Encryption for laptops

The internal hard drive is the most advanced security solution for those wanting to safeguard information, data and applications on a laptop. The patented solution consists of an encrypted hard drive that comes together with an encryption chip. This makes it easy to use, simple to administrate, and ensures the best data protection commercially available.

In fact, no other products are equipped with the same level of security:

  • Fully encrypted laptop hard drive (SSD)
  • Pre-boot authentication PIN
  • Encryption key deleted when laptop is turned off or in hibernation
  • User friendly; the user only needs to insert a smart card and a pin cod
  • Full disk encryption of all stored data
  • Smart card technology for storing data
  • Two factor authentication
  • Unbreakable AES 256-bit encryption algorithm
  • The best procedures for data recovery when a PIN is lost or compromised (no system reinstallation and backup recovery)
  • Operating system independent – no software or drivers required
  • No keys stored on the device

The technology supports a 2-factor authentication mechanism to tie the use of Key Token to its owner. Each product ships with Key Tokens (Smart Cards). Only these Tokens can unlock the data encrypted using this specific crypto module. The users must insert the “User Key Token” in the card reader and once the Key Token is accepted by the Hiddn crypto module, the user has to enter a PIN code in order to authenticate to the Key Token and consequently gain access to the encrypted hard drive.

The drive cannot boot without the proper Key Token and correct user PIN, thus ensuring a stolen or lost hard drive remains physically secure and all the data is protected. Hence, the 2-factor authentication mechanism prevents unauthorized users to access the encryption keys from stolen or lost Tokens.

The Key Token transfers the encryption key(s) at every start-up and all keys are deleted when you power off your computer. No encryption keys are stored in the computer CPU, memory, or storage devices or in the crypto module, thus eliminating concerns about attackers obtaining encryption key information from the computer, leaving all data protected and inaccessible.