Private Networks that you control.
From the Original inventor of Virtual Private Network key
to protect both single user and group user information
cryptographic access protection for single sign on access
a consistent Secure, Rational and Understandable solution to complex
Organizational Key Processes over time.
real time dynamic Multilevel/Multimedia Security on demand.
Intelligent KeyByte labels help you manage sensitive encrypted files
Labeling Processes Matches Your Policies
out of the box E-mail Integration to Cryptography.
Office Application Integration
Chinese Wall for Security Solutions
In KeyByte Non-Repudiation Builds On Your Existing Contracts
Intelligent Interface Provides Message Filtering
Multilevel User Control with central support and oversight
and Notebook Filesystem Solutions
Microsoft Windows95 and WindowsNT
generator supports multiple encryption algorithms including DES.
(We can help you build and interface your own private corporate
Message and File Input and Output without hassle.
manage and update your labels and passwords remotely.
and Robust design capable of on the fly real time key management.
can be generated from your existing database.
can be selected by end users or with a transparent and automatic process.
code developed under CRI’s API (Application Program Interface) and SDF
(System Development Framework)
Software and Hardware solution, (PCMCIA or Smartcard )
Encryption & Decryption key management cryptography goes where you go
and where you need it.
Indemnity + Insurance Service provided by individual contract.
Consulting Support. Is available
Access Spoof Detection
of users, devices, environments and locations
Signatures for Files, Labels and Virtual Networks, devices, environments
Services: Compliant with X.500 & X.509
Virtual Networks, and logical access can scheduled to be created and
System Labeling Control protects users from unauthorized labels
MAPI, and available in VIM, MHS Based Mail Packages
be completely be contained within portable hardware for use.
maintains an encrypted audit trail..
authenticate and call on hardware and software access systems
with Distributed Computing Environment (DCE)
Support as required¼ Flexible interface provided by internal property hooks.
& Program Trading
Routing and Filtering
Network Analysis Processing
Information Pathway Analysis
of Signal Intelligence
Services Risk Control
Outsource Networking, Servers, and Archiving
ROM Publication Security
Physical and Electronic Security
Billing for Electronic Services
Medical Records Access
Control and Stand-down
Teller Machine Services
Files and Messaging
Isolation & Satellite Control
and Component Access Control
is a high performance digital key management system optimized by object
oriented design for organizational domain applications.
It is a stand alone system and is an excellent match for high
throughput, high bandwidth applications because the system can input,
process, and output key vectors as digital information passes through your
consists of a system of multiple object label classes serving labels that
describe the message story and their expected capacity.
Within each security transaction the users participate as either a
sender or receiver of information . The
sender addresses the proper expectations for the message and sends the
message. The message is
automatically wrapped. If
the receiver has the expected circumstantial authority she may
access the incoming message and can authorize decryption with a single
button. At no time do users
ever know or track their message/file keys because all keys are unique to
each transaction and managed transparently.
key vector processing algorithms operate in parallel to protect the label
classes. Each processing
algorithm operates independently as a secure key generation engine,
handling bit data.
The architecture provides a versatile and flexible label management
platform isolates the message/file key.
data vectors may be broadcast to all processing subsystems, or any single
processing subsystems. On output, KeyByte reinitializes the vectors from
time, high bandwidth I/O can take place through hardware parallel ports. Each port may be configured as input or output thus
increasing system configuration flexibility.
High speed parallel port capable of sustained transfer rates is
KeyByte software and hardware also support custom
trailer words accessible within the output data stream.
In addition the headers can openly define the company for which the
labeled information will be expected to perform.
Examples include having the header define the corporation,
department, or agency or project filter to used for fast permutation.
The label interface also supports message inferencing, where data
vectors may be used for authenticated routing from multiple sources to a
single physical/logical destination or from a single source to multiple
High speed, high capacity
Virtual Private Network label database and intelligent labeling
generators can hang off the various ports. Processing is achieved by
passing data back and forth between the predefined
message labeling locations while flowing the message data
through the processor.