Friday, February 25, 2011

Public Key Infrastructure (PKI)


Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.
The term PKI is sometimes erroneously used to denote public key algorithms, which do not require the use of a CA.

Thursday, February 17, 2011

How Does it Work?


You have an application on your mobile phone which is PIN protected. The PIN can be anything of your choice. The mobile application has a separate dedicated inbox which allows you to receive confidential (encrypted) messages and decrypt the messages. It uses PKI technology (public key-private key) to secure your messages.
You can send message securely to your friends of family or external entity like Bank using this mobile application. All you need is to share your key (public) with your counterpart. The application will encrypt the message and send the secure SMS to him or her. Using his secret mobile application PIN, your peer can decrypt the incoming SMS and see your confidential message in the dedicated inbox.
Brilliant isn’t it? Here is SecMsg for you..

Thursday, February 10, 2011

How can SMS be secured?


We believe that everyone has the right to privacy and protection from unlawful
activities when using their mobile phone. It makes very easy to intercept messages because of the digital nature of communication. While many companies offer security for information transferred over the internet, the security of mobile communication is often overlooked.

Increased use of mobile phones for often highly sensitive and personal information is increasing rapidly, access to bank accounts, and even payments via mobile phones are now becoming part of day to day life.

Considering this scenario, there is a definite need to secure the SMS. But how can it be possible? Encrypted SMS deployment solves the problem for you. Consumers are presented with simple application on the mobile phone. The solution works on most of the handsets and is un-hackable. This type of infrastructure utilise the most advanced encryption technology.