• +886 2-2934-3166
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Expertise

Our specialties range from cryptographic implementation to hardware, firmware and software protection in embedded systems. Through years of research and development, we have acquired specialized know-how and skills positioning us as the leading security service company in Taiwan. Other than speed, stability, energy efficiency and user-friendliness, we additionally factor security into the equation without compromising prerequisite conditions mentioned above. To meet the challenge, we have to cultivate a thorough understanding of technology, production processes and potential attacks. 

Cryptographic algorithms

  • Implementation
  • Security analysis
  • Key establishment
  • PKC (Public Key Cryptography) operations

Chip protection

  • Real security threats and mitigation tactics
  • Side-channel attack

Embedded system security standards

  • Security analysis of production procedures
  • Device identity management
  • Device life cycle management

Mass-production security

  • Design-stage security analysis
  • Security policy planning
  • Key management

Micro-controller security

  • Crypto algorithm libraries
  • Basic security libraries
  • Security protocol design and implementation
  • Embedded firmware and driver design

 

PDCA (Plan, Do, Check, Act)

 

To build a robust and secure system, a strict reviewing process is crucial. We thus follow the ISO-9001 PDCA (Plan, Do, Check, Act) principle to guarantee high-quality services. Adjusted to the field of security engineering, the PDCA cycle encompasses the following elements

  • Implementation
  • Quality testing
  • Penetration testing
  • Incident response
  • Revision

 

Key to heightened security

Based on software engineering building blocks, we particularly focus on 

  • Penetration Test
  • Incident Response

In the first one, we examine the potential loophole in implementation from hackers’ point of view in order to monitor the security of clients’ products even after transaction.

In the second one, we keep track of changes in the security industry, updating our strategies against algorithmic flaws, OS weakness and potential threats, executing timely response to incidents.

  • Implementation
  • Security analysis
  • Key establishment
  • PKC (Public Key Cryptography) operations
  • Real security threats and mitigation tactics
  • Side-channel attack
  • Security analysis of production procedures
  • Device identity management
  • Device life cycle management
  • Design-stage security analysis
  • Security policy planning
  • Key management
  • Crypto algorithm libraries
  • Basic security libraries
  • Security protocol design and implementation
  • Embedded firmware and driver design

To build a robust and secure system, a strict reviewing process is crucial. We thus follow the ISO-9001 PDCA (Plan, Do, Check, Act) principle to guarantee high-quality services. Adjusted to the field of security engineering, the PDCA cycle encompasses the following elements

  • Implementation
  • Quality testing
  • Penetration testing
  • Incident response
  • Revision


Based on software engineering building blocks, we particularly focus on 

  • Penetration Test
  • Incident Response

In the first one, we examine the potential loophole in implementation from hackers’ point of view in order to monitor the security of clients’ products even after transaction.

In the second one, we keep track of changes in the security industry, updating our strategies against algorithmic flaws, OS weakness and potential threats, executing timely response to incidents.
Image

Address: No. 218, Section 6, Roosevelt Rd,

Wenshan District, Taipei City, 116 

TEL:+886-2-29343166

FAX:+886-2-29343167

 
Copyright © 2022 InfoKeyVault Technology. All rights reserved.