The Enigma Mobile Security App utilizes patented technology we call the “Causal Inference Engine” to authenticate unlimited business logic steps or states. All results are integrated with a simple and easy to use dashboard which reports the attempted access by unauthorized users.


Wolverine Technologies Corp.



("Wolverine") (OTC: WOLV) announced that it has entered into a Share Exchange and Royalty Agreement with Dr. David Chalk, Wolverine will acquire a 25% interest in the process technology and cyber security company ENIGMAMobil Inc. ("Enigma") from Dr. David Chalk


ENIGMA™ Mobile Security App

Enigma Mobile is currently in possession of the world’s only patented technology with the capability to protect against unauthorized smart phone and computer intrusion and fraud.

The technology having been developed over a 12-year period is completed and operational and has been substantiated by IBM’s Research Labs.

Enigma now has the only ability to protect with certainty the wireless marketplace worldwide currently in excess of 6 billion devices and growing at a rate of 50% annually.

Every mobile smart device in use across the globe is fully at risk of being penetrated and manipulated by unauthorized intruders, and the lack of reliable security for mobile devices is now the single greatest threat challenging the wireless device market. This document presents information regarding the current development of the ENIGMA™ App, and how it has solved and removed the underlying barrier that has prevented the development of effective Mobile Security. ENIGMA™ is the only technology capable of universally protecting any application installed on any mobile device and ensures with absolute certainty it cannot be penetrated and manipulated. The technology powering ENIGMA™ is fully patented under law ensuring there is no possibility of competing technology. This one-time investment opportunity is for those interested in solving this cyber security global crisis; it will give visionary partners a ground-breaking role in the next generation of computing and will set the precedent for the technology standard of the future.

THE MOBILE SECURITY RISK

Currently more than 4 billion mobile smart devices are in use and growing exponentially as sales of smart mobile devices now outpace that of PC's worldwide. With 87% of the technology growth in this rapidly expanding mobile market (based on Amazon statistics), it is projected that by 2014 mobile internet usage will surpass that of desktop usage and more than 150 billion Mobile Apps will be downloaded in that same year. Apple alone expects to add over 500,000 new Apps to the market in 2013 and will continue to grow at a rate of 50% annually.

With this rapid growth of the mobile market, issues of security are the most cited barrier, specifically in the realm of Identity Theft. By 2015, 1 billion mobile smart device users will have the ability to tap into personal and corporate confidential data and every one of these devices will be at 100% risk.

Users of mobile devices do not often think of the consequences of their vulnerability. Simple hacking instructions can be found online and once implemented can have your every movement and location tracked. Where you go, what you do, along with your phone calls and text messages can be recorded.

 Manipulation of Apps can have your device working against you; your personal data can be erased or stolen, your bank account accessed and your online assets deleted. There is nothing you can do to stop a dedicated attempt to steal your information or identity. In addition to this constant threat, there is currently no technology that can stop an unauthorized intruder (otherwise known as hackers) accessing your wireless smart device; no matter the type of device or protection you may use.

With cyber-crime on the rise, individuals face increased risk of financial loss and Identity Theft, as no computer system or mobile device is safe from hacking or fraud.

 To illustrate the magnitude of this gap in cyber security

US Lieutenant General John Hyten, Vice Commander of Air Force Space Command, recently stated that:

Cyber-attacks have now surpassed terrorism as the top threat to the US and the global community.

The Enigma Mobile Security App Overview

The Enigma Mobile Security App is designed to prevent unauthorized user access to various mobile devices, their operating systems and other third party apps installed on those devices.

All online security systems use an Authentication Process to insure that input data is compliant and “friendly” to devices, networks, applications and enterprise business logic.

The Enigma Mobile Security App uses 3 Stages during its Authentication Process

 while all other solutions use only Stage 1 and 2.

Stage 1
Network segments, addresses, ports, and other network attributes are authenticated by routers, bridges and firewalls.

Stage 2
User IDs, passwords, biometrics and other user attributes are authenticated by the application or enterprise sign-on servers.

Stage 3
In stage three the Enigma Mobile Security App uses enterprise business logic or the application business logic to authenticate the business transactions or user request actions.

Stage 3 is Crucial

The Stage 1 and Stage 2 authentication process is very easy to by-pass, and as result, unauthorized user access to mobile devices has becomes trivial and common. The mobile device owner is unaware that unauthorized users have full access to their device.

The Enigma Mobile Security App provides the crucial Stage 3 authentication process where ALL unauthorized users are blocked from accessing the owner’s mobile device.