
  • How is quantum-safe vs. quantum-secure measured? It comes down to the bits that are transmitted and stored on the network’s servers, and the ciphers that are applied to encoding a message. Jumpedal provides lengthy evaluations of these all important cipher-bits in detailed reports to each of our clients. These reports contain before and after ciphering metrics, as well as charts and graphs that describe the levels of randomness achieved in ciphering. We have included some of these reports for your review .
keyboard_arrow_up