Learn More About Circle Service
Welcome!
Thanks to it’s unique architecture which unifies passwordless authentication + human-in-the-loop identity verification with data security + privacy, Circle can do many different things. We look forward to working with our developer partners to explore and develop all of those possibilities!
This demo is focused on the follow capabilities of Circle, using the use case example of secure file sharing.
Cryptographic Passwordless Authentication
Just send an invitation ID + authorization code to anyone you want to communicate and share files with securely, and Circle does the rest in seconds! Our out-of-band peer-to-peer authentication creates symmetric AES 256 keys on each device via asymmetric public key cryptography. There is no central certificate authority or user and credentials database which can be attacked.
Invisible, Private Circles
A Circle is a group or network of devices which are uniquely authenticated and possess the AES 256 key to decrypt the communications and data exchanged within it. Even user data – and metadata – is encrypted within the Circle. This means NOBODY – not even Circle, the company – has visibility into your Circle.
Secure Digital Capsules
Circle creates and stores data inside of an AES 256 encrypted secure digital capsule on the end user’s device. The capsule is backed up as an inert data blob on the cloud, assuring recovery and protection against all manner of device mishaps and malicious attacks (e.g. ransomware).
One fantastic use case for this is to give users privacy and control of their data. But Web Application Developers can also think of and use this as secure client side storage for anything – files, structured and unstructured data, objects, etc. The data you are storing for your user – always totally private and secure – will persist across all browsers and can also be synched to all devices of the end user.
Learn More
Questions? Ideas?
We want to hear them – please contact us! We want to learn and support the many ways that Circle can enable application developers to provide a new level of security, privacy and trust with their users in the connected world we live in.
Be one of the first to use Circle’s API to power security, privacy and trust for your applications. Join our Early Access Program!