Key exploitable technology-approach