CTP Technology
Understanding Coordinative Transactional Processing (CTP)
At Sendatrix, we use a unique patented technology called Coordinative Transactional Processing (CTP) to secure your data. This technology relies on three main components, or modules, in the protection process:
- Module A (Access): This module handles the access to your data. Think of it as the gateway that controls who can get to the information.
- Module B (Base): This is where the actual data resides. It holds the core information that needs protection.
- Module C (Control): This module manages the control keys that link the Access and Base data. It ensures that everything is correctly connected and secured.
How It Works
Every time you add or retrieve data, all three modules work together to ensure the transaction is secure. Here’s a step-by-step look at how CTP works for a protection transaction:
- Initialization: Before any transaction, we prepare "codesets" – these are special codes spread across all three modules. They are used to verify the authenticity of each transaction.
- Data Access (Module A): When data access is requested, Module A initiates the process by sending a request to Module B.
- Data Handling (Module B): Module B receives the main data, which is encrypted by a key only known to Module A, and responds to Module A after sending a newly generated code linking the new data to Module C with an expected codeset key along with the new key that links this transaction data.
- Control Verification (Module C): Module C receives the linking code and expected codeset key from Module B and checks it against its codeset. It then sends back an expected codeset key to Module B.
- Transaction Completion: Module B verifies the codeset key returned from Module C and completes the transaction by confirming back to Module A.
By using this multi-step verification, segregation, encryption, and linking process, CTP ensures that every data transaction is secure and authentic, as well as compartmentalizing the data so that all three modules are required in order to reassemble the data.
Key Benefits
- Unsurpassed Enhanced Security: With multiple layers of verification, your data is completely protected from unauthorized access.
- Integrity: Each transaction is verified for authenticity, ensuring that your data remains intact and trustworthy.
- Control: You have complete control over your data, knowing that it is secured at every step.
CTP technology makes sure that your data is safe, secure, and only accessible to those who have the right permissions. It’s a robust system designed to protect your most valuable asset—your data.
For more detailed information about how CTP works or to discuss how it can help your organization, feel free to contact us.