Logo

Right Data at the Right Time to Produce the Right Insights. Safely.

Innovate how data is accessed and shared without losing control.

  • Simplify data aggregation with trusted execution environment
  • Manage and control access policies into your sensitive data
  • On demand secure enclave insertion at scale

Innovation Leader for Solving Complexity in Data and App Collaboration Safely

Database system for protecting and securing stored data using a privacy switch. *US 10,860,735 Issued 08/2020

A system and method is provided for storing user data records in a database to protect stored data from data breaches, where each of the user data records including a plurality of user attributes. One or more user attributes in each of the user data records is designated as a private attribute and is obfuscated and replaced by credentials that can be verified by a verifying entity without disclosing the private attributes. Applications of the privacy switch technology are shown for handling data breaches in database systems, thereby providing fundamental improvements to the security and utility of database technology.

Consistency and consensus management in decentralized and distributed systems. *US 10,686,601 Issued June 2020

A method for achieving consensus amongst a distributed and decentralized set of computers, devices or components in a network interacting via messaging is presented. The method does not rely on the availability of an overall ledger that is consulted for every interaction. Rather, the interacting components communicate directly with each other via messages that contain proofs of consistency that may be used to achieve local consistency amongst the interacting components. Local consistency guarantees global consistency. For regulatory and record keeping purposes, use of an overall ledger may be contemplated for regulatory and record keeping purposes. The latter may be updated by the interacting devices via an asynchronous updating mechanism.

Policy Controlled Sharing of Data and Programmatic Assets *US 17/939,314

Patent shows how a first and second isolated and protected computing environment can be constructed using hardware-provided encryption/decryption keys. A method is described by which the second environment may generate a certificate and present it to the first environment verifying its integrity. Methods are described by which encryption and decryption keys may be shared between the first and second environments.

System and Method for Securely Processing Data Containing PII, Private and Confidential Information *US 63/440,165

Patent shows how data containing PII, private and confidential information can be encrypted using encryption keys generated by programs running in isolated and trusted computing environments. Methods are shown for creating and sharing encrypted assets. Methods are shown associating access policies with encrypted data and code assets.

System and Methods for sharing and trading user data and preferences between computer programs while preserving user privacy. *US 10,320,781 Issued June 2019

Systems and methods are provided which allow computer programs or other entities to share user data and information so that users may be authenticated, and their preferences shared among entities in networked environments and machines. Cryptographic credentials are generated for these purposes. While the credentials can be shared to provide entities with user authentication and preference data, a salient feature of the sharing technology is that the user is always in control of, and integral to, the sharing protocol. Moreover, the sharing preserves the privacy of the user's data.

Testing and other data communicated using trust models in decentralized and distributed systems. *US 11,522,705 Issued Dec 2022

A method for communicating information relating to test results of a user (e.g., patient) includes obtaining test results of a user, deriving an assertion from the test results and a proof associated with the assertion. A method is shown to verify the proof that the assertion correctly represents the test results without revealing the underlying test results.

User controlled trusted and isolated computing environments. *US 11,409,846 Issued Aug 2022

Systems and techniques described herein are concerned with providing supervisory control of computer programs. A method for executing application code defining a computer program includes providing a “kill switch” to the operator, which allows the operator to disable the computer program without becoming aware of the state and data of the computer program.

System and method establishing a trust model for shared content on the Internet. *US 11,218,315 Issued Jan 2022

A method is provided for validating an assertion provided by a web resource. The method includes using cryptographic credentials, an assertion and an associated proof. The method involves verifying the proof that the assertion accurately reflects the data underlying the assertion without revealing the underlying data.

System and methods for maintaining user privacy in applications providing products and/or services. *EP 3494484A1 Issued April 2022

Decentralization of application programs is a growing trend. It is known that user data communicated to different components of a transaction or application may be linked to derive a composite profile of users. A system and methods are presented that maintain user data privacy in decentralized networks, possibly containing multiple sensor devices. Applications to controlling smart devices and service portability across providers are shown.

Our Journey

2021

Co-founders meet in fall 2021 to leverage emerging trends in hardware support for cryptographic features leading to fully encrypted memory for protected execution environments. Data and code assets can remain encrypted at rest, in transit and during use. SafeLiShare is founded in August 2021.

2022

SafeLiShare raises seed round funding in Spring 2022 from Taiwania, Ta Ya and Forth Ventures. Initiates PoC trial with customer prospect. Announces beta version of secure data platform providing protection, access control and privacy to data and application workloads containing shared assets. Public Key Infrastructure (PKI) is managed by programs executing in isolated and protected execution environments. Distributed authorization policies are enforced in TEEs.

2023

SafeLiShare extends its data platform to support secure collaborative computing. Multiple organizations may contribute data and code assets with their associated authorization policies. Application workloads are constructed and executed in TEEs preserving specified policies.

“The emerging trend in computing technology is that application executions and PKI management are moving into protected memory spaces where encrypted data will be decrypted and all actions recorded by immutable audit logs. Certain protections will become obsolete while others will become available natively.

Organizations need to keep pace with this sea change or lose ground to fast moving competitors. The situation is analogous to the Internet's use of encrypted communications.”

Dr. Cheng

“The challenge is that while organizations are increasing their use of data, they often struggle to do it securely and with compliance. SafeLiShare seeks to reverse the never-ending cycles of adding more protections which could have been handled very differently with Confidential Computing ubiquity.”

Dr. Cheng Wu, General Partner

Taiwania Capital Management

Leadership

The SafeLiShare leadership team is comprised of visionaries with decades of distributed computation, network protocols, cloud security and ML experience. Every team member is obsessed with delivering customer value and protecting them from the evolving threat landscape.

Shamim Naqvi

Shamim Naqvi

CEO and Co-Founder

Goutham Puppala

Goutham Puppala

Chief Architect and Co-Founder

Pramod Koppol

Pramod Koppol

CTO and Co-Founder

Cynthia Hsieh

Cynthia Hsieh

VP of Marketing

Advisors

Dr. Cheng Wu

Dr. Cheng Wu

General Partner, Taiwania Capital

Ryan Shen

Ryan Shen

Advisor

Brendon Howe

Brendon Howe

Member Board of Directors

Dr. Huang Lee

Dr. Huang Lee

Board Member

Austin Yu

Austin Yu

Advisor

Investors

SafeLiShare simplifies data policy enforcement, allowing organizations to quickly access data without sacrificing security

Taiwania Capital

Taiwania Capital

TAYA Group

TAYA Group

Forth Management

Forth Management

News

Curious about SafeLiShare

Want to discover how to make your data collaboration easy a drop of command? We’re here to help.