Welcome!

News Feed Item

GO-Trust SDencrypter MicroSD and Sycret Voice App Puts Mobile Calls, Texts and Emails on Lockdown

MWC2014 and RSA2014 -Today GOTrust Technology Inc. (GO-Trust®) announced that National Institute of Standards Technology (NIST) has awarded the company Federal Information Processing Standards (FIPS) 140-2 level 3 certification for their SDencrypter microSD working on Android and many other Operating Systems including Windows and Linux. FIPS 140-certified products are mandatory for US military and US Civil government users protecting sensitive data by encryption. This level of encryption is now available to protect files, voice calls and text messages for most Android users – from government to corporate environments.

“GO-Trust is the only company providing FIPS 140 certified peer to peer communication on smartphones, tablets and other SD card enabled devices,” said Darren Lee, CEO of Go-Trust. “This means companies can have complete control over the mobile environment of their employees with the confidence of military-level security, even with BYOD users.”

Sycret Voice App coupled with the SDencrypter provides military-level security for small groups of individuals and major corporations alike. By inserting the GO-Trust SDencrypter in the microSD slot of a smartphone and downloading the Sycret Voice App from the Google Play store, a user can set up an encryption tunnel that scrambles voice, text and emails with any other Android user who has the same SDencrypter /Sycret Voice configuration. Alternatively, Voice can be tailored to meet the needs of each unique corporate environment.

All encryption operations are computed inside the FIPS-certified SDencrypter microSD with a proprietary chip. A random, unique (for each conversation) encryption key is generated and all the encryption/decryption processing (AES 256) takes place in the SDencrypter chip. Nothing in the encryption cycle is computed in the open on the phone, thereby creating a peer to peer encryption chain. There are no secret keys generated, exchanged or stored on a central server; so there is no information that can be hacked or subpoenaed. Even if the encrypted message was recorded as it was being transmitted and afterwards both phones were stolen or confiscated it would be impossible to reconstruct the conversation (backward security).

Encrypted mobile phones have historically either been purpose-built and expensive or software only solutions with significant security limitations. Sycret Voice is unique; when combined with the SDencrypter it is a robust hardware-based solution that can be retrofitted to most of the popular Android smartphones, including Samsung Galaxy and Note series, HTC , LG and Motorola phones, while still using the existing telecom operator service. If the phone is updated or the operator service changed the SDencrypter can easily be moved to the new phone and the latest Sycret Voice APP downloaded from the Google Play store.

The encrypted conversations use the phone’s data connection service instead of the voice call service. So there are no conventional phone numbers that can be recorded to log the origin, destination or duration of the call. The cost of an encrypted call to anywhere in the world is included in the user’s data plan. Unlimited data means unlimited encrypted calls worldwide.

Sycret Voice and SDencrypter have been adopted by many government and enterprise projects. GO-Trust is now actively looking for distribution partners in the US and Canada.

NIST FIPS 140-2 LEVEL 3

FIPS are U.S. government standards for information technology and computer security. The FIPS program is run by the National Institute of Standards of the USA (NIST) under the US Department of Commerce. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The current FIPS version is 140-2.

Obtaining FIPS 140 validation requires a rigorous testing process by an accredited laboratory to ensure the security integrity of the unit requesting certification. The results are then reviewed by the National Institute of Standards and Technology (NIST), which issues a FIPS 140 validation certificate. GO-Trust FIPS validation number is 2084 and can be viewed here on the NIST website: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2014.htm.

About GO-Trust

GOTrust Technology Inc. (GO-Trust®) is the innovator of the secure microSDs and the first company to deliver mobile credit card, mobile banking authentication, voice & text encryption and FIDO login using the microSD form factor. GO-Trust® continues its world-leading secure microSD innovation with the most powerful, fastest and smartest microSD embedded chips and the most sophisticated supporting applications. The company’s latest products include the SYCRET VOICE, using military strength hardware encryption for voice, SMS, cloud storage and file sharing. GO-Trust® has fourteen international patents for secure microSD products and serves as an active member of the FIDO (Fast IDentity Online) Alliance. Visit GO-Trust at www.go-trust.com.

Note to Editors:

GO-Trust executives are at RSA in San Francisco at the FIDO Alliance Showcase, to set up a meeting or demo contact Kim Stowe at 408.839.8750. Sycret Voice and SDencrypter brochures are available on line at www.go-trust.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"Codigm is based on the cloud and we are here to explore marketing opportunities in America. Our mission is to make an ecosystem of the SW environment that anyone can understand, learn, teach, and develop the SW on the cloud," explained Sung Tae Ryu, CEO of Codigm, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"The reason Tier 1 companies are coming to us is we're able to narrow the gap where custom applications need to be built. They provide a lot of services, like IBM has Watson, and they provide a lot of hardware but how do you bring it all together? Bringing it all together they have to build custom applications and that's the niche that we are able to help them with," explained Peter Jung, Product Leader at Pulzze Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2,...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...