Encrypted Andriod Smart Phone Technology

Spread the Word
Listed Under

Encrypted Phone
Mobile Security
Secure Phone


July 31, 2014 - PRLog -- CEN-02 encrypted Anriod phone micro Sd card adopts independent hardware encrypted engine; fulfill AES-256 high level encrypt standard; acquire CC EAL5+ approval.

·        AES:Advanced Encryption Standard 256 high level encryption standard. It is stipulated by National Institute of Standards and Technology (NIST).

·        RSA:An algorithm for cryptography. CEN-02 adopts RSA-2048, the length of the code is 2048 binary.

·        CC:Common Criteria, stipulated by National Information Assurance Partnership (National Security Agency subjection)

·        EAL:Evaluation Assurance Level, issued by National Information Assurance Partnership after tested.

·        FIPS 140-2 Level 3.is a U.S. (http://en.wikipedia.org/wiki/United_States)government (http://en.wikipedia.org/wiki/Government_of_the_United_States) computer security (http://en.wikipedia.org/wiki/Computer_security) standard (http://en.wikipedia.org/wiki/Standardization) used to accredit cryptographic (http://en.wikipedia.org/wiki/Cryptography) modules. From Wikipedia, Security Level 3 attempts to prevent the intruder from gaining access to CSPs held within the cryptographic module. Physical security mechanisms required at Security Level 3 are intended to have a high probability of detecting and responding to attempts at physical access, use or modification of the cryptographic module. The physical security mechanisms may include the use of strong enclosures and tamper detection/response circuitry that zeroes all plain text CSPs when the removable covers/doors of the cryptographic module are opened.

·        SIP(System In a Package). This is the only encryption way that can fully resist Trojan attack. The design of this product is encrypted and stored the data through the micro SD engine. Even if the data is sent out by Trojan, there are no worries because all the data has been encrypted. Also, the encryption engine does not belong to any computer operating system. The Trojan has no way to sneak in for the key; therefore, it can not break through the code.


Clever Intelligence Unity
Source:Clever Intelligence Unity
Email:***@cleverintelligenceunity.tw Email Verified
Tags:Nsa, Encrypted Phone, Mobile Security, Secure Phone
Industry:Mobile, Security
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Trending News
Top Daily News
Top Weekly News

Like PRLog?
Click to Share