InvestorsHub Logo
Followers 4
Posts 2302
Boards Moderated 0
Alias Born 09/06/2003

Re: Genz2 post# 249084

Monday, 06/17/2024 5:51:35 AM

Monday, June 17, 2024 5:51:35 AM

Post# of 249175
Even more about key management -
March 23, 2016
RE: Wave Systems Lawsuit – Description of various partnerships

Robert and Bill;

As you read through each partnership synopsis that I present to you consider that Wave Systems is partnered with the largest technology companies in the world.

These large and sophisticated companies would never partner with a small unstable company like Wave if they didn’t need our intellectual property.

Why would such large companies like Micron, Lenovo, Microsoft or Intelligent Decisions incorporate our technology into their own security offerings if it was not meant to be used?

The tech giants must use Wave Security tools to manage the TPM chips across the world because the world governments are mandating cyber-security.

Even though Wave’s tools are being shipped around the world to lock down sensitive areas we are still unable to obtain meaningful contracts for the leasing of our intellectual property. It simply does not make sense!

Two and a half years prior to Chapter 7, Wave Systems forms a partnership with Intelligent Decisions. PR statement July 10, 2013:
“Intelligent Decisions (ID), Inc., a global government integrator, today announced a new partnership with Wave Systems Corporation; the Trusted Computing Company to deliver Wave’s comprehensive portfolio of innovative solutions for managing data protection, authentication and malware protection to ID’s government customers.”

“Together ID and Wave will address a very complicated problem that government agencies and organizations have faced for years regarding identity and privilege access controls with the added benefits of much lower management cost, greater compliance and significantly improved security.” “Wave is a proven company that has established a strong reputation as a leader in providing security solutions for IT systems access on-site and in “the cloud” said Harry Martin, president and CEO of Intelligent Decisions.”

Wave CEO Steven Sprague states “ID is one of the most respected distributors in the federal government space.” “Their decision to partner with Wave will give their end users greater access to Wave’s broad range of trusted computing solutions enabling them to eliminate the use of passwords and insure that only devices that are known and trusted are allowed access to the network and corporate resources.” “Wave’s software will be integrated into ID’s Cloud and Cyber-Security practices to provide agencies with control over users’ access and privileges while also offering the ability to audit users’ activity on the system.”

“The agreement covers Wave’s complete portfolio including Wave Cloud which makes mobile devices safe to lose and is ideal for managing Opal self-encrypting devices from the cloud. Wave’s technology eliminates passwords and enables virtual smartcards for second factor authentication and credential protection. The Wave Embassy Remote Administrator for device identification ensures that only known devices are allowed on known networks. It establishes persistent device identity that cannot be spoofed (continuous monitoring). The Wave Endpoint Monitor (WEM) checks on endpoint health and spots an attack before the operation system loads.”

The shareholders believe Intelligent Decisions has been allowed to use Wave’s technology without payment. Since the inception of the partnership to allow ID access to Wave’s most sophisticated security tools no information has been received about the status of the partnership. Yet, ID has gone on to sign many contracts that would require Wave’s security management tools for the Trusted Platform Modular (TPM) chip.

Since July 2013 ID has signed multimillion dollar contracts with the US Air Force and US Army. They signed a $456 million contract to upgrade and protect the FBI IT network.

Intelligent Decisions became the Systems Integrator for the New Amazon Web Services for government cloud to target the federal markets.
On August 21, 2014, Amazon Web Service (AWS) received the first ever US DOD level 3 – 5 provisional authorization for high level security. This is required to secure controlled information in the AWS government cloud. Shareholders believe that Wave’s security suite was incorporated into the Amazon Web Services government cloud by their integrator Intelligent Decisions (ID). Amazon would have never received such a high security clearance if Wave’s TPM management tools were not part of their government cloud system to protect sensitive data. Also, during this time period the DOD was mandating TPM’s in all IT systems networks.

During a shareholders meeting in mid-2013 former CEO Steven Sprague mentioned “he was asked by the government to build a cloud server.” He was even sarcastic about how Wave will be able to control millions of their devices. This is another response by Steven Sprague to an investor’s question “We have serious revenue bearing conversation underway to enable a network of global key servers to address the international concern with NSA surveillance of all cloud content and underpinning this is the demand for better endpoint security model.” According to CEO Sprague the DOD\NSA were approaching Wave Systems for assistance, as they knew our technology was developed and able to lock down the government against cyber-attacks.

Then on March 26, 2014 CIO Teri Takai said the DOD is developing its own cloud security standards. Takai stated the pentagon is focused solely on security. “Our move to the cloud and our desire to move to the cloud is as security based as its based on efficiencies, saving money.” It has been said that Intelligent Decisions using Wave’s Cloud Security tools is building a Cloud Security network for the DOD. How could Wave’s tools not be involved? I recall reading a PR regarding the DOD using ID approximately eight months ago.

Dave Mihelcic, the “Defense Information Systems Agency (DISA) CTO said; “I think there is a great opportunity to leverage involving technology like data at rest encryption and technologies that validate the security of the entire environment and detect advanced persistent threats (APT).” On January 15, 2015 CTO Mihelcic was describing Wave Systems technology to a T. Especially the detection of APT. There is only one TPM security management tool that can stop advanced persistent threats and that is the “Wave Endpoint Monitor.”

Let us try to put everything into a sequence that makes sense. During the time interval I just described the DOD\government were mandating the use of the trusted platform modular to begin locking down high security divisions of the government. Wave’s security suite for managing the TPM evolved over a decade of research and development. This was supported by the NSA and the Trusted Computing Group. Wave’s tools were certified at the highest level of Fips 140-2 validation, opal and NISTA standards.

Intelligent Decisions (ID) is a huge government integrator of IT, Cloud, and security platforms. ID does not have the technology necessary to manage the high security TPM chips that the government is mandating in their devices. To rectify this problem ID forms a partnership with Wave to incorporate Wave’s “Trusted Security Center” (TSC) into all of their government offerings to satisfy security needs. The DOD\government begins the process of locking down sensitive areas of the government and the defense department.

Next, ID is awarded multiple contracts for a new and secure network re; the FBI, Army, Air Force and more. It’s obvious that ID had to be signing contracts with the full provisioning of Wave’s TPM management tools. ID never developed the TPM security technology and had to partner with Wave to meet the TPM mandate of its government customers. In essence this scenario makes it clear that Wave’s tools are out in the wild, either being used or about to be used in scale. Since we were put into Chapter 7 we have lost control of our IP. If we cannot manage the TPM devices using our security tools, who will do Key Management, or should I say who has been doing Key Management for millions of devices.
You simply don’t own the best cyber security tools in the world that are mandated by the US government and not sign many, many contracts. The shareholders developed Wave’s technology to the tune of $500 million plus. We believed in the value of the tech to secure the world against cyber-attacks. We endured massive dilution with three reverse splits thinking our CEO was buying time to take us to the finish line with Microsoft launching Trusted Computing across the world. Ironically, we were at the finish line with Chapter 7. No contracts, no royalties and no communication.

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.