Cyber Acuity IP and USP

Cyber Acuity IP and USP

  • Why is the IP unique? Cyber Acuity has access to and has been part of extensive research on data that is generated by people that is both useful and timely in making decisions regarding their potential as a threat in a given environment.  Our research shows that having permitted access to personal identity, reputation, mobile behaviour and other measurable factors delivers signposts and situational awareness that can inform security systems, enabling them to focus on unknown actors or make access control decisions.
  • Why can’t it be copied? The algorithm ‘Confidence’ has been designed by and is owned by the company. It is proprietary to Cyber Acuity and uses data that is not generally accessible from mobile devices and networks in addition to the algorithmic transformations that create statistically relevant data points. In addition the commercial model is the antithesis of most big data companies - we don’t create or store new data. Cyber Acuity creates a real-time trust interface which enables decisions to be made without compromising personal data. Most other companies want to keep this data and sell it to third-parties. Our relationship with the individual has integrity and is built on trust.
  • What advantage, if any, do we have on the competition? There are already digital ID wallets and a general movement towards trust-based networks and system designs. However, none of them have pushed into the security space and have the understanding of large venues and events that we do. We marry the personal data issue with the real-world challenge of doing it in real-time on a massive scale in difficult spaces and places. Cyber also utilises several technologies that assist in maintaining trust, integrity and privacy including a blockchain for data integrity and Open Whisper as the end-to-end encryption platform.

Comments are closed.