SignalWall™: IoT Security Technology

With built-in biometric access control, perimeter and non-perimeter controls and comprehensive user permissions, SignalWall™ technology provides manufacturers of security products with a complete toolset to achieve the promise of IoT while keeping the risks of connectivity at bay with an impermeable defense.

SignalWall™ achieves complete protection for your connected product with a multi-layered security technology that includes tools for active and passive security and built-in communications among interconnected SignalWall™ enabled devices.

Uniquely, SignalWall provides hardware rooted security, which means its security logic executes at the device level, not the cloud, leaving no room for man-in-the-middle attacks  and unnecssecary exposure to the internet. It also means secure access is possible even when the internet is down.

Embedded connectivity & security firmware

Signal scoping identifies rogue electrical signals

Acting as an on/off switch on the electronic circuit, every electric signal is validated for compliance with OEM specified operational safety limits and for assurance that it was generated by a verified operation command.

Robust cryptographic algorithms

SignalWall security logic and all data communications feature hardened proprietary encryption and session management (based on AES 256)

Biometric Identity and Access Management (IAM)

Device operation is restricted to registered, authorized persons enforced with biometric ID technologies available on the user’s cellular phone.

AI Detection of usage anomalies

Applying Artificial Intelligence, SignalWall identifies access attempts that deviate from observed normal patterns and can trigger security actions, as defined by the admin

Embedded firewall

An embedded firewall blocks unwanted data packets and thwarts DoS attacks

User access hours and  geo-location permissions

An admin defined rule base enables setting customized permissions per user based on

  • User ID (who is authorized)
  • User location (where they must be located)
  • Access hours (when – time of day / day of week)
  • Hierarchy (3rd party authorization flow, when required)

Sequenced, 3rd party or Joint Approval Flows

Approval flows can be defined to require 3rd party approval, joint approval by two or more users or a sequence of user approvals to enable access.

Quiet Mode: Trigger-based authorization

For those scenarios where normal operation does not warrant identification for every use, the admin can define those security conditions that will trigger IAM.  SignalWall™ parameters that can be defined as triggers include:

  • Electric signal footprint
  • Time of day usage patterns
  • Geographic location

Always on: Offline mode available for secure entry

Even when there is no internet connection, SignalWall gives you the option to authenticate access in an offline mode, using direct communication with your cellular device. This powerful option prevents the user from having to rely on an internet connection to gain access.

M2M communication 

Interconnected SignalWall devices can communicate directly among themselves to share user permission updates and if triggered, then enforce a lockdown.

[contact-form-7 id="13" title="Contact Form"]
Free WordPress Themes, Free Android Games