Our technology enables our products to feature a full erase of encryption keys once the storage medium either enters “hibernation mode” or is powered off.

How the technology works

Before you can utilise your PC or USB stick the encryption key needs to be transferred from the smart card following an authentication process that requires you to enter a pin code before the algorithm in the smart card verifies that the storage device requesting the key is the correct recipient with the key being transferred securely thereafter.

Most other hardware encryption products involve storing the encryption key somewhere either on the device and/or on the storage drive itself – much like storing the spare key for a car inside the car’s glow box and hence allowing the advanced hacker access to data provided sufficient time and resources available.

We utilise hardware encryption and have developed a code that today is implemented on a field-programmable gate array (“FPGA”), a microchip designed to be configured after manufacturing. After implementing the source code on the FPGA, the chip is casted onto a hard drive controller card to prevent tampering. The key stored on the previously mentioned smart card is transferred to the FPGA after a process of authentication and verification; how these steps are performed is based on our patented represents the core of what we believe makes our solution unique.