Create unprecedented value and opportunities for business partners and build a "core" future world
Security solution
IOV Security application
Embedded system security solutions
Video security solutions
Traceability certification
Security solution
IOV Security application
Embedded system security solutions
Video security solutions
Traceability certification
Security solution
With the advent of the "Internet +" era, the Internet of things has developed rapidly and is gradually penetrating into all areas of life. The scale of Internet of things equipment is showing an explosive growth trend. The era of Internet of everything is coming, and the important position of Internet of things security is increasingly prominent in the rapid development of Internet of things. According to the business form, the Internet of things can be divided into three parts: industrial control Internet of things, Internet of vehicles and smart home, and different business forms have different business requirements for security.
In the application of car digital keys, most of the current keyless entry or start schemes, the key still needs to be carried, but only do not need to take out when using. Although it may seem convenient, once lost, it can be expensive and take a long time to replace. The bluetooth keyless unlock and start solution introduced by ICTK adopts virtual keys. The owner can directly unlock the car by carrying the mobile phone with him. The whole process does not need to take out the mobile phone, but only needs to open the APP and bluetooth. Near to the car, it will unlock, leave the car a certain distance, automatically lock.
In China, the industrialization of reverse engineering has become one of the main factors affecting innovation. For innovative enterprises in addition to the use of legal means to protect their own interests, hardware encryption is also a good choice. GIANT-1 security chip from ICTK provides a new hardware encryption solution for firmware protection, which protects firmware from illegal copying and tampering.
"Black Swan", "PRISM" and other incidents to our public video monitoring system security application sounded an alarm. According to the report, 26.35 million cameras in 8,063 cities in 228 countries and regions are exposed to the public network, which will pose a great threat to public security if they are successfully controlled by hackers. GB3514-2017 "video monitoring and networking information security technical requirements for public security", as the first technical standard on video monitoring and networking information security in China, for the first time puts forward clear normative requirements on video monitoring information security for public security, which is the technical basis for comprehensively strengthening information security in the field of video monitoring of public security.