Bonafeyed Technology

There is a lack of awareness and understanding regarding how to protect data. It is commonly, and incorrectly believed that SSL protects data from hackers, when actually, it only protects the transportation of the data between two endpoints. Data protection compliance checklists don’t confirm that the data is properly protected, only that “somewhere” encryption is utilized.

The frequency of breaches arises from focusing on perimeter security and not on protecting the data itself. Data that remains in the “clear” is vulnerable. Bonafeyed is capable of securing data elements individually such that any loss of data whether by a large breach or down to an end-user’s mobile device is mitigated. Traditional bulk encryption and perimeter products clearly don’t cut it. Otherwise, these massive breaches and data exploits would not be occurring. It interoperates with all security solutions including Prevention, Detection, Transport, and Storage.

  • Operates across multiple/mixed security environments
  • Data Encryption at any data size or type
  • Per message or text, data field or cell, image or file
  • Encrypted database entries are searchable ciphertext
  • Password-less encryption workflows
  • Endpoint ciphering with little to no performance impact
  • Gives full compliance to data protection regulations
  • Lost or abandoned data remains encrypted


Encoding/decoding message by selectively adjusting characteristics of sub-units in image data

A message can be encoded in an image file by mapping at least one bit of the message onto each sub-unit of the image file, and adjusting a distinguishable characteristic of each sub-unit according to the corresponding bit to produce a modified image file. The message can be decoded from the message file by comparing each sub-unit of the modified image file with a corresponding sub-unit of the original image file, and identifying at least one bit of the message based on each comparison.

Patent # 9,514,504

Use of 32-bit Random Numbers to Produce Cipher Key Stream for 8-bit Data Stream

A method of enciphering information comprises generating five index values by performing modulo division on a 32-bit binary input value, identifying five 8-bit output patterns based on the five index values, and enciphering or deciphering five bytes of text using the five 8-bit output patterns.

Patent # 9,246,681