Air Gap secrets management by Freemindtronic Andorra.
The Importance of Air Gap secrets management
The challenge is to keep the secrets as long as possible, and that they are always accessible, in seconds, by authorized persons. The data must be non-repudiable.
The device must be scalable and easy to use, without batteries, without charge and without guarantee for life. It has a multi-level access control of physical source confidence. It can be used offline. It isskimmed from end to end from the device to the display as well as the sharing of secrets.
In addition, the device works for life without battery.
It is resistant to all types of environment, to immersion in liquids, X-rays, electrostatic, magnetic, electrical, thermal -40 to 85 degrees, mechanical stress. It also works under water, in wood or concrete.
Ideally, such a solution should also be favourable to the planet and should be ecologically favorable.
The device decentralizes the secrets of computer systems and information systems. The device has an autonomous energy security system. It designed to be the best security system and cyber security physical and digital. It is manageable and usable offline, without contact at the discretion of the administrator and/or the user.
Freemindtronic NFC devices have all the above features. In addition, they withstandbrute force attacks from a distance and nearby. A remote cyberattack is physicallyimpossible. Indeed, the devices are physically not connected with thenetwork, it communicates with the network only contactless, on demand, in an encrypted way. These are Air Gap devices.
How the Air Gap secrets management Works?
It’s a physical barrier, the “Air Gap”! The device is not physically connected to a network! It has no physical connectors! It has no back door! One means of communication, NFC industrial technology! For more information click
All operating guides are made in real-time video, and show that sensitive data can be recorded, read and shared in seconds, offline, without a server connection. Everything is done without contact, via an industrial NFC memory capable of keeping the data in its memory for 40 years, without the need for an electrical energy source. It is possible to perform more than a million writing cycles in these memories, without error.
To learn more about how Freemindtronic’sNFC devices work, watch the videos from theplaylist of the Freemindtronic or EviVaultchannel.
These videos include user guides for various products and services designed and manufactured on the basis of our EviAlpha, EviToken and EviCyphertechnologies.
These devices are designed to store for life many types of secrets such as private cryptocurrency keys (Bitcoin, Ethereum and other crypto-assets such as IOAT, Tron) and the Passphrases of Smart Contracts and Seed Recovery BIP39 as well as passwords and encryption keys in RSA 4096 and AES 256.
To date, Freemindtronic’s NFC devices can generate the addresses of private keys for Solarcoin, Bitcoin, Bitcoin Cash, Bitcoin Gold, Dash, Digibyte, Dogecoin, Ethereum, Ethereum Classic, Ethereum Gold, Ethereum Lite, Ethereumcash, Feathercoin, Stellar, Litecoin, Namecoin,
To learn more about the EviVault NFC HSM Technology in click here or the EviCore NFC HSM Technology in click here
hardware secrets manager eco-friendly in our Cybersecurity innovations is much more than a commitment. It’s a reality ! Extreme lifespan, Cloud-free, maintenance-free and infinitely transferable products for the secondary market.
From the birth of this idea, the innovation that uses industrial NFC has integrated sustainable development.
How can we integrate ecology process into our innovations, at our start-up scale, make ecology a reality and design our products and services taking into account the circular production and consumption model to compensate to the problems linked to linear consumption (extract, produce, consume, throw away) which is undoubtedly at the origin of strong environmental impacts (use of resources, greenhouse gas emissions, pollution and more or less waste production dangerous)?
Our desire is to extend the lifespan of products and services as much as possible as part of a united ecological approach aimed at reducing, or even extinguishing, our environmental impact. The inventor Jacques Gascuel, the designer of our products and services, integrates from the birth of a new idea the eco friendly parameters in our innovations including their uses and their industrialization in a virtuous cycle of sustainable development. Thus, until they are put on the market, the solutions that we develop go far beyond the criteria laid down by the laws of the energy transition. These same laws that frame green growth with the aim of improving product design, by sanctioning planned obsolescence, that is to say deliberately designing a product so that its lifespan is reduced.
Eco friendly process with the extreme lifespan of our products and services
More than a will, a reality in sustainable development: we design devices with a lifespan of several tens of years.
As early as 2007, when he applied for his first patent, the ecological aspect was integrated into Jacques Gascuel’s inventions. In 2010, in Geneva, he received the silver medal for world invention for his safety system for electrical devices equipped with a black box. This same technology is embedded in EVIKEY NFC and EVIDISK NFC products in order to fight against planned obsolescence and protect electronic systems from electrical and / or environmental hazards. It is a black box which not only traces the life of the product and its uses, but which is also capable of identifying the origin of a malfunction to carry out material proof and establish legal responsibilities.
The strength of sustainable development also applies to the latest inventions of the inventor Jacques Gascuel. EviCard, Evitag, EviVault, EviToken et EviCypher technologies have an extreme lifespan, estimated at more than 40 years.
In addition, extending the lifespan of our manufactured products is one of the levers that significantly reduce environmental impacts. This contributes to waste prevention, as part of a transition to a circular economy, but not only.
Our participation in the other aspect of ecology is energy saving
Our solutions go even further in terms of energy saving since our devices produce their own electrical energy to operate and have no battery (positive energy aspect). This has a double advantage: a saving of electrical energy and the absence of recycling of waste by the absence of a cell or battery whose lifespan is limited between 3 and 5 years.
In the same dynamic, our products and services do not use an internet connection or a remote server to host and use your data (identifiers, passwords, bank cards, encryption keys and access codes). They are recorded in real time dynamically in a programmable memory. Our products work with the auto micro energy produced via the signal from the NFC antenna of the terminal (smartphone). In fact, we have almost no impact on the power consumption, nor on the water and / or derived products, used for cooling servers (Cloud).
How do we participate in reducing waste in our Cybersecurity innovations from their conception?
In terms of waste, we are maximizing our development by using active and passive silicon-based components whose lifespan is not yet known. We mainly use components mass produced by the European group STMicroelectronics. This makes it possible to reduce on the one hand the risk linked to the obsolescence of the components, to favor the European economy, and to use components already mass produced and already proven like smartphones, bank cards or industry . In addition, our products such as Rugged NFC EviVault, EviPro, EviPlus, EviLite, EviOne, EviKey, EviDisk, are hardened to the extreme, and are able to withstand mechanical stresses of several tons, erosion, water, air, dust, brute force attacks, which considerably increases the lifespan of silicon components and therefore the on-board system designed to operate for several decades. In the field of service, our protection systems against brute force attacks are designed to restore our products to their factory configuration, of course after irreversibly erasing all the data stored in memory. This factory reset allows the product to be reused. Only one condition, however, that the owner has in his possession the unique pairing key associated with the product.
Making eco friendly innovations means to plan it from conception to industrialization
We also take ecology into account in the manufacturing process of our products. This means design products with the least possible impact on the environment; this is the principle of eco-design seen by the inventor. He sets goals, in the form of challenges, which require creativity. How do you make cybersecurity products as light and robust as possible, resilient in the extreme? How to achieve “zero defects”, to be adaptable and to be compatible between products and services, to anticipate and take into account technological developments with a long-term vision on the various uses? How do you get products that are extremely easy to maintain and up to “maintenance free”? How to favor, from the design, the manufacturing aspect to use recycled or easily recyclable materials?
Our eco friendly bring real values for our consumers due to sustainable development
Products that work without any maintenance, are upgradeable for free, contribute to energy saving, with an extreme lifespan.
Products that can be given, sold, loaned or rented, in compliance with normal conditions of use. Designed not to break down, but nevertheless replaced free of charge for at least five years in the event of a manufacturing defect, since in principle no one is required.
The on-board security and safety system against brute force attacks and the possibility of formatting allow the product to be returned to factory configuration, which gives our solutions a second life, or even several other lives.
No batteries to change, no need to recharge, no maintenance, very easy to use, extreme hardened versions capable of operating in a deadly environment for humans.
An on-board black box which tracks the entire life of the product and in particular electronic, thermal, electrical or environmental anomalies
Cybersecurity solutions that can be used simply, on a daily basis, which respect the environment of the planet, the private and professional life of their user; this is our commitment eco-responsible
Our hardware secrets manager eco-friendly complies with laws, European and international directives
By the simple fact of the design of our products and services, they are already in compliance with the latest European Parliament Resolution of July 4, 2017 about a longer lifespan of products: benefits for consumers and businesses (2016/2272(INI)).
In the same way, we are also in compliance with French law n° 2015-992 of August 17, 2015 relating to the energy transition for green growth which strengthens the fight against planned obsolescence and promotes the extension of the duration of use of products through consumer information.Click here to know more about the product life as mentioned by Europe since July 4th 2017
Android NFC Phones Compatible with FMT Application
Welcome in Android NFC phones compatible you will find a NFC compatible phone list Android that work with the FMT application, contactless technologies for NFC devices developed by Freemindtronic Andorra.
Google source update date: 7/05/2021
Manufacturer
Model Name
Model Code
A1
A1 Alpha 20+
P671F60
A1
A1 Smart N9
VFD720
AG Mobile
AGM A9
HSSDM450QC
AG Mobile
AGM A10
SHARKL5
AG Mobile
AGM X3
T91EUE1
AT&T
U705AA
U705AA
ATOL
Smart.Slim Plus
t50p
AZOM TECH
Desert2
Desert2
Accent
TANK_P55
TANK_P55
Acer
Walle
Walle
Acer
E380
acer_e3n
Acer
A3-A30
omega
Adart
RX550
ALIGATOR_RX550
Advantech
AIM75-LTE
AIM75-LTE
Advantech
AIM75-WIFI
AIM75-WIFI
Aligator
ALIGATOR_RX710_EEA
ALIGATOR_RX710
Aligator
ALIGATOR RX800
ALIGATOR_RX800
Aligator
RX700
RX700
AllView
X2 Soul Xtreme
X2_Soul_Xtreme
Altice
E54
E54
Altice
S32_NFC
S32_NFC
Altice
ALTICE S43
S43
Altice
ALTICE S60
S60
Altice
S61
S61
Altice
ALTICE S70
S70
Archos
50 Diamond
ac50da
Archos
Archos Sense 50X
ac50xse
Archos
Logic Instrument Fieldbook F1B
lifbf1b
Ascom
Ascom Myco 3
ABAA
Ascom
Ascom Myco 3
ABBA
Ascom
Ascom Myco 3
ACAA
Ascom
Ascom Myco 3
ACBA
Ascom
Ascom Myco 3
ADAA
Aspera
ASPERA R9
R9
Asus
PadFone 2
A68
Asus
PadFone Infinity
ASUS-A80
Asus
The new PadFone Infinity (A86)
ASUS-A86
Asus
PadFone X (A91)
ASUS-T00D
Asus
ZenFone AR (ZS571KL)
ASUS_A002
Asus
ZenFone AR
ASUS_A002_1
Asus
ZenFone Ares (ZS572KL)
ASUS_A002_2
Asus
ZenFone V
ASUS_A006
Asus
ROG Phone ll
ASUS_I001_1
Asus
ZenFone 7 / 7 Pro (ZS670KS/ZS671KS)
ASUS_I002D
Asus
ROG Phone 3
ASUS_I003_1
Asus
ROG Phone 5
ASUS_I005_1
Asus
ZenFone 6 (ZS630KL) (WW) / 6Z (ZS630KL) (IN)
ASUS_I01WD
Asus
PadFone S (PF500KL)
ASUS_T00N
Asus
ZenFone Go (T500)
ASUS_X003
Asus
ZenFone 5 (ZE620KL)
ASUS_X00QD
Asus
ZenFone Max Pro M1 (ZB602KL) (WW) / Max Pro M1 (ZB601KL) (IN)
ASUS_X00T_6
Asus
ZenFone Max Pro M1 (ZB602KL) (WW) / Max Pro M1 (ZB601KL) (IN)
ASUS_X00T_8
Asus
ZenFone 5 Lite (ZC600KL)
ASUS_X017D_1
Asus
ZenFone 5 Lite (ZC600KL)
ASUS_X017D_2
Asus
ZenFone Max Pro M2 (ZB631KL) (WW) / Max Pro M2 (ZB630KL) (IN)
EviCypher Gold Medal 2021 best invention worldwide
With EviCypher, create your own encryption keys and exchange, contactless, in complete security with your correspondents.
Award 2021 EviCypher best invention worldwide with Gold medal of international inventions of Geneva [1].
Personal security should no longer be in the hands of connected digital services, but in those of the individual. Indeed, it is because cybercriminals have access to digital systems that they can carry out their attacks. Freemindtronic’s EviCypher, invented by Jacques Gascuel, establishes an effective physical and digital barrier. It’s an “Air Gap” device that keeps secrets, but that’s not all.
This individual encryption system gives the person back control of their digital data, from end to end, thanks to a secure NFC device. EviCypher is a physical vault of encryption keys unrelated to a computer system, it communicates with the latter on demand via a near field transmission protocol (NFC). EviCypher is backward compatible with Freemindtronic’s EviToken technology, allowing users of these products to maintain their usual digital services.
A Green tech technology that saves encrypted data for 40 years, without any source of electrical power. It is designed and manufactured without battery, connector, cloud and plastic. The device recovers energy through the NFC signal of the Android phone it is paired with. The latter serves only as an HMI & M2M terminal. Recyclable, the device is solid and waterproof. Extremely durable, it can be sold on the second-hand market after formatting back «factory configuration».
The NFC device works without error between -40° to + 85° C. It offers the user extreme portability of availability of their secrets anywhere, anytime and in any situation.
The solution is designed to preserve extreme anonymity, it leaves no trace of its use or of its user.
In 2019, 100 years after Hugo Alexander Koch’s invention of the first portable electromechanical encryption machine, Jacques Gascuel filed a patent on segmented key authentication. It is based on the principle of Kerckhoffs [2] according to which the security of a crypto system must be based only on the secrecy of the key and not on that of the algorithm.
In March 2021, after 3 years of research and development, he innovated again by creating the first device dedicated to contactless encryption. The asymmetric and symmetric encryption key mechanism is secured by trust criteria defined at the discretion of an administrator and / or user.
The EviCypher solution allows end-to-end control of data transport, that is, from one EviCypher Card to another EviCypher Card. The encryption key is made up of multiple trust criteria, the origin of which is physical. It is possible to add up to 9 trust criteria to the 3 other criteria generated automatically during the pairing phase. For example, a trust criterion can be a configurable geographic area at the discretion of the person. To use the decryption or encryption key, you must be physically in the predefined zone and validate the 3 other initial trust criteria.
Advantageously, the system deprives cybercriminals of access to the encryption keys by a physical mechanism. Which also makes it a cybersecurity tool to fight identity theft. It can be used to prevent, for example, fraud attacks against the president and to protect against phishing attacks by email in a simple way.
EviCypher is designed to evolve and adapt to existing communication systems such as online or local email services via Thunderbird as well as all instant messaging including SMS & MMS. Unlike messaging systems around the world, messages remain encrypted by default and will be decrypted on demand.
EviCypher Card will be available early May 2021 for pre-order. It can store up to 200 keys for AES256 encryption and up to 4 RSA 2048 keys or 2 RSA 4096 keys.
It is also a password and PIN code manager for secure USB keys EviKey® and secure SSDs EviDisk® made in France by the Syselec Group. It is compatible with EviKeyboard, a virtual keyboard in NFC and Bluetooth version from Freemindtronic.
EviCypher Card is made in Andorra by Freemindtronic.
Why Freemindtronic NFC hardware wallets with credit card management are PCI DSS compliant.
NFC hardware wallets with credit card management the patented nfc hardware wallet designed and developed by Freemindtronic SL Andorra has a secure manager function, with physical protection of the Bank Cards.
These are highly secure NFC devices for storing encrypted data in AES 256. They have a multi-factor access control and authentication system. These factors are set at the discretion of the user. They may be different for each credit card stored in the device. It is even possible to limit a data’s access to a geographical area.
This is a physical safe Gre reen Tech. Indeed, theNFC device works without a battery, since it recoverstheenergy via the NFC signal of the phone that serves as its terminal. This allows it to always keep available stored data, for 40 years, without maintenance, without the need to be connected to an energy source.
These Hardware wallets are trying tocombat the risk of contaminationlinked toCOVID;indeed, they are used without contact via an NFC phone
These Hardware wallets are Air Gap 1. That is, they are physically isolated from any computer network. The data is stored encrypted only in the device’s non-volatile memory. They are physically accessible only by theuserand/or their administrators.
This Cold Wallet does not collect any personal data. It doesn’t use a remote server, cloud, or remote backup unit.
After authenticating the Cold Wallet user, he can automatically fill out the fields of a credit card to make hispayments online. This is a similar gesture to contactless payment, but to make online purchases. Beyond the risk of COVID contamination,they fight cybersecurity attacks, since theuserdoes not touch the computer keyboard. The data is transmitted from the device and encrypted to the computer system. The data displayed on the screen is offended, shielded froms ss s and prying systems indiscreet or malicious.
Thus, the user can make his purchases online on any computer system or phone without leaving any information of his bank cards. In fact, the user does not need to back up their bank card data in a computer system, in a phone, or in online shopping sites.
Who is affected by the PCI DSS standard?
The PCI standard is dedicated to the data security of the payment card industry (PCIDSS). It is a set of security standards designed to ensure that all businesses that accept, process, store or transmit credit card information maintain a secure environment.2
The PCI DSS standard applies to any organization, regardless of the size or number of transactions, that accepts, transmits or stores cardholderdata.
It applies to all merchants who trade withbank cards. This also applies to merchants who do not store credit cards data but who have received credit or debit cards as a method of payment.
Similarly, these Cold Wallet NFC are not means of payment. These are NFC devices that allow you to fill in information fields of bank cards, in a secure way, to makepayments. This is made fromcomputersystems and connected phones (e.g. computer, smartphone, tablet), but whose transaction is necessarily carried out by existing means of payment, subject to the PCI DSS standard.
PCI DSS does not apply toFreemindtronic SLColdWallet NFC
For several reasons, Freemindtronic SL Cold Wallet NFC cannot be subject to all PCI DSS standards.
First, these Hardware wallets are not an organization, nor a trader.
Second, they donot have the functions of payment cards.
Third, they do not allow payment transactions to be carried out on a terminal. An electronic payment terminal is a device that allows a merchant to accept and process credit card payments. The device allows you to record the transaction, debiting the customer’s bank account and crediting the professional’s account with the amount of the sale. Nordoes it allow you to make money ata bank counter.
Finally, they are also not an electronic payment method (E-payment). Because electronic payment is a means of conducting commercial transactions for the exchange of goods or services over the Internet.
More information
These Hardware wallets have a control system that prohibits token of invalid bank cards.
In addition, the storage of credit card information does not include the PIN.
Physical protection of the bank card
These Hardware wallets effectively protect against the risk of fraudulent use of bank cards as a result of theft, loss or malicious persons. Simply physically erase the CCV from the credit card after backing up the information in the Cold Wallet.
These Cold Wallet NFC also havecontrolsystems including intelligent self-connectionto an original website. The user always connects to the original sites where he automatically manages the favorites.
An associated plugin is compatible with many web browsers, Chromium, Chrome, Brave, Opera, Firefox, Edge. It has a HTTPS control system and exposure to phishing risks based on domainnames.
in short
Even if Freemindtronic’s Cold Wallet NFC is not affected by PCI DSS standards, these curity level, combined with that of bank cards and their uses, is greatly increased to limit the area of attack in the face of identity theft and fraudulent uses.
These Cold Wallet NFC are the most secure, highly secure, mobile storage units dedicatedto physical protection and security of the use of sensitive data such as the visible information of bank cards on connected media as well as their uses on the internet and intranet.
User Experience
These devices, available in credit card format, are usedas for contactless payment at merchants. Thanks to the simple and fast system of self-filling the information fields of bank cards,we have the same known sensations as those of contactless payment. It can therefore be said that itisCold Wallet NFC allowsattempt to make online payments without contact.
EviPro NFC is a white label product that allows to secure secrets via NFC HSM modules. Freemindtronic, an innovative and pioneering company in the field of contactless security, presented this technology at the Smartcity Expo World Congress 2018. If you are interested in this technology, we invite you to come to our stand Hall P2, level0 street D stand 425.
Demo Show Events
What is EviPro NFC presented at Expo Smartcity?
EviPro NFC is a white label product that allows to secure secrets (passwords, PIN codes, encryption keys, etc.) via NFC HSM (Hardware Security Module) modules. These modules are physical devices that store secrets in an encrypted way and protect them from any attempt of extraction or modification. They come in the form of keychains (NFC HSM Tag Keychain) or cards (NFC HSM Card) designed and manufactured by Freemindtronic.
Demo show in booth
How to use EviPro NFC presented at Expo Smartcity?
To use this technology, you just need to have an Android NFC phone and the Android NFC application developed by Freemindtronic. By passing the NFC HSM module under the phone, the user can display the secret, share it in RSA 40960 (a very robust asymmetric encryption algorithm) or use it directly on his phone or on a computer via a web extension paired with the phone serving as a terminal.
Cybersecurity conference by Jacques Gascuel
Benefits of EviPro NFC
EviPro NFC has several advantages over traditional solutions for storing secrets:
It works without server or database, which reduces costs and risks of hacking.
It works only without contact, which avoids compatibility or connectivity issues.
It is lifetime without battery, without maintenance and tamperproof and waterproof, which ensures its reliability and durability.
It uses an AES 256 encryption algorithm, recognized as one of the safest in the world, to encrypt the secrets stored in the EPROM memory of the NFC.
Use case
Why use EviPro NFC presented at Expo Smartcity?
This product is ideal for security agents who need to access sensitive buildings and premises. Indeed, with EviPro NFC Expo Smartcity, they can:
Manage and receive their secrets easily without having to memorize or write them down.
Access secure places using the NFC HSM to display the user in volatile memory to the security agent the secrets to access his surveillance place without leaving any trace of these secrets in the phone.
Share their secrets with their colleagues or superiors in a secure and controlled way.
No risk in case of loss, theft or attempted compromise of the NFC HSM module locked to access with more than 9 trust criteria serving as a multifactor authentication system. Knowing that the secrets contained in NFC HSM can be cloned, backed up in an encrypted way for later restoration in a new NFC HSM.
Benefit from a high level of security thanks to the physical and logical protection of the NFC HSM module encrypted in AES 256 with segmented key.
Buy
How to get EviPro NFC
EviPro NFC is a product marketed in white label by Fullsecure Andorra, a company specialized in the distribution of IT security solutions. To learn more about this technology or to place an order, you can contact Fullsecure Andorra at the following coordinates:
Send us a message
Buy
Meet us at the Smartcity Expo World Congress 2018
If you are curious to discover EviPro NFC Expo Smartcity in action, we are waiting for you at our stand Hall P2, level0 street D stand 425. You will be able to test our technology, ask your questions and exchange with our team. We will be happy to welcome you and show you our contactless security solution.
Freemindtronic hardwares wallet is having regard to Decree No. 2018-418 of 30 May 2018 resulting from Law No. 2016-1321 of 7 October 2016 for a Digital French Republic, relating to the modalities of implementation of the digital safe service. Unless we are mistaken, it appears that the innovative patented solutions of 100% electronic safes for offline use have not yet been regulated.
art. R. 55-1 – The decree provides a framework for the operation of digital safes. Thus, the provider of digital safes is required to inform the user in a clear, fair and transparent way about its service, prior to the conclusion of a contract. In particular, he must communicate
The type of space made available to it and the associated conditions of use;
The technical mechanisms used;
The Privacy Policy;
The existence and implementation of the guarantees of proper functioning.
Since Freemindtronic SL clearly tells users:
the pre-defined space available before the acquisition of the devices, as well as the possibility of checking for themselves the amount of memory used,
the terms of use are available invideos, at any time on the internet, via YouTube as well as through various publications written on the website,
that no material and/or digital information is collected in any way whatsoever, which consequently generates the total anonymity of the user,
the complete technical data sheets of the devices are available on the Freemindtronic SL website.
the implementation of the guarantee is published on the website. A large part of Freemindtronic SL solutions are guaranteed lifetime devices.
art. R. 55-3 – The said decree specifies that the integrity, availability and accuracy of the origin of the data and documents stored in the digital safe are guaranteed by appropriate security measures and in accordance with the state of the art.
Since Freemindtronic SL can guarantee users:
Data integrity, which is guaranteed by the manufacturer of STMicroelectronics components for at least 1 million error-free write cycles, and 40 years of data retention in non-volatile memory.
Their availability since Freemindtronic SL devices work without maintenance, without battery, by recovering electrical energy via the NFC signal of a smartphone. Thus, such a device allows users to access at any time, for at least 40 years, the data contained in the vault.
The accuracy of the origin of the data: it is the user himself who stores the data in the electronic memory of The Vaults of Freemindtronic SL
Memory access is physically locked by multiple hardware devices, such as a unique peering key with at least one user-defined administrator password. These security measures implemented imply the material and/or digital impossibility of corrupting the backed up data. It will also be impossible for the manufacturer to be able to access the automatically encrypted contents of said memory of the device. It is specified that the user has additional functions that allow him to harden himself the level of security according to the use of Freemindtronic’s electronic safes.
art. R. 55-4 The said decree specifies that the traceability of the operations carried out on the data and documents stored in the digital safe require at least the implementation of the following measures:
The recording and timestamp of accesses and access attempts;
Recording operations affecting the content or organization of the user’s data and documents;
Recording maintenance operations affecting data and documents stored in digital vaults.
The retention periods of this traceability data constitute a mandatory mention of the contract for the provision of electronic safe services.
Since Freemindtronic’s electronic safes,
have a tamper-proof and non-modifiable black box. That this black box traces in particular the number of attempts to enter the administrator password and that this information is automatically saved in the black box.
manage the recording of data dynamically, machine to machine (M2M) between the NFC terminal and the NFC device. That the backup system is carried out in real time with the physical electronic memory of the device, on the volatile memory of the terminal, without preservation of this data.
have non-volatile memories, capable of retaining the data backed up by the user for at least 40 years, without the need for an electrical power source.
has certified documents from the manufacturer of the electronic components used by Freemindtronic SL in these devices which establish without a doubt that the average time between failures is estimated after a 1 million cycles of writes per memory block, no maintenance operation is necessary.
art. R. 55-5.- The said decree indicates that the identification of the user when accessing the digital safe service must be ensured by an electronic means of identification adapted to the security issues of the service.
Since Freemindtronic’s solutions have several identification parameters that can be predetermined by the user himself, namely: administrator password, user password, pairing of NFC terminals, enslavement to a geolocation point, encryption key, physical blockchain segments, password encryption keys, and a code for displaying and sharing data called jamming.
art. R. 55-6. The said decree, according to the guarantee, as provided for in 4 ° of Article L. 103, of the exclusivity of access to the documents and data of the user or to the data associated with the operation of the service requires at least the implementation of the following measures:
“1° An access control mechanism limiting the opening of the digital safe to only persons authorized by the user;
“2° Security measures to guarantee the confidentiality of stored documents and data as well as the corresponding metadata;
“(3) Encryption by the digital safe service of all documents and data stored by or transferred to or from the digital safe. This encryption must be carried out using cryptographic mechanisms in accordance with the state of the art and allow an evolution of the size of the keys and algorithms used.
Since Freemindtronic SL,
has implemented several security systems to protect the opening of the electronic safe: physical, digital and human identification. The first check requires to know the physical pairing key of the device to authorize the connection with a computer terminal with NFC technology. The second control requires the user to know the administrator code that he himself has previously saved in the device to access the services. Other security systems can be added, forming a symmetric and/or asymmetric encryption key that, segmented into a physical blockchain in physical memory, makes access to encrypted data saved in physical memory totally inaccessible.
has implemented a multi-factor authentication method to simultaneously identify the terminal authorized to use the device and the user. This makes it possible to guarantee exclusive access to the backed-up data to the user and/or his/her rights holders.
has implemented a backup process by which all attached data and metadata are encrypted in the unconnected device that guarantees the confidentiality of the data stored in the electronic safe.
uses dynamically scalable encryption key sizes and uses qualified standardized standards, such as AES256-bit and/or RSA4096-bit keys. Said keys can themselves be encrypted in AES256 bits and segmented in a physical blockchain, in one or more separate devices. Such an implementation makes it impossible, at the known state of the art, to access the said keys or the possibility of guessing them via a brute force attack.
Decision of the Jaroch Technology Committee meeting on 12 June 2018,
Having regard to Decree No. 2018-418 of 30 May 2018 which will enter into force on 1 January 2019;
Where as Freemindtronic SL clearly indicates to users the conditions of use, the technical mechanisms used and the implementation of the guarantees associated with its electronic safe solutions;
Whereas appropriate security measures are implemented to guarantee the integrity, availability and accuracy of the origin of the data stored in the electronic safe;
Whereas the traceability of the operations carried out on the data stored in the electronic safe is effective;
During the Occitanie CyberMatines on LMI TV @lemondeinformatique april 22, 2020, Fullsecure conducted offline protection and physical use demonstrations of sensitive data such as passwords and encryption keys. The backup media in credit card or Tag formats operate without contact with a phone serving as an NFC terminal.
This demo shows an electronic self-connection system to a computer, a motherboard Bios, a Windows session and a VPN with the devices from Freemindtronic hardwares wallet & contactless virtual keyboard
Retrocompatible solutions for offline encryption of any type of data on computer and phone
Another demo shows how to encrypt any data on computer and smartphone, an operation compatible with all computer systems and messaging services, including SMS.
We are talking about compatible retro solutions that offer the advantage of securing the use of any type of computer hardware, computer, smartphone, software, application while maintaining maximum security of the use of sensitive data, whether personal or professional.
Finally, Fullsecure gives a tip to make a desktop “smart”: Secure the sensitive data of any computer discreetly, discreetly, thanks to its mini devices hardened in Pin’s format.
In addition, data sharing is contactless, reducing the risk of contagion during this period of pandemic due to Covid19. Indeed, it is enough to approach your smartphone to the Fullsecure device to manage and use the data contained in pin’s.
Fullsecure offers a wide range of products to meet data security needs in mobility and/or in the workplace.
Unlocking the Future of Finance: Advanced Credit Card Cybersecurity
Advanced Credit Card Cybersecurity: In an era where digital threats loom large, discover how FULLSECURE’s groundbreaking solutions are redefining credit card safety.
Stay informed with our posts dedicated to Cyberculture to track its evolution through our regularly updated topics.
National Publication | Diari d’Andorra | Thursday, May 3, 2018 | AN ANDORRAN STARTUP’S INITIATIVE | By Joan López i Soler | Credit Card Security
A Cybersecurity System to End Credit Card Fraud
FULLSECURE, an Andorran startup, now offers a new security service for all credit card types. Consequently, it aims to prevent online sales database theft; moreover, it ends the fraudulent use of card security codes. Therefore, it significantly enhances security for online transactions made with credit cards. The company asserts, “This innovative service allows users to avoid storing credit card information in online sales databases; additionally, it enables the physical elimination of the credit card’s security cryptogram.” Utilizing a plugin powered by weak artificial intelligence, users can securely conduct Internet purchases. Furthermore, the startup highlights that this service “also eradicates the risk of illegal physical use after loss, theft, or duplication during international travel.”
Since April 24, 2018, the system has been available to users who possess specific cybersecurity devices, such as Evicard NFC HSM, Evitag NFC HSM, and EviPass NFC HSM password managers, for online shopping. The system’s inventor, Jacques Gascuel, emphasized the goal “to revolutionize credit card security and their Internet usage, thus halting fraudulent use.” On May 29, they will unveil prototypes at a cybersecurity event in Toulouse.
Fullsecure, specializing in electronic cybersecurity services, is a dynamic company founded in Ariège in 2010, now expanding its operations in the Principality.
Update | May 30, 2024
Advancements in Security Credit Card
Since the initial launch of their credit card security service, Fullsecure has continued to innovate with EviPay NFC HSM technology to secure credit cards and cryptocurrencies. This cutting-edge technology provides robust protection against fraud, securing credit card information and mnemonic phrases along with their derived private cryptocurrency wallet keys without the need for sensitive data storage on online sales sites, including crypto assets.
FULLSECURE remains at the forefront of combating credit card fraud, offering solutions that not only meet but exceed current security standards, showcasing their commitment to consumer protection and trust.
As the digital landscape advances, FULLSECURE pledges to maintain its position as a leader in innovation, delivering the most secure and groundbreaking cybersecurity solutions to users.
You can download the original article in Catalan by clicking HERE.
Source press: click HERE
Evitag NFC HSM at CONAND 2018: Fullsecure, partner of the cybersecurity congress in Andorra, organizes a Bug Bounty Express on its product. It is a security challenge that consists of detecting vulnerabilities on this innovative product that allows to secure your secrets via an NFC electronic module. The Bug Bounty Express takes place on the Fullsecure booth during the second edition of CONAND 2018, on February 7 and 8.
Bug Bounty Show Events
What is CONAND 2018?
CONAND 2018 is an event organized by Andorra Telecom, the telecommunications operator of the country, in collaboration with the government of Andorra, the Cybersecurity Research Center of the University of Andorra and the Chamber of Commerce, Industry and Services of Andorra. It aims to promote cybersecurity as a key element of digital transformation and to strengthen Andorra’s position as a technological and innovative hub. The second edition of this congress took place from February 7 to 8, 2018 at the Congress Center of Andorra la Vella and brought together national and international experts, companies, institutions and researchers around conferences, workshops,
Demo show in booth
How to use Evitag NFC HSM?
To use Evitag NFC HSM, you just need to have an Android NFC smartphone and the Android application developed by Freemindtronic Andorra. By passing the NFC HSM module under the phone, you can display your secret, share it in RSA 4096 (a very robust asymmetric encryption algorithm) or use it directly on your phone or on a computer via a web extension coupled to the phone serving as a terminal.
Cyber Safety & Security
What are the advantages of Evitag NFC HSM?
Evitag NFC HSM has several advantages over traditional solutions for storing your secrets:
It works without server or database, which reduces costs and risks of hacking.
It works only without contact, which avoids compatibility or connectivity issues.
It is lifetime without battery, without maintenance and tamperproof and waterproof, which ensures its reliability and durability.
It uses an AES 256 encryption algorithm, recognized as one of the safest in the world, to encrypt your secrets stored in the EPROM memory of the NFC.
Use case
Who is Evitag NFC HSM for?
Evitag NFC HSM is for anyone who needs to secure their secrets in a convenient and reliable way. It is especially useful for private users who want to protect their online accounts, digital wallets, social media profiles and other sensitive information. Indeed, with Evitag NFC HSM, you can:
Manage and access your secrets easily without having to memorize or write them down.
Log in to your online accounts using the NFC HSM to display your password in volatile memory on your phone without leaving any trace of it.
Share your secrets with your friends or family in a secure and controlled way.
No risk in case of loss, theft or attempted compromise of the NFC HSM module locked to access with more than 9 trust criteria serving as a multifactor authentication system. Knowing that your secrets contained in the NFC HSM can be cloned, backed up in an encrypted way for later restoration in a new NFC HSM.
Benefit from a high level of security thanks to the physical and logical protection of the NFC HSM module encrypted in AES 256 with segmented key.
Buy
How to get Evitag NFC HSM?
Evitag NFC HSM is a product marketed in white label by Fullsecure, a company specialized in the distribution of IT security solutions. To learn more about Evitag NFC HSM or to place an order, you can contact Fullsecure at the following coordinates:
Send us a message
Buy
Visit our exhibition and demonstration space at CONAND 2018
If you are curious to discover Evitag NFC HSM in action, we invite you to visit our exhibition and demonstration space at CONAND 2018. You will be able to test our product, ask your questions and exchange with our team. We will be happy to welcome you and show you our contactless security solution.
Join the Bug Bounty Express on Evitag NFC HSM
If you are interested in participating in the Bug Bounty Express on Evitag NFC HSM, you can find more information about the challenge, the rules, the rewards and the registration process on the following link: Bug Bounty Express on Evitag NFC HSM. This is a great opportunity to test your skills, learn new techniques and earn incentives for finding vulnerabilities on this innovative product. Don’t miss this chance to join the cybersecurity community and contribute to making the digital world safer.
Do you have what it takes to hack the contactless security solution by Fullsecure and Freemindtronic Andorra? If yes, then you should join the Bug Bounty Express on Evitag NFC HSM that took place at CONAND 2018, the cybersecurity congress in Andorra. It was a security challenge that consisted of detecting vulnerabilities on the innovative product Evitag NFC HSM, which allows to secure your secrets via an NFC electronic module. The Bug Bounty Express was organized by Fullsecure, partner of CONAND 2018, on its booth during the second edition of the event, on February 7 and 8, 2018.
Conand Show Events
What is CONAND 2018?
CONAND 2018 is an event organized by Andorra Telecom, the telecommunications operator of the country, in collaboration with the government of Andorra, the Cybersecurity Research Center of the University of Andorra and the Chamber of Commerce, Industry and Services of Andorra. It aims to promote cybersecurity as a key element of digital transformation and to strengthen Andorra’s position as a technological and innovative hub. The second edition of this congress took place from February 7 to 8, 2018 at the Congress Center of Andorra la Vella and brought together national and international experts, companies, institutions and researchers around conferences, workshops, demonstrations and business meetings.
Bug Bounty Show Events
What is a Bug Bounty?
A Bug Bounty is a reward offered to anyone who can find and report a security flaw in a software, a hardware, a website or an application. The reward can be monetary, in-kind or in recognition. The Bug Bounty aims to encourage ethical hackers to help improve the security of the products and services they use, and to prevent malicious hackers from exploiting the vulnerabilities they find.
Demo show in booth
How to use Evitag NFC HSM?
To use Evitag NFC HSM, you just need to have an Android NFC smartphone and the Android application developed by Freemindtronic Andorra. By passing the NFC HSM module under the phone, you can display your secret, share it in RSA 4096 (a very robust asymmetric encryption algorithm) or use it directly on your phone or on a computer via a web extension coupled to the phone serving as a terminal.
Safety and Cybersecurity System presented at Conand 2018
What are the advantages of Evitag NFC HSM?
EviTag NFC HSM has several advantages over traditional solutions for storing your secrets:
It works without server or database, which reduces costs and risks of hacking.
It works only without contact, which avoids compatibility or connectivity issues.
It is lifetime without battery, without maintenance and tamperproof and waterproof, which ensures its reliability and durability.
It uses an AES 256 encryption algorithm, recognized as one of the safest in the world, to encrypt your secrets stored in the EPROM memory of the NFC.
Use case
Who is Evitag NFC HSM for?
Evitag NFC HSM is for anyone who needs to secure their secrets in a convenient and reliable way. It is especially useful for private users who want to protect their online accounts, digital wallets, social media profiles and other sensitive information. Indeed, with Evitag NFC HSM, you can:
Manage and access your secrets easily without having to memorize or write them down.
Log in to your online accounts using the NFC HSM to display your password in volatile memory on your phone without leaving any trace of it.
Share your secrets with your friends or family in a secure and controlled way.
No risk in case of loss, theft or attempted compromise of the NFC HSM module locked to access with more than 9 trust criteria serving as a multifactor authentication system. Knowing that your secrets contained in the NFC HSM can be cloned, backed up in an encrypted way for later restoration in a new NFC HSM.
Benefit from a high level of security thanks to the physical and logical protection of the NFC HSM module encrypted in AES 256 with segmented key.
Bug Bounty Information
What was the Bug Bounty Express on Evitag NFC HSM at CONAND 2018?
The Bug Bounty Express on Evitag NFC HSM was a security challenge that consisted of detecting vulnerabilities on the product Evitag NFC HSM. The product included an Android application and an NFC electronic module. The challenge was to recover the login and password hosted inside an Evitag NFC HSM safe.
The Bug Bounty Express lasted for two days, from 10 am to 6:30 pm, on February 7 and 8, 2018. It was free and open to anyone who wanted to participate. It took place on the Fullsecure booth at the Congress Center of Andorra la Vella, where five Evitag NFC HSM devices were available for testing. Each device contained five labels, five login and five passwords, brute force enabled with administrator password and jamming enabled. One device was dedicated to physical brute force attacks (Tamper-proof).
Each participant had to register online and submit their vulnerability reports online. The material provided for testing included an oscilloscope, a NFC reader card for PC, a professional thermal sensor with thermal image capture, a WIFI router for creating a local network for the EVILOCK NFC function, and the Android application and the web plugins for Evitag NFC HSM.
The participant was free to use any type of material to carry out their attacks. The participant brought their material under their sole responsibility, such as computer, smartphone, measuring devices and/or radio frequency.
For physical brute force attacks, the participant had to bring their tools and/or physical attack solutions. However, tools and/or solutions that could harm the physical integrity of people were prohibited within the framework of the CONAND event. In the event that the participant wanted to carry out this type of test, they had to make an explicit and motivated request. The request accepted by Fullsecure, had to be carried out outside the framework of the event in a secure environment by the participant. At least one witness was present during the physical attack and was filmed by a person from Fullsecure.
In general, all brute force attacks were allowed, whether passive and/or intrusive.
What were the rewards for the Bug Bounty Express on Evitag NFC HSM at CONAND 2018?
The rewards for the Bug Bounty Express on Evitag NFC HSM were as follows:
For each vulnerability detected, the participant received a certificate of participation and a trophy with the name of the vulnerability and the name of the participant.
For the first vulnerability detected, the participant received a gift voucher of 100 euros.
For the second vulnerability detected, the participant received a gift voucher of 200 euros.
For the third vulnerability detected, the participant received a gift voucher of 300 euros.
For the fourth vulnerability detected, the participant received a gift voucher of 400 euros.
For the fifth vulnerability detected, the participant received a gift voucher of 500 euros.
The maximum amount of rewards per participant was 1500 euros. The rewards were cumulative and could be combined with other rewards offered by other partners of the event.
Buy
How to get Evitag NFC HSM?
Evitag NFC HSM is a product marketed in white label by Fullsecure, a company specialized in the distribution of IT security solutions. To learn more about Evitag NFC HSM or to place an order, you can contact Fullsecure at the following coordinates:
Send us a message
How to join the Bug Bounty Express on Evitag NFC HSM?
If you are interested in joining the Bug Bounty Express on Evitag NFC HSM, you can find more information about the challenge, the rules, the rewards and the registration process on the following link: Bug Bounty Express on Evitag NFC HSM. This is a great opportunity to test your skills, learn new techniques and earn incentives for finding vulnerabilities on this innovative product. Don’t miss this chance to join the cybersecurity community and contribute to making the digital world safer.