CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

臺灣資安館參展夥伴

Wisecure Technologies

Wisecure Technologies, established in 2019, aims at global markets with standardized hardware security products and service. With top-notch cryptographic techniques powered by InfoKeyVault Technology, we fulfill multiple crypto functions implementable in a wide range of embedded systems with diverse operating systems, including security chip integration, smartcard issuing & applications, key management, device identification, security authentication, firmware protection, data encryption, secure communication, etc. As to security service, we tailor solutions and build infrastructures after assessing potential risk and evaluating clients’ environment, in hope of customizing the most fitting security design for every scenario.

Data SecurityCryptography

KeyVault Hardware Security Module

KeyVault Hardware Security Module 

KVHSMs (KeyVault Hardware Security Module) serve as invincible shields protecting digital assets via physical unclonable and tamper-evident key management, high-speed AES encryption, ECC digital signature and PKI-based certification, elaborated to fulfill profitable and cost-efficient applications, such as IoT authentication, servers’database encryption, time-stamping, firmware and software protection, hierarchical deterministic wallets, blockchain, etc.
These cryptographic operations concur with countermeasures against differential power analysis (DPA), ensuring seamless integration among cryptographic and application layers. Besides, the secure element meets requirements of Common Criteria EAL 5+, guaranteeing military-standard protection.
 
Trustworthy Computing and Signing Platform for Blockchain 
Blockchain use cases involve digital signature, hashing, Hierarchical Deterministic (HD) keys, among which private keys are used to transfer money from one account to another account. That is to say, if someone gets a user’s private key, he can transfer all the user’s money to his own account. Common targets are no other than financial institutions like banks, digital currency exchanges, etc. In view of threats, KVHSMs not only provide a military-standard storage for private keys but also streamline key management, accelerate crypto-graphic computation and customizable extensive applications.

Fulfillment of IoT Authentication & Secure Communication
In light of vulnerabilities dwelling among mutual authentication, cryptographic schemes should be adopted to ward off unauthenticated access. At this point, KVHSMs can protect the server from unauthorized access via PKI (Public Key Infrastructure), encrypt transmitted data, secure firmware update, invalidate any attempt to appropriate devices. 

Great Strides Made to Secure Mobile Payment and Transaction
During mobile payment, TSM (Trusted Security Management) plays a vital role in serving users in a leak-proof manner.  Users’ personal information, transaction records, confidential data should steer clear of any possibility of exposure to malicious users. Therefore, security mechanism becomes a determining factor in to what extent we can fulfill security goals, generally comprising integrity preserving, confidentiality protecting and availability promoting for authorized users.
KVHSM can fulfill a series of cloud-based security functions, including encrypting database, deriving keys in different scenarios, ensuring the integrity of transaction records, launching secure connections between devices and clouds, etc. Secret parameters are stored in a military-standard secure element, and if there’s any external intrusion, a self-destructive mode will be triggered, making sure they won’t be appropriated.

  • Dimensions

Low Profile PCIe Card
69.6mmx145mmx17.5m

  • Temperature

Operation 0°C to 60°C

  • Host Interface

PCI-Express Gen 2 x 4 Lane

  • OS Support

Linux

  • Performance

AES 256 CTR: 8Gbps
AES 256 XTS: 8Gbps
Disk Encryption: 1GB/s
File Encryption: 1GB/s

  • Asymmetric

RSA (1024-2048)
Elliptic Curve Cryptography (ECDSA,ECDH, ECIES) with named and user-defined curves
Symmetric
AES 256 (XTS, CTR, CBC, ECB)

  • Hash/Message Digest

SHA-2, SHA-3, HMAC

  • Random Number Generation

TRNG (AIS-31 Certified)
DRBG (SP800-90)

  • Security

DPA countermeasures
Reset Button
Physical Security Design
CC EAL 5 + Security Chip

Data SecurityCryptography

MicroSD High-Speed Security Card

The microSD security card can provide high-speed encryption, supporting PKCS #11 and FIDO.

  • iBadge Device Authentication Solution

    Our iBadge Device Identity Management uses a strong cryptographic authentication chip of low unit cost and offers a cloud-based platform for authentication and management. Based on this solid foundation, vendors and service providers can thus alleviate worries about security.

iBadge Device Authentication Solution

The animation briefly explains how iBadge works and why it's secure for IoT devices. In addition to the customized vendor cloud and iBadge server, cryptographic standards and security solutions are recognized by relative authorities, which mean they are secure enough to protect your devices from maleficent intrusion.


Product Type

Data SecurityCryptographyData SecurityCryptography