go top

Gamania CloudForce formed an alliance with I.X to promote physical key encryption and eliminate the leakage of corporate secrets

Event Updates | 2019/12/09

Gamania CloudForce has deeply plowed the information security market for an exceptionally long time; in recent years, it has been focusing deeply on App information security testing services, and had great results in many fields including finance etc. During the App testing process, hidden concerns were seen from time to time. For example, the information saving and transmission of some enterprises were not encrypted; there were also many people who saved certifications on their mobile phones and allowed the certifications to be exported or copied. These phenomena all cause great potential information security risks.

The general manager of Gamania CloudForce Paul Ding stated that in order to help users reinforce these security flaws, Gamania CloudForce has always been searching for suitable solutions; even though there are many key encryption solutions available on the market, but most of them are only applicable to PC environments and could not be integrated well with mobile phone terminals. Also, many of them did not prohibit the exporting of certifications, and caused the mobile phones to become entrances for hackers; this is why Gamania CloudForce was unable to find an ideal subject. It was until this year (2019) when it contacted the Trio wireless key encryption secure communication platform from I.X, and thought that the concept of having enterprises control the encrypted keys themselves could indeed help eliminate the risks from the circulation and storage of enterprise information, it felt so amazing.

So in August this year, Gamania CloudForce and I.X signed a memo of cooperation, expecting both parties to work together to promote Trio to medical, government and high-tech factory fields etc. and help users create a truly safe and secure confidentiality preservation environment.

Only by taking care of keys themselves can the risk of confidentiality leaking be eliminated

Paul Ding said that the Gamania Group that Gamania CloudForce is a subsidiary of has used PKI USB Key for over ten years; the transmission or storage of important information will be encrypted through PKI so that there’s no need to worry even if the encrypted information is saved on the storage space of public clouds. However, the USB Key could not be inserted into mobile phones, so trying to use it to resolve the concerns of confidentiality leaking derived from mobile phones will not work.

Saving certifications into personal mobile phones causes even greater problems; once the mobile phone is intruded, hackers will have the chance to steal the certifications. Even if they did not steal it, they can use the mobile phones of the victims to do all kinds of bad things. As for outsourcing key management to professional companies, there were previous incidences when related service providers were hacked and resulted in the leaking of user keys; so that might not necessarily be safe.

When Gamania CloudForce saw the “Enterprises manage their own keys” appeal of I.X Trio, of course they will be overjoyed and think that these tricky problems they had in the past might have the chance to be resolved.

What I.X did is that they used physical wireless key cards to protect the keys of employees; the keys of employees are saved in a physical encrypted chip (passed EU’s Common Criteria EAL5+ certification), and the key cards were given to employees so the keys can be self-managed by employees. Under its highest specification P2P encryption service, the conversations or information transmission between employees are encrypted and decrypted by each of their cards throughout the entire process; 12 hours after the communication has ended, all messages will be automatically cleared and will not be saved on the individual mobile phones of both parties. Since there were no mediation servers involved during the conversation process, this information will not be saved on any other carriers either. National defense and high confidentiality business institutions all prefer to use this model.

As for general enterprises, I.X released an I.X Smart eBadge appearance recently for the ID verification and access requirements of corporate employees. The chief operating officer of I.X, William, gave an explanation on this subject; he said that this eBadge can be combined with the personal mobile phone and account of the employee to form an exclusively patented “three-key binding mechanism” to realize an ID that cannot be counterfeited. There is no need to remember long and confusing passwords anymore for login, and there is military-grade data encryption, decryption and authorization that meets CC EAL5+ certification, and that is not all the functions that it has.

William further indicated that the I.X Smart eBadge can be used in combination with QR Code for transactions or used as electronic signature when verifying data; the eBadge itself can also be combined and used for access purposes. eBadge not only has the function as employee ID, the display content can also be updated dynamically through SDK. I.X can also help enterprises customize and design the style of eBadge, and the displayed content can be changed at any time according to the needs of different scenarios. In addition, when used in combination with the Trio information security communication platform, it can provide enterprises 2FA authentication integration in PC login and enterprise intranet service login (such as enterprise ERP, CRM, HR or even document management systems etc.); it also allows employees to use safe and encrypted mobile phones or PC to browse company documents and achieve the practice of not having sensitive information falling onto the ground. It can also be used with real-time auditing management backstage to ensure that confidential information of the enterprise will not be leaked, and allow the IT unit of the company to fully grasp the flow trajectory of all information.

Combining ID verification and indoor positioning, manage the whereabouts of people with dementia

I.X has currently accumulated more and more success stories already in domestic and foreign fields, including medical units, government agencies, and high-tech factories etc. Take a foreign medical institution for example, medical staffs used I.X Smart eBadge to ensure ID verification, encrypt medical information communication and combined it with access management to safeguard access safety for the staff and the personal information on the medical records of patients. That is why now there are institutions that started to replace traditional operations with Trio. When physicians carry the eBadge into the hospital, the eBadge will display personal information immediately and grant access, login and ID verification permissions during working hours; once the time that was set has passed and no permission extension was applied, it will automatically become invalid to ensure the safety of personnel control in the medical institution.

I.X Smart eBadge not only combined ID verification, it also supports indoor positioning so it can be used to track and manage patients with dementia or the walking tracks of patients who have been hospitalized for extended periods of time, so there’s no need to worry about patients getting lost in huge hospitals anymore. Medical institutions can even write medical record authorization management mechanisms into eBadge and combine it with indoor positioning so that when patients suddenly feel uncomfortable, it can be combined with the notification mechanism of the hospital, and use eBadge to notify the medical staff for help. And during the treatment process, if the attending physician thinks there is the need to consult other physicians in different departments, with the consent of the patient, the attending physician can actively share the patient’s medical record with participating physicians.

In addition, there are also semiconductor manufacturers that implemented Trio, and combined electronic signature and account binding, strictly implementing ID verification to make sure that only authorized employees can login to specific machines, and prevent confidential formulae from being leaked.

Generally speaking, the awareness for information security in enterprises has improved a lot due to the shocking education from the several severe foreign and domestic information security events in recent years. Enterprises also started noticing security issues when it comes to information saving and the transmission process, but they were helpless since there were no good practices that could take care of both information security and convenience. These are where the market opportunities are for I.X Trio.