Security That Exceeds
Every Standard
Intake.Dental protects patient data with dual-layer encryption that goes far beyond HIPAA requirements. First, AES-256-GCM encrypts your data to military-grade standards. Then, TreeChain AI's quantum-proof polyglottal cipher transforms that encrypted output into strings of ancient symbols and mathematical glyphs — unreadable, unsearchable, and resistant to current and future quantum computing attacks.
Dual-Layer Encryption Architecture
Most healthcare platforms use a single layer of encryption. Intake.Dental first encrypts data with AES-256-GCM, then wraps that output in TreeChain AI's quantum-proof polyglottal cipher — creating defense-in-depth designed for the post-quantum era.
AES-256-GCM Encryption
Military-Grade Symmetric EncryptionPatient data is first encrypted with industry-standard AES-256-GCM using per-record Data Encryption Keys (DEK) and envelope encryption — meeting and exceeding HIPAA's technical safeguard requirements before the second layer is even applied.
b3e9d1f4a608c2d7e5
- Per-record Data Encryption Keys (DEK) for forward secrecy
- Central Key API with envelope encryption for key management
- Tenant isolation via Additional Authenticated Data (AAD)
- HMAC integrity verification prevents tampering
- 128-bit IV and authentication tag per record
TreeChain Glyph Cipher
Quantum-Proof Polyglottal EncryptionAfter AES-256 encryption, TreeChain AI's proprietary polyglottal cipher transforms the already-encrypted output into sequences of ancient symbols, alchemical notation, and mathematical glyphs from writing systems spanning human history.
- Data appears as meaningless symbols to any observer — human or machine
- Polyglottal cipher resists brute force, frequency analysis, and quantum attacks
- Emotion-keyed cipher modes generate unique encryption patterns
- Each encryption generates a unique shield ID for audit trail verification
- Even if AES is broken, the glyph layer remains independently secure
Live Encryption Visualization
Watch patient data get encrypted through both layers in real time
What This Means for Your Practice
Even in a worst-case breach scenario, your patient data remains protected.
If AES-256 Keys Are Compromised
Decrypted output is still TreeChain glyph ciphertext — strings of ancient symbols independently encrypted and quantum-proof. No patient data is exposed.
If TreeChain Is Compromised
The underlying AES-256-GCM encryption remains fully intact with per-record keys, HMAC integrity verification, and tenant-isolated key derivation. Data stays locked.
Against Quantum Computers
TreeChain AI's polyglottal cipher is designed to resist quantum computing attacks. Your data encrypted today remains protected against tomorrow's technology.
HIPAA Technical Safeguards — Exceeded
Every HIPAA requirement met and surpassed with additional protections built in from day one.
Encryption at Rest
ExceededDual-layer encryption (TreeChain + AES-256-GCM) on all PHI. AWS SSE-S3 as additional layer. Three total layers vs. HIPAA's one requirement.
Encryption in Transit
ExceededTLS 1.3 for all transmissions. Practice subdomains served over HTTPS with HSTS. Data is encrypted before it ever leaves the patient's browser.
Audit Controls
ExceededComprehensive audit logging for every data access, modification, and admin action. IP tracking, user agent logging, and timestamped records.
Access Controls
ExceededRole-based access control (RBAC), unique user identification, automatic session timeout, and per-practice data isolation with row-level security.
Practice Isolation
ExceededEach practice has dedicated subdomains, tenant-specific encryption keys, and row-level database security. Data is never co-mingled across practices.
Integrity Controls
ExceededHMAC integrity verification on every encrypted record prevents unauthorized modification. Authenticated encryption (GCM mode) detects any data tampering.
Business Associate Agreement
ActiveExecuted BAA with every registered practice. BAAs maintained with all subcontractors including AWS, Supabase, Sikka AI, and payment processors.
Data Disposal
ExceededSecure data deletion upon practice request or termination. Deletion certificates available. Encrypted backups purged within 90 days.
Key Management
ExceededPer-record DEKs with envelope encryption via central Key API. Tenant-isolated key derivation ensures complete cross-practice cryptographic separation.
⚡ 2025–2026 HIPAA Regulatory Updates
The biggest HIPAA Security Rule overhaul since 2013 is coming. New NPP deadlines, mandatory MFA, encryption requirements, and more. See how Intake.Dental keeps you ahead.
View Full HIPAA Updates Timeline →About TreeChain AI & Glyphic Encryption
TreeChain AI is a proprietary encryption technology that operates as a second layer on top of standard AES-256-GCM encryption. Rather than relying solely on mathematical complexity that could be vulnerable to future quantum computing advances, TreeChain's polyglottal cipher takes AES-encrypted data and transforms it through a multi-dimensional mapping system that produces output as sequences of Unicode glyphs drawn from thousands of symbol sets — including alchemical notation, ancient mathematical symbols, astronomical signs, and writing systems from across human history.
The result is that what's actually stored in the database is not ciphertext in any traditional sense — it's streams of shapes and symbols (e.g., ⑨🜐🜟☥₮✍⁹☇ƀ❋❊Ŧ✞☐❼❇☋✈) that cannot be parsed, searched, indexed, or reverse-engineered by any known method, including quantum computing approaches. To recover the original data, an attacker would need to reverse the glyph cipher first, then break AES-256-GCM underneath — two completely independent cryptographic challenges.
Each encryption operation uses emotion-keyed cipher modes — named after philosophers (Aristotle, Plato, Socrates, Confucius, Kant, Descartes, Nietzsche, Spinoza) — that map to distinct cipher configurations, producing entirely different glyph patterns for the same input. This eliminates frequency analysis vulnerabilities completely.
🔐 Defense-in-Depth Guarantee
Because AES-256-GCM and TreeChain operate as fully independent encryption layers, an attacker would need to first reverse the glyph cipher, then break the AES encryption underneath. There is no known or theoretical attack that can defeat both layers concurrently.
Data Flow & Protection
Patient Intake Submission
When a patient submits a form on a practice's portal, the following security measures are applied automatically before the data is stored:
- Form data is validated and sanitized on the server
- PHI fields are individually encrypted with AES-256-GCM using a per-record DEK (Layer 1)
- The AES-encrypted output is transformed through TreeChain's glyph cipher (Layer 2) into quantum-proof symbolic strings
- Plaintext PHI is immediately purged from memory — only encrypted data is stored
- Display-safe glyph representations replace sensitive fields for dashboard viewing
- Searchable HMAC hashes are generated for lookup without exposing plaintext
- A full audit trail entry is created for HIPAA compliance
Data at Rest
Stored data is protected at three levels: AES-256-GCM envelope encryption, TreeChain glyph encryption, and AWS server-side encryption (SSE-S3). Even database administrators cannot read patient records — all PHI fields contain only encrypted glyph strings.
Data in Transit
All communications are secured with TLS 1.3. Practice portals enforce HTTPS with HSTS. API calls between services use encrypted channels with certificate validation. Patient form data is encrypted in the browser before transmission when supported.
Business Associate Agreement (BAA)
Dental Education, Inc. executes a Business Associate Agreement with every registered practice, establishing our obligations under HIPAA for the protection of PHI. Our BAA covers all services provided through the Intake.Dental platform, including:
- Digital patient intake forms and form submissions
- PDF generation and document storage
- Video consultations and teledentistry features
- Practice Management System (PMS) integration via Sikka AI
- Insurance verification services
- Email notifications and patient communications
We also maintain BAAs with all subcontractors in our service chain — AWS, Supabase, Sikka AI, and payment processors — ensuring end-to-end HIPAA compliance throughout the data processing pipeline.
⚠️ Shared Responsibility
While Intake.Dental provides security infrastructure that exceeds HIPAA's technical safeguard requirements, each dental practice is a Covered Entity responsible for their own overall HIPAA compliance program. Practices must ensure:
- Staff training on PHI handling and HIPAA procedures
- Strong password policies and access credential management
- Physical safeguards within their own facilities
- Compliance with state-specific regulations, including teledentistry laws
- Proper informed consent practices with patients
- Incident response and breach notification procedures
Breach Notification
In the event of a confirmed security incident affecting PHI, Dental Education, Inc. will:
- Notify affected practices within 72 hours of discovery
- Provide a detailed incident report including scope, affected data, and timeline
- Cooperate with the practice's breach notification obligations under the HIPAA Breach Notification Rule
- Implement immediate remediation measures and document all corrective actions
- Provide ongoing status updates until the incident is fully resolved
Note: Due to our dual-layer encryption architecture, even in the event of unauthorized database access, patient PHI would remain encrypted and unreadable as glyph strings — which may qualify as a safe harbor under the HIPAA Breach Notification Rule's encryption exception (45 CFR § 164.402).
ℹ️ Encryption Safe Harbor
Under HIPAA's Breach Notification Rule, if PHI is encrypted in accordance with NIST guidelines and the encryption keys have not been compromised, the incident may not constitute a reportable breach. Our dual-layer architecture provides two independent encryption systems — significantly strengthening the safe harbor position for practices using Intake.Dental.
Third-Party Integrations & Compliance
Sikka AI — Practice Management System Integration
PMS integration is provided through Sikka Software Corporation, which maintains its own HIPAA compliance program and BAA. Sikka AI enables connectivity to 50+ dental PMS platforms. All PHI transmitted through the integration is covered under our BAA chain.
Insurance Verification
Real-time insurance eligibility verification is performed through HIPAA-compliant clearinghouse APIs using standard X12 EDI 270/271 transactions. Patient insurance data is transmitted securely and used solely for eligibility verification on the practice's behalf.
Video Consultations
HIPAA-compliant video infrastructure with end-to-end encrypted transmission. Video content is not recorded or stored by Intake.Dental unless explicitly configured by the practice. See our Terms and Conditions Section 11 for full teledentistry terms.
Contact
For security or compliance questions:
Dental Education, Inc.
d/b/a Intake.Dental
Email: support@intake.dental
Website: https://intake.dental
Ready to Protect Your Practice?
Start your 14-day free trial. Full encryption. Full compliance. No contracts required.
