1. How is this device user controlled?
The user chooses who he wants to share the info with. He is able to use the device as :
i) back-up to store sensitive information on the cloud.
This data encryption is by the user himself, allowing him the autonomy to hide away files, so once the KIY is plugged out, all the files remain encrypted and no one can see any information.
ii) acts as a high level authenticator for payment access, control and login purposes: when the user chooses to share the file with someone, that person, must also hold the KIY.
These are examples of the user having the power to control what information they share and what they want kept out of the public domain.
2. What are the benefits to the end user and businesses?
i) Businesses and SMEs who traditionally rely on external parties will find they have more control over their data. Once the information is encrypted and sent back to consumer, they are no longer responsible for it.
ii) Having a physical key separated and offline makes private data less susceptible to being hacked as it is physically carried by the user.
For more information, see KIY Benefits
3) If I lose my KIY or forget my password how do I retrieve my information?
i) Don’t panic. The user holds the KIY and if the key gets lost, they can retrieve the information with a “RESCUE” key.
ii) They can also reset their password themselves with the KIY, should they forget or want to update it regularly for security purposes.
4) Do I have to carry a physical key?
i) Yes, the user has to carry a small device the size of a USB. Fast is looking into second generation technology using bluetooth capabilities and a key proxy that will be embedded in another product.