Safer Computing for an Unsafe World

VS2 software detects & protects against unexpected faults & anomalies
… before harm occurs!
for
► Applications
► Communications
► COTS Platforms

VS2 software reduces risk of failure for mission- and life-critical applications by complementing your existing solutions

"You Can't Correct What You Don't Detect"

See the VS2document: "Value Proposition and Platform Overviews"

 


About VS2

Virtual Software Systems (VS2) is a Boston based software venture. Our mission: create tools that improve the Confidentiality, Integrity, and Availability of life- and mission-critical systems and data

VS2 founders and developers authored 26 patents and each have, on average, 30+ years of computer design experience across a broad range of technologies including: hardware, fault tolerant, massively parallel, floating point, and graphics processors; routers, and compilers.

With unique patented and patent-pending technologies and a veteran team, our goal is to help create inherently secure and safe computing environments.

VS2 Core Team - click here

The VS2 team is available to help customers adapt these technologies to accomplish their missions.

Technologies
KSC     xRA

Kaleidoscope Secure Channel (KSC) Platform

Detects and protects against attacks on communications channels, content, or infrastructure…

The problem:
Current encrypted communication technologies are not resistant to Quantum attacks or are prohibitively computationally expensive.

An encryption algorithm that cannot change faster than an attacker's quantum computer can decipher it, risks the threat of stolen or compromised data.

The solution:
KSC (for Kaleidoscope Secure Channel) is a patents-pending technology that like its namesake, changes its encryption scheme for every half-byte of data.

We believe that Kaleidoscope does this faster than quantum computers, currently under development around the world, can decipher them. These encryption schemes are selected randomly, with constantly increasing entropy, from literally billions of choices.

KSC can even be used, in conjunction with existing cyphers such as AES-256, to increase their resistance to attack. KSC's pending patents, for which most claims have been accepted by the USPO, are only awaiting final approval and issuance.

Current status:
Early iterations of the technology have been implemented and tested successfully in a customer environment. Further development and productization are required to produce final prototypes for new implementations.

Please refer to the following additional information:

KSC Use Cases
KSC Abstract and Characteristics
► KSC White Paper (available with signed NDA)

Technologies
KSC     xRA

xRA (Extended Resilience Architecture) Platform:

Detects, protects, and provides continued operation through hardware faults or software anomalies…

The problem:
Applications that are not self-protecting or self-correcting are vulnerable to attacks.

A single computer, or single copy of an application, cannot verify that it has not been compromised. Two copies cannot determine which has been compromised.

The solution:
xRA (for Extended Resilience Architecture) is a patented technology that applies the concept of consensus to detect and correct executing application code in real time using three or more computers and/or application replicas.

Much as Distributed Ledger/Blockchain technology creates and compares multiple copies of data to eliminate corruption, xRA creates application replicas and compares their execution results in real time. The resulting configuration helps to eliminate code corruption and enables continued operation in spite of equipment failures or code anomalies from any cause. The benefits are significantly increased failure resilience and improved cybersecurity.

Current status:
The technology is operational in prototype form and can be demonstrated today in several implementations, including a local process control demonstration and a cloud or hybrid-cloud based demonstration. xRA requires funding to obtain the technical resources for productization and to create template based provisioning.

Please refer to the following additional information:

xRA Use Cases
xRA Technology Overview
xRA IoT Demonstration Video

Contact

We are seeking forward-looking organizations and investors with whom to team for the development of new solutions that advance the state of the art in the resilience of mission- and life-critical information systems and the secrecy of the vital data they manage.

If you are interested in learning more, please contact:

Tom Wetmore, Co-Founder and Chief Marketing Officer
(781) 424-4899

or

John Conway, Co-Founder and CEO