1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution
Clever Intelligence Unity Logo

Encrypted Andriod Smart Phone Technology


 
PRLog - Jul. 31, 2014 - CEN-02 encrypted Anriod phone micro Sd card adopts independent hardware encrypted engine; fulfill AES-256 high level encrypt standard; acquire CC EAL5+ approval.


·        AES:Advanced Encryption Standard 256 high level encryption standard. It is stipulated by National Institute of Standards and Technology (NIST).

·        RSA:An algorithm for cryptography. CEN-02 adopts RSA-2048, the length of the code is 2048 binary.

·        CC:Common Criteria, stipulated by National Information Assurance Partnership (National Security Agency subjection)

·        EAL:Evaluation Assurance Level, issued by National Information Assurance Partnership after tested.

·        FIPS 140-2 Level 3.is a U.S. (http://en.wikipedia.org/wiki/United_States)government (http://en.wikipedia.org/wiki/Government_of_the_United_States) computer security (http://en.wikipedia.org/wiki/Computer_security) standard (http://en.wikipedia.org/wiki/Standardization) used to accredit cryptographic (http://en.wikipedia.org/wiki/Cryptography) modules. From Wikipedia, Security Level 3 attempts to prevent the intruder from gaining access to CSPs held within the cryptographic module. Physical security mechanisms required at Security Level 3 are intended to have a high probability of detecting and responding to attempts at physical access, use or modification of the cryptographic module. The physical security mechanisms may include the use of strong enclosures and tamper detection/response circuitry that zeroes all plain text CSPs when the removable covers/doors of the cryptographic module are opened.

·        SIP(System In a Package). This is the only encryption way that can fully resist Trojan attack. The design of this product is encrypted and stored the data through the micro SD engine. Even if the data is sent out by Trojan, there are no worries because all the data has been encrypted. Also, the encryption engine does not belong to any computer operating system. The Trojan has no way to sneak in for the key; therefore, it can not break through the code.

www.cleverintelligenceunity.tw

Contact
Clever Intelligence Unity
***@cleverintelligenceunity.tw

--- End ---

Click to Share

Contact Email:
***@cleverintelligenceunity.tw Email Verified
Source:Clever Intelligence Unity
Industry:Mobile, Security
Tags:nsa, encrypted phone, mobile security, secure phone
Shortcut:prlog.org/12354447
Verified Account Email Address
Verified Account Phone Number

Disclaimer:   Issuers of the press releases are solely responsible for the content of their press releases. PRLog can't be held liable for the content posted by others.   Report Abuse

Latest Press Releases By “

More...

Trending News...



  1. SiteMap
  2. Privacy Policy
  3. Terms of Service
  4. Copyright Notice
  5. About
  6. Advertise
Like PRLog?
9K2K1K
Click to Share