Leader in Root of Trust Technology for IoT Security
Security of Internet of Things
Let GIANT-SHA256 provide the safest protection
The best way to enhance functional saftey and security
PUF Security Encryption Technology
The Latest Breakthrough in Semiconductor Safety Technology
Future Security Leaders
Leader in Root of Trust Technology for IoT Security
Security of Internet of Things
Let GIANT-SHA256 provide the safest protection
The best way to enhance functional saftey and security
PUF Security Encryption Technology
The Latest Breakthrough in Semiconductor Safety Technology
Future Security Leaders
Product Display
Secure authentication
Auto parts, consumer electronics, solutions, peripherals, modules or consumables are commonly targeted by unauthorized aftermarket companies. These counterfeit replacements can introduce safety concerns, reduce quality, and negatively impact OEM revenue. With secure authenticators, a cryptographic solution can easily be implemented for any system where digital processing capabilities exist.ICTK provides security authentication devices based on "PUF" technology which can help you to implement hardware-based physical security, firmware protection, security storage, security authentication and so on.
+
Secure Microcontrollers
ICTK's secure microcontroller is a secure chip based on "PUF" technology that performs authentication and password operations.Built-in international and Chinese cryptographic algorithms, it support automotive standards.It is suitable for performing security authentication, protecting firmware, preventing forgery and storing security data.With ‘PUF’ technology, G3 can generate more secure encryption keys.
+
Safe NFC tags and RFID
The establishment and growth of a brand condenses the hard work of the enterprise, and the feedback from customers and the market promotes the development of the brand. However, the emergence of counterfeit and inferior products occupies the vested interests of enterprises. For non-electronic products, the traditional anti-counterfeiting code has been difficult to meet the needs of product market protection. The emergence of RFID and NFC technology brings new authentication methods for anti-counterfeiting. However, pure RFID / NFC can not encrypt and protect internal data. To this end, ICTK has launched a new NFC tag GIANT-II, which combines PUF technology (physical non-cloning technology).
+
PUF
‘PUF’ is a kind of biometric recognition technology in chip field, which can also be called "chip DNA" technology. By using the random electrical characteristics of IC devices, each IC of PUF has a unique repeatable root key, which can provide the ultra-high reliability of NIST encryption. Because the key is not on the chip, it is extracted from the chip, so it is impossible to steal a key that does not exist, which greatly improves the security of key preservation.
+
News and Information
Leading the World from the Core
Security Solutions
Create unprecedented value and opportunities for business partners and build a "core" future world
Security solution
IOV Security application
Embedded system security solutions
Video security solutions
Traceability certification
Security solution
IOV Security application
Embedded system security solutions
Video security solutions
Traceability certification
Security solution
With the advent of the "Internet +" era, the Internet of things has developed rapidly and is gradually penetrating into all areas of life. The scale of Internet of things equipment is showing an explosive growth trend. The era of Internet of everything is coming, and the important position of Internet of things security is increasingly prominent in the rapid development of Internet of things. According to the business form, the Internet of things can be divided into three parts: industrial control Internet of things, Internet of vehicles and smart home, and different business forms have different business requirements for security.
Learn more
IOV Security application
In the application of car digital keys, most of the current keyless entry or start schemes, the key still needs to be carried, but only do not need to take out when using. Although it may seem convenient, once lost, it can be expensive and take a long time to replace. The bluetooth keyless unlock and start solution introduced by ICTK adopts virtual keys. The owner can directly unlock the car by carrying the mobile phone with him. The whole process does not need to take out the mobile phone, but only needs to open the APP and bluetooth. Near to the car, it will unlock, leave the car a certain distance, automatically lock.
Learn more
Embedded system security solutions
In China, the industrialization of reverse engineering has become one of the main factors affecting innovation. For innovative enterprises in addition to the use of legal means to protect their own interests, hardware encryption is also a good choice. GIANT-1 security chip from ICTK provides a new hardware encryption solution for firmware protection, which protects firmware from illegal copying and tampering.
Learn more
Video security solutions
"Black Swan", "PRISM" and other incidents to our public video monitoring system security application sounded an alarm. According to the report, 26.35 million cameras in 8,063 cities in 228 countries and regions are exposed to the public network, which will pose a great threat to public security if they are successfully controlled by hackers. GB3514-2017 "video monitoring and networking information security technical requirements for public security", as the first technical standard on video monitoring and networking information security in China, for the first time puts forward clear normative requirements on video monitoring information security for public security, which is the technical basis for comprehensively strengthening information security in the field of video monitoring of public security.
Learn more
Traceability certification
.
Learn more
Cooperative partner
See more
Contact us
Headquarters Shenzhen
Address:
6F06-07 Wan Jun Trade Building,NO.21 Baoxing Road, Baoan District,Shenzhen
Beijing Office
Address:
West 432, Building 6, Glorious International Building, No. 1 Shangdi Tenth Street, Haidian District, Beijing
Telephone:+86-755-2322-0007
Fax:+86-755-2307-8557
Mailbox:info@ictk-china.com
Shenzhen
Beijing