The term PKI is sometimes erroneously used to denote public key algorithms, which do not require the use of a CA.
Friday, February 25, 2011
Public Key Infrastructure (PKI)
Thursday, February 17, 2011
How Does it Work?
You have an application on your mobile phone which is PIN protected. The PIN can be anything of your choice. The mobile application has a separate dedicated inbox which allows you to receive confidential (encrypted) messages and decrypt the messages. It uses PKI technology (public key-private key) to secure your messages.
You can send message securely to your friends of family or external entity like Bank using this mobile application. All you need is to share your key (public) with your counterpart. The application will encrypt the message and send the secure SMS to him or her. Using his secret mobile application PIN, your peer can decrypt the incoming SMS and see your confidential message in the dedicated inbox.
Brilliant isn’t it? Here is SecMsg for you..
Thursday, February 10, 2011
How can SMS be secured?
We believe that everyone has the right to privacy and protection from unlawful
activities when using their mobile phone. It makes very easy to intercept messages because of the digital nature of communication. While many companies offer security for information transferred over the internet, the security of mobile communication is often overlooked.
activities when using their mobile phone. It makes very easy to intercept messages because of the digital nature of communication. While many companies offer security for information transferred over the internet, the security of mobile communication is often overlooked.
Increased use of mobile phones for often highly sensitive and personal information is increasing rapidly, access to bank accounts, and even payments via mobile phones are now becoming part of day to day life.
Considering this scenario, there is a definite need to secure the SMS. But how can it be possible? Encrypted SMS deployment solves the problem for you. Consumers are presented with simple application on the mobile phone. The solution works on most of the handsets and is un-hackable. This type of infrastructure utilise the most advanced encryption technology.
Subscribe to:
Comments (Atom)