A vault is selected when its background colour is hilited (yellow).
Vault markers can also be used to instantly edit a Vault by clicking on it with a mouse or tapping on it with your finger on a mobile device.
You may imagine that your data is like the characters in a book. Someone comes along and takes out the characters in a seemingly random order and puts half the characters in one bag, then the other half the characters into a second bag (2 backup files).
Should someone break into your home and steel one of these bags, they would never be able to put them together again to form the original book.
They would have to steel both bags, and then the particular "key" (context/pattern) that was used to separate the characters.
If your bags where securely stored in separate (and unknown) locations, and the context in another location, then it becomes virtually impossible to steal this "book".
Each of these data files requires the context and data keys to recreate the original data. Each file by itself is unreadable and cannot generate your original data.
These textareas will have to be copied and pasted to your own files (you could paste them into a word processor or text file using a program such as notepad.
You would be responsible for recording the date and time of each file, and the relationship to other files (names, dates, times) so that you would be able to restore your data when necessary.
A much better option would be for you to store some data files globally on multiple servers, and if you are concerned, store one piece of data and/or the data key locally.
Even should someone accomplish this, they would still have to obtain your "client Key".
If this "remote possibility" still concerns you, then you may keep one data file, and/or the data key locally where you can hold on to it.
Context Ordered Replacement Algorithm (CORA) is ideally suited to the Global Online community.
By its very nature, CORA protects against a thief/hacker acquiring your data even if they successfully comprimise your online security.
CORA maps your data to different files which are best kept on different storage media, such as on different servers on different networks.
CORA is capable of optimizing corporate security by shielding key elements of the context mappings on a device or network that in a strickly inaccessible (offline).
The following samples illustrate the types of output obtained with CORA as of this introductory version.
This is a sample client Key: Ÿ老Ӷ㨁仃肐䝜䠬䇶盚慼ⶦʝ擊ഇ㕒҅慤緉㢄㚞湇䧈寉┨ఢⱀ
Data Keys are uniquely generated every time CORA is used. The following are samples of data Keys:
Tue Jul 26 22:12:14 EDT 2011|4767,26,0,2,|3|2|8|16|2929,2198
Tue Jul 26 22:12:36 EDT 2011|4767,26,0,3,|3|3|8|16|2196,1466,1465
Wed Jul 27 05:40:29 EDT 2011|1253,26,0,2,|3|2|31|16|787,592
Sun Jul 31 09:24:00 EDT 2011|4767,26,0,3,|3|3|8|16|2196,1466,1465
Sun Jul 31 09:25:05 EDT 2011|1253,26,0,3,|3|3|31|16|590,395,394
The following are examples of data Files that are generated and presented to the user to store locally.
This is an example of one data File being saved at the client and the second data file being saved at the server. Notice that the data Key is also saved at the client.
The second data file has been saved remotely at one of two servers that are located on different networks.
This is an example of two data Files being saved at the client.
PhotoPassword is a visual, photo (picture or graphic) based password authentication service available for browsers that are running on a computer.
For more information about how PhotoPassword authentication works, please select iPicPass in the navigation placard in the upper left hand corner of this page.
Developers and website owners interested in using PhotoPassword to authenticate websites that are viewed in a browser should use this website for their inquiries, technical support and product development.
iPicPass is a visual, picture based password authentication service.
iPicPass.com is the website dedicated to mobile devices. While the base code set for mobile devices and browser based computers is the same, there are subtle difference in the immplementation of iPicPass technology on a mobile device.
Developers who are targetting mobile devices should focus their attention to iPicPass.com.
Users who are using iPicPass technology on mobile devices should visit iPicPass.com for more information or assistance.
CORA (Context Ordered Replacement Algorithm) securely stores your data in separate files using multiple keys. Each file is a subset of the original data that separated by context and stored separately.
Should a thief or hacker successfully break in and steal fragments of the data, your data would remain secure unless they successfully comprimised multiple servers, encryptions and/or physical devices.
goCORA.com stands for Global Online CORA. While CORA can be used in a static environment such as on a single computer or mobile device, it is most naturally designed for use in a Global Online environment in which your data is both portable and safe!
One would expect that a static environment should be secure; in all cases CORA is useful in securing your data "even if" a thief where to break in and access your file(s).
It is for this reason, to secure your data wether it is local or globally accessible, that goCORA.com has been named and created.
goCORA is a subsiduary of pieV.com which is a sole proprietorship located in Windsor, Ontario Canada.
goCORA is currently seeking affiliations with computer professionals and/or corporations who are interested in porting this technology to a static environment used by standalone operating systems and application software.