How does UDPi’s technology secure peer-to-peer (P2P) communication between two electronic devices?
Each receiver has a unique key that it uses to decode incoming messages. If the receiver party wants a transmitter to send data, the receiver must provide the transmitter with a unique key. The key however, is not sent to the transmitter over the transmission line, but through another secure channel such as the telephone. Since the key is not exchanged over transmission lines, security is increased as when the key is sent over the transmission line, the line can be sniffed and the key discovered.