Identity Constellation (IDC) protocol

Identity Constellation (IDC) is a protocol designed to establish secure multi-party connection between authenticated entities. These connected entities are equipped to make distributed computations to form multi-party decisions - thereby creating a consensus.

IDC is our proprietary multiparty consensus protocol designed to deliver information securely between parties.

It is designed to upgrade the traditional centralised security models (CA + Certificates).

IDC is an essential technology to secure communication with easier and more cost effective solutions than what is available in the market by PKI, VPN and IPsec based offerings.

Identity and authentication

IDC facilitates the sharing of ‘consensus’ between multiple parties without exposing any sensitive data. There is no centralized trust element – or back-end systems potentially creating exposure to security risks. IDC facilitates the consensus between identities which are distributed between the nodes in the constellation.

Shared secrets

IDC offers an efficient method to handle encryption keys in a constellation. The technology provides a shared consensus about keys and provides an efficient revocation and new node joining process. None of the nodes in a constellation contains the complete key - but only a share of the key. Therefore replacing a node even in an untrusted environment will not compromise security.

Decentralised multipoint connectivity

Whilst current secure connectivity technologies support only point-to-point connectivity between only two nodes, IDC is a multipoint security protocol. It shares the consensus between all parties in a constellation, without the need to centrally authorize, sign or distribute the permissions of the relevant parties.

Protected IP traffic

Currently available protocols and technologies like TLS, OpenSLL, VPN expose identities between communicating parties and reveal the key exchange information as clear text on the communication line. IDC, however, has the added benefit that it secures this critically important information. Only structured random text is visible.

All in one solution

IDC delivers multi-dimensional security
→ Integrity: information is valid
→ Authentication: proof of identity

→ Confidentiality: data encryption

IDC – a comprehensive security solution

The technology requirements of the new 5G and IoT world, and the adoption of Zero Trust strategy, have prompted a significant R&D investment globally to find a solution. Multiple efforts and “innovations” have failed the test.

IDC protocol supports mainline hardware architectures, internet protocols, message systems, network topologies, bandwith requirements, multipoint connectivity and multicast transmission.

IDC solution supports IoT-systems like low capacity sensors with MQTT messaging protocol and many other combinations. IDC is equally suitable sub 1ms real time multicast systems in the 5G environment.

Large scale IoT systems and 5G connectivity

5G networks are particularly well suited to serve connected low latency high data speed systems, like vehicles, critical medical systems, cloud and drone swarms, which are often automated or driven by artificial intelligence. Network slicing and multicast capabilities are recognized as important 5G features in critical communication environments.

The question is how to do authentication and encryption when the number of sensors can be millions and millions, and they need to have same shared information available with sub1ms requirement. There is simply no time to do the session key exchange millions of times between multiple sensors and authentication protocols – PKI and IPSec based solutions are not designed for this context.

Zero Trust requires authenticating all elements which have access to the underlying data – and secure connections have to be formed between multiple parties in real time. Same real time IoT systems require also multicast capable traffic. One node in the system will send information and multiple parties will receive it.

Real time encrypted connections between multiple authenticated parties are vital – these can be effectively delivered by the IDC protocol.