Protean Credentials Protect What Matters

The concept of Protean Security is simple yet challenging: leverage known security best practices to create an attack surface that is dynamic and constantly evolving. Using this guiding principle Proteus Converged Systems developed the Protean Credential for identity and authentication. A healthy distrust of registrars and certificate authorities led Proteus to use security primitives (i.e. public-key cryptography) directly between transacting parties with no third-party dependencies. Protean Credentials also perform regular key rotation transparently with every interaction. Finally, Protean Security dictates minimal risk exposure so users no longer hold private keys and instead have complete control over their private data in an encrypted form they can’t directly modify.

The Protean Credential contains a variety of attributes, some owned and controlled by the user and some owned and controlled by the system operator. The system operator has CRUD (create, read, update, and delete) capabilities to a portion of the credential while the user owns the personal data, they provide with the privacy respecting benefit of requiring specific user approval for any data access. In a nod to security and simplicity the Protean Credential allows users to create their own challenge/response based on any I/O they can perform on their computing device. Users also create multiple challenge/response combinations so that authentication may be varied based on risk. It is also no accident that the credential contains the challenges/responses so that brute force authentication attacks are no longer possible.

Ready to Embrace the Future?

Scroll to Top