Services
This page provides information for executives, computer security experts, application developers and
others looking for the latest computer security technologies.
Cryptographic Security Token
Guarded Key cryptographic security token is the latest client/server authentication technology,
which provides the most secure method of signing into websites and online services.
Certificates and RSA Signatures are protected by 4096-bit key and 8 layers of encryption.
This technology is now available for free with source code for server and client source code disclosure.
Find more about Cryptographic Security Token
Web Developers - Setup your login page for Guarded Key
Setup your web site login page for Guarded Key one-click sign in. Your users will come back and visit your web site more often.
Find more about Guarded Key Web Site Integration
Guarded Key Secure Data Architechture
Secure Data Architecture we have designed allowed us to create the most secure password manager on the market.
The architecture is so strong that even knowledge of the design and code doesn't help in breaking into the encrypted database.
For security teams implementing Cryptographic Security Token and high-tech users who are interested in the design we are releasing
documentation describing Guarded Key secure data architecture which can be used to design not only password managers,
but also other applications, online stores and even operating systems. Imagine operating system, into which no one can break.
This architecture brings interesting copy protection which allows users to use application and their data on any computer and any OS platform,
allows users to create backup copies and even give other users copy of the application to try it out,
but still assures that after trial period new users obtain their license legaly. This copy protection does not store any information anywhere on the computer,
license and registration code is only stored in the user database.
Copyright (C) 2011-2016 Robert Janik, Brno, Czech Republic
|