SignalWall™: IoT Security Technology

SignalWall™ technology provides manufacturers of security products with a complete toolset to achieve the promise of IoT while keeping the risks of connectivity at bay with an impermeable defense.

SignalWall™ achieves complete protection for your connected product with a multi-layered security platform that includes tools for active and passive security and built-in communications among interconnected SignalWall™ enabled devices.

Embedded connectivity & security firmware

Signal scoping identifies rogue electrical signals

Acting as an on/off switch on the electronic circuit, every electric signal is validated for compliance with OEM specified operational safety limits and for assurance that it was generated by a verified operation command.

Robust cryptographic algorithms

SignalWall security logic and all data communications feature hardened proprietary encryption and session management (based on AES 256)

Biometric Identity and Access Management (IAM)

Device operation is restricted to registered, authorized persons enforced with biometric ID technologies available on the user’s cellular phone.

AI Detection of usage anomalies

Applying Artificial Intelligence, SignalWall identifies access attempts that deviate from observed normal patterns and can trigger security actions, as defined by the admin

Embedded firewall

An embedded firewall blocks unwanted data packets and thwarts DoS attacks

User access hours and  geo-location permissions

An admin defined rule base enables setting customized permissions per user based on

  • User ID (who is authorized)
  • User location (where they must be located)
  • Access hours (when – time of day / day of week)
  • Hierarchy (3rd party authorization flow, when required)

Sequenced, 3rd party or Joint Approval Flows

Approval flows can be defined to require 3rd party approval, joint approval by two or more users or a sequence of user approvals to enable access.

Quiet Mode: Trigger-based authorization

For those scenarios where normal operation does not warrant identification for every use, the admin can define those security conditions that will trigger IAM.  SignalWall™ parameters that can be defined as triggers include:

  • Electric signal footprint
  • Time of day usage patterns
  • Geographic location

Always on: Offline mode available for secure entry

Even when there is no internet connection, SignalWall gives you the option to authenticate access in an offline mode, using direct communication with your cellular device. This powerful option prevents the user from having to rely on an internet connection to gain access.

M2M communication 

Interconnected SignalWall devices can communicate directly among themselves to share user permission updates and if triggered, then enforce a lockdown.

Cloud Portal for Manufacturers

Big data analysis powered by usage data uploads

SignalWall cloud portal for manufacturers features an array of predefined reports providing analysis of devices and aggregate usage data enabling

  • proactive marketing based on individual usage data.
  • Mapping geographical locations of product
  • Device and security statistics
  • Repair service prediction and analysis
  • improved customer service

OEM Rule Base

SignalWall provides the manufacturer with a user friendly rule base for defining security defaults or usage parameters for free/freemium features 

Device Management

SignalWall enables the OEM to set parameters and load firmware updates 

Mobile Apps

Remote access, ready to go!

White labeled SignalWall mobile apps are provided ready to go. In addition, SDKs for iOS and Android are provided for those who wish to custom build their own app while maintaining the integration between the apps and the embedded firmware.

Free WordPress Themes, Free Android Games