• +886 2-2934-3166
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Solution

In addition to the platforms on which tailor-made security mechanisms are devised, we provide fundamental cryptographic solutions applicable to diverse industries. They include

  • IoT security design
  • Public key infrastructure
  • Key management system
  • Security chip integration


IoT Security Design

90% of the IoT devices work without any security mechanism or with jeopardizing vulnerabilities, which means the hackers can control the devices easily and have access to the unauthorized data for crime activities.

Our iBadge Device Identity Management uses a strong cryptographic authentication chip of low unit cost and offers a cloud-based platform for authentication and management. Based on this solid foundation, vendors and service providers can thus alleviate worries about security.



Public Key Infrastructure

We have comprehensive experiences of PKI applications, from windows and thin-client smart card log-on, deep to CA design, configuration and management.

 


Key Management System

We have designed and built KMS systems for telecommunication OTA service and for merchant POS e-Purse system. The KMS provides the key lifecycle management, key update and online authentication services.

Security Chip Integration

Based on our platforms, we design cryptographic infrastructures for various systems, integrating military-grade security chips into PCI-E cards, USB tokens, MicroSD cards and so on. By doing so, we fulfill subsystem-level security digital protection.

In addition to the platforms on which tailor-made security mechanisms are devised, we provide fundamental cryptographic solutions applicable to diverse industries. They include

  1. IoT security design
  2. Public key infrastructure
  3. Key management system
  4. Security chip integration

 

90% of the IoT devices work without any security mechanism or with jeopardizing vulnerabilities, which means the hackers can control the devices easily and have access to the unauthorized data for crime activities.

Our iBadge Device Identity Management uses a strong cryptographic authentication chip of low unit cost and offers a cloud-based platform for authentication and management. Based on this solid foundation, vendors and service providers can thus alleviate worries about security.

We have comprehensive experiences of PKI applications, from windows and thin-client smart card log-on, deep to CA design, configuration and management.

We have designed and built KMS systems for telecommunication OTA service and for merchant POS e-Purse system. The KMS provides the key lifecycle management, key update and online authentication services.

Based on our platforms, we design cryptographic infrastructures for various systems, integrating military-grade security chips into PCI-E cards, USB tokens, MicroSD cards and so on. By doing so, we fulfill subsystem-level security digital protection.

Why is our security chipTrustworthyReliableRobust?

I. Manufactured by world-known companies (Infineon) 

Security chips own many patents, including cryptographic algorithm, tamper resistant, secure COS and sensors that detect intrusive and non-intrusive attacks. Though many companies buy intellectual properties trying to devise a SoC that equals a standard security chip, it turns out that the cost is several times higher than gains.
II. Equipped with an accelerator and safe storages

The absence of accelerators leads to poor performance in the encrypting process since cryptographic algorithms usually involve computing big numbers. For security concern, the accelerator functions only in the secure areas of chips to boost the overall performance of security services. Storages are likewise very important, especially for cryptographic keys and confidential information. 
III. Capability of detecting and resisting intrusion

Means of intrusion vary with hackers’ tricks. Without appropriate design and implementation, devices are very likely to be attacked within seconds once vulnerabilities are exposed. Smart cards are an example.
IV. Strictly controlled channel by the original manufacturer

The market of security chips usually involves export control; only by NDA and certification can the access be obtained, and regular inspection is also needed. Security chips available on DigiKey or Mouser have been cracked and proven extremely vulnerable.
V. Acquisition of international certificates

  1. FIPS 140-2 Validation Certificate 
  2. ISO 15408 Certification
  3. Common Criteria EAL

These three mainstream certificates cost considerably high, from hundreds of thousands of US dollars to millions.

Image

The market of security chips is very challenging; for manufacturers, precaution and countermeasures are in any time needed to satisfy clients’ requirements in this ever changing world, so our skills should always keep up with hackers’ newest tactics. Besides internationally accredited security chips, we also localize and customize our services, such as risk assessment, cost benefit analysis (CBA) and penetration test.

Lastly, to provide robust security chips and reliable solutions, IKV-Tech collaborates with world-known manufacturer, Infineon, to resell and develop the finest security chips. 

Why doour clientsour partnersindustriesneed us?

01

Diverse threats and tailor-made security

Security takes no effect if threats are falsely assumed. We approach potential threats in various user scenarios and tailor solution specified for customers’ environments.
02

Secure supply chain management

Supply chains of security chips should be adequately managed and monitored as those available online have been proven extremely vulnerable. We import security chips from reputable vendors, Infineon and Microsemi, assuring customers reliable roots of trust.
03

Security is far more than just chip level security

Security is a system-level issue. Any problem with a voice type may break the overall harmony. We are devoted to building a holistic and system-level security mechanism, which is far beyond just integration of security chips.
04

Threshold of domain knowledge

Cryptographic implementation has a high mastery threshold. It requires resources from academic or research institutions, years of experience, and restricted access to supply chains.

Send your message

Image

Address: No. 218, Section 6, Roosevelt Rd,

Wenshan District, Taipei City, 116 

TEL:+886-2-29343166

FAX:+886-2-29343167

 
Copyright © 2020 InfoKeyVault Technology. All rights reserved.