Beijing Guotai Network Information Technology Co., Ltd
Home>Products>Desktop encryption authentication device
Firm Information
  • Transaction Level
    VIP member
  • Contact
  • Phone
  • Address
    303, 3rd Floor, Building B, Four Seasons Science and Technology Innovation Center, Zhongguancun Science City, No. 51 Kunming Hunan Road, Haidian District, Beijing
Contact Now
Desktop encryption authentication device
Desktop encryption authentication device
Product details

Product Overview

Desktop encryption authentication device is a small and micro encryption authentication gateway device. The product is based on national encryption algorithms to achieve identity authentication, access control, data encryption and decryption functions. It has the characteristics of small size, simple deployment, and low cost, and can adapt to various network types such as Ethernet, serial bus, wireless network, etc. The product can be paired with itself or used in conjunction with other encryption authentication gateway products, effectively solving the secure interconnection between industrial control terminals and application systems, IoT terminals and application systems, and small data centers, achieving data/instruction transmission encryption and integrity verification.

Features

Two way authentication:Based on domestic cryptographic algorithms, achieve identity authentication between communication parties. The authentication mechanism can be selected according to the actual situation, such as based on PKI/CA, based on symmetric encryption algorithms, etc.

Data encryption transmission:Based on domestic cryptographic algorithms, achieve encrypted transmission of data between communication parties. The specific encryption mechanism can be customized according to user needs, such as IPSec VPN, application layer encryption, etc.

Instruction integrity verification:It can perform integrity verification on downstream instructions to ensure that the instruction information has not been tampered with during transmission.

Protocol filtering:Based on machine learning mechanisms, the product can automatically learn the protocol rules for normal communication between networks, form a "protocol whitelist", block or alert non whitelist protocols, and ensure communication security.

Terminal counterfeiting behavior monitoring:For the secure access scenarios of IoT terminals, industrial control terminals, cameras, and other devices, a machine learning mechanism is used to comprehensively model the device's machine code, daily work behavior characteristics, protocol features, etc., and monitor the device's plugging and unplugging behavior in real time. If it is found that a device has physically disconnected from the network and its behavior pattern has changed, the device that re connects to the network will be judged as a counterfeit device and given an alarm or blocking.

Adaptation to multiple network types:Supports Ethernet, serial port, Bluetooth zigbee、LORA、 Various types of network protocols such as industrial control protocols.

Compatible with multiple authentication encryption devices:Can be paired and used independently to form a secure communication channel; It can also be used in conjunction with our various encryption gateway devices or third-party encryption authentication gateway devices.

自身安全性保障:Based on the trusted computing system, it is equipped with a trusted computing chip to ensure that the core processes/services of the product will not be illegally tampered with.

典型部署

Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!