Exploring EviKeyboard BLE: Functionality Details
Click here for more technical information
Configuration and Installation
To effectively use EviKeyboard BLE technology, you’ll need the following components:
- An InputStick Bluetooth USB product, which connects to your computer and receives data from your phone.
- An NFC HSM equipped with EviKeyBoard technology for secure hardware storage of your data.
- The InputStick utility app for NFC-enabled Android phones, facilitating the communication between your phone and the InputStick.
- The Freemindtronic app for NFC Android phones, which manages the encryption and transfer of data from the NFC HSM to your computer.”
Security and Data Transfer
The EviKeyboard BLE Data Transfer Protocol is a seamless method for moving data from an NFC HSM to your computer. It utilizes a direct connection via an NFC-enabled Android phone paired with the Freemindtronic application. This protocol is designed for simplicity and efficiency, ensuring that data is transmitted swiftly and securely without the need for manual keyboard input.
EviKeyboard BLE’s security framework is built on robust AES-128 encryption, providing a high level of protection for your data during transfer. The protocol does not store any data, ensuring that your information remains confidential. With the addition of a password layer, EviKeyboard BLE offers a secure communication channel, reinforcing the zero trust approach to data security and integrity.
Ease of Use and Security
EviKeyboard BLE is remarkably user-friendly, requiring zero knowledge of complex rules or special expertise. It embodies the zero trust security model, ensuring that data entry is secure without the need to use the computer’s keyboard. This approach minimizes vulnerabilities and maintains the integrity of your data.
FAQ
Security relies on multi-factor authentication using Freemindtronic’s patented EviCore NFC HSM. Each session begins with an NFC tap that decrypts a segmented AES-256 CBC key. The payload is then transmitted via BLE using AES-128 encryption. This ensures a sovereign execution chain—air-gapped, ephemeral, and cryptographically segmented.
For full technical details, visit the EviKeyboard BLE: How it works page.