STEALTH

SAFEPOINT

Personal authentication encryption solution combined with next-generation encryption technology

STEALTH SAFEPOINT

Personal authentication encryption solution combined with next-generation encryption technology

Provide the highest level of security and convenience

STEALTH SAFEPOINT includes
SMPC (Secure Multi-Party Computing),
a next-generation encryption technology
for the highest security level, and zero-knowledge proof technology for simple identity verification

Fast, simple, but highly secure

SMPC maintains data attributes when processing data, so that data security can be ensured even if certain computers are under the control of an attacker.


No platform or 
hardware dependence

It provides its own key storage as a software-based SDK and API, and also provides flexible interaction with existing HSM (hardware security module).


Excellent scalability

Can be used without relying on hardware or platform to replace and link existing product lines, and through KMIP support to ensure communication compatibility between key management systems.

Introduction effect

01 

Protection 
against encryption key theft

The partition encryption key based on the SMPC method will never be reconstructed somewhere in the encryption key life cycle, so it can defend against key theft attacks, and it can be continuously refreshed and stored safely.

02 

Enhancing the security of encryption keys

Separately store encryption keys used to encrypt personal information, payment information, card information, and payment authorization codes to improve security.

03 

Improve non-face-to-face safety

If it is suspected that the user's device has been compromised, the partitioned key pair can be revoked, and a new device can be registered, thereby responding to device contamination and improving the security of non-face-to-face authentication.

04 

Prevent forgery 
and non-repudiation

The tamper-proof audit log and non-repudiation mechanism can use biometrics or PINs for secure transactions.

Decades' credential security issue, It's time to change

Be with Stealth Safepoint.

The most basic method of verifying identity is a password. The reason why a password is used is that a password is a powerful authentication mechanism that users "know", but they choose, forget or reuse a less secure password. Therefore, it is vulnerable to Security impact.


In the case of public key infrastructure (PKI) authentication developed to solve this problem, if an attacker monitors the revocation process of the certificate during the encryption key (public key) verification process, there is a possibility that user credentials may exist risk. Expose to attackers.


SAFEPOINT contains a "Zero-Knowledge Proof (ZKP)" protocol, which allows users to authenticate without revealing secrets, thus solving the problem and making the user authentication process simple and fast.

In the era of data economy,

secure identity verification

can ensure the safe use of data.

Stealth security points will help.

In the open banking environment and emerging services, due to interconnection and channel concentration, the expansion of existing security threats, such as the leakage of important information and identity verification bypass, and new security threats are expected to emerge.


In order to solve these security problems, it is necessary to break through the limitations of existing data security management.


SAFEPOINT uses the next-generation encryption technology SMPC (Secure Multi-Party Computing) to provide the safest and most convenient service. 

Provide the highest level of 
security and convenience

STEALTH SAFEPOINT includes SMPC (Secure Multi-Party Computing), 
a next-generation encryption technology for the highest security level, 
and zero-knowledge proof technology for simple identity verification.

Fast, simple, 
but highly secure

SMPC maintains data attributes 
when processing data, so that data security can be ensured even if certain computers are under the control of an attacker.

No platform or hardware dependence

It provides its own key storage as a software-based SDK and API, and also provides flexible interaction with existing HSM (hardware security module).

Excellent scalability

 

Can be used without relying on hardware or platform to replace and link existing product lines, and through KMIP support to ensure communication compatibility between key management systems

Be with Stealth Safepoint.

Decades' credential security issue, 
It's time to change

The most basic method of verifying identity is a password. 
The reason why a password is used is that a password is a powerful authentication mechanism that users "know", but they choose,
forget or reuse a less secure password. 
Therefore, it is vulnerable to Security impact.


In the case of public key infrastructure (PKI) authentication developed to solve this problem, if an attacker monitors the revocation process 
of the certificate during the encryption key (public key) verification process, there is a possibility that user credentials may exist risk. 
Expose to attackers.


SAFEPOINT contains a "Zero-Knowledge Proof (ZKP)" protocol, 
which allows users to authenticate without revealing secrets,
thus solving the problem and making the user authentication process 
simple and fast.

Stealth security points will help.

In the era of data economy, 
secure identity verification can ensure 
the safe use of data

In the open banking environment and emerging services, 
due to interconnection and channel concentration,
the expansion of existing security threats,
such as the leakage of important information
and identity verification bypass,
and new security threats are expected to emerge.


In order to solve these security problems,
it is necessary to break through the limitations of existing data security management.


SAFEPOINT uses the next-generation encryption technology
SMPC (Secure Multi-Party Computing) to provide the safest
and most convenient service.

Introduction effect

01

Protection against encryption key theft

The partition encryption key based on the SMPC method will never be reconstructed somewhere in the encryption key life cycle, 
so it can defend against key theft attacks, and it can be continuously refreshed and stored safely.

02

Enhancing the security of encryption keys

Separately store encryption keys used to encrypt personal information, payment information, card information, 
and payment authorization codes to improve security.

03

Improve non-face-to-face safety

If it is suspected that the user's device has been compromised,
the partitioned key pair can be revoked, 
and a new device can be registered,
thereby responding to device contamination 
and improving the security of non-face-to-face authentication.

04

Prevent forgery and non-repudiation

The tamper-proof audit log and non-repudiation mechanism can use biometrics or PINs for secure transactions.

Privacy Policy


STEALTH SOLUTION

CEO Hyo-keun Wang ㅣ Company Registration No. 305-86-39705 

Tel. +82-2-562-1221 | Fax. +82-2-562-1228 | info@stealths.co.kr

4F, 83, Uisadang-daero, Yeongdeungpo-gu, Seoul, Republic of korea


Copyright ⓒ 2021 STEALTH SOLUTION All rights reserved.