Our portfolio includes wide range of cryptographic solutions developed from a scratch and covers solving of main IT security tasks...
Finally completed works on the redesign of our Web-site and now it is available for visitors. On the site presented the latest information about the company, products, services, portfolio, current job vacancies and other.
If you have any questions or suggestions regarding this site, please send them to e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
We will gladly consider all your suggestions and comments.
The system of "Social health insurance card" includes multi-functional smart card and an infrastructure to support it. The card includes: identification application, information for emergency medical care, digital signature, payment application (NSMEP "check"), supports systems of the logical and physical access control, loyalty and contactless micropayments. The card supporting infrastructure includes variety of hardware and software systems.
The hardware-software complex provides the full life cycle support of the smart cards powered by the digital signature function: from issue, logical and graphical personalization up to their invalidation. The complex is integrated with a Certification Authority that supports the cards as active key carriers. Also it supports USB-tokens (without graphical personalization). The complex includes a few types of workplaces and separates the staff permissions by different roles.
The hardware-software complex that supports the medical application on the "Social card". The system provides protection of personal medical information of the card holder when it is accessed ambulance doctor (without the participation of the affected person) and secure medical data updates in the card from the central server (via a secure channel, after the confirmation of the card holder).
The hardware-software system of the generation and hierarchical distribution of secret keys between security modules (SAM or HSM) of various functional applications. The system can be used to provide the secure support of the full life-cycle of smart cards (or tokens) in the large-scale projects with multiple geographically-distributed service points. System supports separation of the functional roles of operators working with HSM/SAM.
IP-encryptor is intended for protection of a corporate network infrastructure with geographically distributed offices. The encryptor has a hardware true random generator for session keys generation and a hardware accelerator of AES-256 encryption algorithm and SHA-256 hash function. It performs the whole IP-traffic encryption and authentication, protects private networks from external attacks by the firewall and IDS modules, supports scalability of the network services.
Hardware-software solution for secure generation, reservation and usage of the long-term keys of the GOST 28147-89 symmetric encryption and authentication algorithm. It can be integrated as an active key carrier (AKC) to such systems as: storage encryption, secure communications, dynamic authentication and logical access control. The AKC also supports the DSTU 4145-2002 digital signature algorithm and the shared secret key derivation on it's base.
"Secure Virtual Drive" − software for cryptographic protection of data storages. It allows you to create a virtual disk, which keeps all data in encrypted form only. It is absolutely "transparent" for third-party software. It supports the smart cards and USB-tokens as the key carriers, which are protected by a PIN-code. Thereby it implements the two-factor user authentication. Also it supports integration with flexible access control system "GOST Key Keeper".
Plug-in software module of cryptographic protection for the well-known "instant messaging" client Miranda IM. It supports encryption of the transmitted messages and authentication of the chatting parties by their public key certificates (support of the OCSP service). As an active key carrier it supports smart cards and USB-tokens, including the "Social Card". The choice of supported encryption algorithms: AES-256, Camellia-256 or GOST 28147-89.
Windows Logon Provider that performs authentication based on PKI enabled smart cards. It implements two-factor authentication of the Windows domain users based on the ownership of the card with private keys and knowledge of the access PIN code. A distinctive feature of the solution is support of the PKI smart cards that have no additional memory for Windows Logon specific data storing. The solution integrates with Windows CA and AD.
It is authentication system of workstation's (PC) users before an OS boot. The two-factor authentication is based on smart card (including the "Social Card") or USB-token that are protected by a PIN code. The solution is integrated with a system of the bootable (and other) partitions encryption or full disk encryption (FDE). It allows you to protect PC against threats of confidentiality infringement and the spyware injection, in case of non-permanent control over the turned off PC.
Universal cryptographic transformations library that has a modular structure and allows you to quickly integrate the cryptographic protection means into own or third-party software products. The library supports major domestic and international standards of cryptographic protection, as well as the ability to use the active key carriers that implement a number of cryptographic algorithms by hardware.
A problem domain analysis and security software development by your specific requirements.
Development of strong cryptography powered hardware for business specific needs.
Comprehensive vulnerabilities analysis and secure architecting of complex IT systems.
Algorithms and protocols cryptanalysis and design, software safety analysis.