MetaSecure Corporation, a holder of over 10 domestic and international patents, is a woman-owned, Houston‑based NASA spinoff—a software development company with advanced under development software technologies that help reduce the fear of moving mission‑critical applications into the blockchain, cloud technologies and social web securely.

Our unique‑to‑the‑industry product: MetaNoria metadata, model-driven embedded security patented engine operates at the process level, supporting security life cycle governance in the phase of mission-critical applications and continuous change that can secure today’s blockchain, cloud‑enabled applications while maintaining and enhancing their applications securely.

Secure Blockchain Validation Program

Our secure blockchain validation pilot program is similar to the internet security program we did with NASA. NASA trusted us to save astronauts' lives by protecting the data in mission‑critical applications and awarded us the title of a NASA spinoff. Our company’s goals are to be the leader in the secure blockchain metadata digital transformation industry by pioneering the movement of the commercial and government agency’s mission-critical applications to be implemented to the internet securely.

We bring our validation of metadata security internet real time experience to the commercial market moving metadata mission critical applications into the blockchain, cloud, and social web applications. MetaSecure's knowledge, success, and years of experience with metadata mission critical application security gives us a competitive edge over the digital transformation market as it is today.

Pilot Program

The MetaSecure mission-critical, metadata level security validation pilot program consists of a mission‑critical application with chosen value-add cloud vendors with any blockchain technologies chosen by the client or suggested by MetaSecure staff. The value-add will provide participating customers, blockchain and cloud vendors with the benefit of high-level security for their products and applications allowing them to become the leaders in their industries. Commercial and Government agencies will also benefit from our sophisticated blockchain security, preventing attacks similar to the ones that affected SolarWind.


Our MetaNoria is a software patented encyclopedia meta data engine that secures the content of blockchain by using embedded model-based security at a meta data level. The MetaNoria engine environment is a security-governed distributed approach. Embedded security realized at the enterprise level as the end-to-end “security lifecycle” of a business process and the applications that support business function. This is a critical point as it implies that security at the meta data level can be dynamic, adapting, and changing continuously with the process; “like building an airplane while it’s flying safely”.



Our validation process consist of meta data distribution authentication and ownership enforcement by conduction transactions with data control and retention management. All Meta data transactions are recorded and monitored, governed and validated using security models and ownership controls. Ownership controls are user orchestrated so that ownership can be conveyed at the meta data level and the metadata engine executes these controls based on specific criteria established in shared meta data between provider and requester metadata engines.



Each MetaNoria to is uniquely identified and the membership identifier within a comity of metanoia tools is also assigned and maintain as part of the MetaNoria tool security tool profile. Migrations from one community to another is tracked as a security profile entry as the blockchain. The primary objective of the identify is to have internal transparency about what happened to data , by whom is in manipulation , where it is stored and how it moved. all data is proved to a requester when authorized by the owner of the data -no second hand provision is occurring at any time.




Cyber Attacks

Attacks such as Ransomware and Malware are being used to steal and/or encrypt private keys (digital signatures) of individuals and corporations alike, allowing malicious users to control or gain access to millions of dollars in Bitcoin and other cryptocurrencies each year.


Attempts to steal keys and other credentials. Blockchain projects increasingly becomes the target of attacks due to high investments and gaps in national legislation.

Sybil Attacks

Attackers may be able to out-vote the honest nodes on the network if they create enough fake identities (or Sybil identities). They can then refuse to receive or transmit blocks, effectively blocking other users from a network.

51% (Mining) Attacks

An attack on the integrity of a blockchain system in which a single malicious actor or organization manages to control over 51% of the ledger of the block chain and gives them the ability to take over control using mining techniques.

Routing Attacks

An attack on the Internet Service Provider level to affect uptime or participation in a web-enabled system, such as a blockchain.