Monday, 4 September 2017

A complete solution to secure all the gateways – S2K Login

KounoSoft is a company with a driving force to develop innovative security technologies. Our services range from audio content copyright protection, loT security, FinTech authentication technology, Cyber to IoT authentication security technology. We will develop and supply original technology that protects objects and data in various environments through either a hardware solution with our security chip or a software solution with our authentication security.



S2K IoT Login Sensor Data Gateway
A solution responsible for the complete security of all the gateways and acts as an aggregate for all information transmitted from sensors.

Sensor Adaptor Role
Smart Buildings have many sensors, including temperature sensors, which require a secure method of collecting the sensor data and transmitting it to the BMS. In addition to gathering and transmitting data, security is essential for the process of registration, grating authorization for the sensors, and controlling sensors or environmental factors based on the data generated. The Sensor Adaptor is able to fulfil all of these required security needs

Benefits Sensor Adaptor
These devices contain a Security Chip. Along with the Chip, installed in the device is the S2K Library Algorithms for software security. Therefore Security is enhanced through a combination of Hardware and Software Security measures.

IoT Security Main Module Function
Sensor Adaptor of Sensor
·         Role of the Security Chip within the device : Store Encryption Keys
·         Reverse Engineer Protection Function

IoT Sensor Collection Gateway
·         Collecting All Kinds of Sensor Data
·         Possible to Interconnect Different Kinds of Sensor Equipment
·         Can be Secured during Sensor Data Transmission
·         Supporting Bluetooth, Wi-Fi, LoRa, GSM or CDMA Network

Key Assignment Server
·         Key Distribution and Authentication Protocol between the device and the server in conduction with the Security Chip.
·         End-To-End Security Authentication in conjunction with the Security Chip

Management Server
·         Device and user management function
·         Authorizing users with a specific level
·         Monitoring function

Client/Server SDK
·         Encryption Key Management and Storage and Retrieval of Keys Function in the Chip
·         Key Exchange Function between Security Chip and MCU on the board
·         Secure Boot Function for Kernel Image Protection during boot sequence

Security Management App.
·         Field manager / User Authentication Function
·         Resource monitoring Smartphone App


Are you looking for cyber security solutions providers Korea? Contact info@kounosoft.com

No comments:

Post a Comment