leyu·乐鱼(China)官方网站-Best Platform

Product
Product
Ankeren - Dual system controlled tablet computer

◆ Product Introduction


3-nr_04.jpg

Ankeren - Dual system controlled tablet computer

 ( Type : RY-SP2-C )


Ankeren -dual-system controllable tablet computer is composed of file encryption system and Android system. It is controlled by double physical buttons. The switch between the two systems is realized by means of hardware isolation and power failure switching. Among them, Android system adopts universal design, which can meet the daily entertainment life. File encryption system has software and hardware dual secret certificate, CPK encryption algorithm to complete the encryption and decryption of files.

This product in the intelligent terminal control security, data security, application security, communications security reinforcement, and solved using ordinary tablets for network privacy, sensitive data is stored, physical control leak no encryption, information and communication, the application installation is not controllable, operating system vulnerabilities, data interaction and security, classified, and the classified storage space sharing problems, such as the products meet the technical requirements of mobile Internet security 2.0, is the domestic first to meet the requirements of insurance such as 2.0 mobile security terminal products.



◆ Product Advantages


6383668594704997221997751.jpg

Facial recognition function. 


3-nr_09.jpg

File secure storage 

and transfer function. 


3-nr_11.jpg

Remote teminal

management function. 

The device can be unlocked through facial recognition technology to ensure user access to the system safely.



By combining software and hardware, files are encrypted for storage and transmission, ensuring the security of files. The encrypted file can be saved to the terminal or to the server. It can be decrypted and viewed by designated users when files are encrypted for transmission.

Bind the SIM card with the device. When forcibly removing or replacing another SIM card, the device automatically locks the screen. The device can be remotely locked, unlocked, shut down, restarted, and other operations. When the device is in Danger, all data can be cleared to ensure the security of data information.


3-nr_16.jpg

Whitelist function. 


3-nr_17.jpg

Instant messaging function. 


3-nr_18.jpg

Snapchat function. 

Restrict downloading, installing, and running apps. Users are prohibited from downloading and installing apps through other channels.
Provide a secure communication tool for users. All files and text information will be encrypted before transmission, ensuring the security of data information.
The document will self-destruct after the recipient reads the document.


◆ Product Features


3-nr_22.jpg

Product Features


3-nr_23.jpg

Application Security


3-nr_24.jpg

Communications Security

File encryption system built-in original encryption program, software and hardware dual encryption certificate and CPK dual encryption algorithm.



The black and white list controls software installation and restricts unauthorized software installation and automatic operation.
Exclusive private security network, support operators to customize.
3-nr_28.jpgIdentification
3-nr_29.jpg

Physical Isolation


3-nr_30.jpg

Authoritative Attestation

Face recognition, pattern password, encryption password and other authentication methods are available.
The storage space of the two systems is independent, and the data information cannot be intercommunicated, effectively guaranteeing the data security of the file encryption system
Products through the Ministry of Public Security computer information system security products detection


◆ Industry Application


In addition to the features of easy and fast movement of ordinary tablet computers, unlimited geographical limits and flexible office work, Ankeren - dual-system controllable tablet computer also provides a better choice for secure mobile office by virtue of its original security design and reliable encryption technology, and has a wide range of applications in the field of critical information infrastructure.

★ Government system : Unique identity authentication function and encrypted transmission, to protect sensitive information, classified documents and other protection from theft.

★ Financial system : Black and white list control, refusing illegal software to read user information; Domestic encryption chip and encryption algorithm double support, the user's personal privacy as solid as gold.

★ Medical system : Two-system convenient switching, physical isolation of information and data, widely used in mobile medical and mobile care.

★ Enterprises and institutions -- proprietary network encryption data transmission, build data security network.



◆ Qualification


3-nr_38.jpg3-nr_40.jpg3-nr_42.jpg

Sales License for Computer Information System Security Special ProductsInformation Technology Product Security Testing Certificate

Certificate for China Compulsory 

Product Certification


Product Introduction

sj-3-nr_07.jpg

Ankeren - Dual system controlled tablet computer

 ( Type : RY-SP2-C )


Ankeren -dual-system controllable tablet computer is composed of file encryption system and Android system. It is controlled by double physical buttons. The switch between the two systems is realized by means of hardware isolation and power failure switching. Among them, Android system adopts universal design, which can meet the daily entertainment life. File encryption system has software and hardware dual secret certificate, CPK encryption algorithm to complete the encryption and decryption of files.

This product in the intelligent terminal control security, data security, application security, communications security reinforcement, and solved using ordinary tablets for network privacy, sensitive data is stored, physical control leak no encryption, information and communication, the application installation is not controllable, operating system vulnerabilities, data interaction and security, classified, and the classified storage space sharing problems, such as the products meet the technical requirements of mobile Internet security 2.0, is the domestic first to meet the requirements of insurance such as 2.0 mobile security terminal products.


◆ Product Advantages


sj-3-nr_15.pngFacial recognition function. 
The device can be unlocked through facial recognition technology to ensure user access to the system safely.
sj-3-nr_24.jpg

File secure storage

and transfer function. 

By combining software and hardware, files are encrypted for storage and transmission, ensuring the security of files. The encrypted file can be saved to the terminal or to the server. It can be decrypted and viewed by designated users when files are encrypted for transmission.
sj-3-nr_26.jpg

Remote teminal 

management function. 

Bind the SIM card with the device. When forcibly removing or replacing another SIM card, the device automatically locks the screen. The device can be remotely locked, unlocked, shut down, restarted, and other operations. When the device is in Danger, all data can be cleared to ensure the security of data information.
打开.pngWhitelist function. 

Restrict downloading, installing, and running apps. Users are prohibited from downloading and installing apps through other channels.

sj-3-nr_30.pngInstant messaging function. 

Provide a secure communication tool for users. All files and text information will be encrypted before transmission, ensuring the security of data information.

sj-3-nr_32.png

Snapchat function. 

The document will self-destruct after the recipient reads the document.


◆ Product Features


sj-3-nr_34.pngData Security
File encryption system built-in original encryption program, software and hardware dual encryption certificate and CPK dual encryption algorithm.
sj-3-nr_36.pngApplication Security
The black and white list controls software installation and restricts unauthorized software installation and automatic operation.
sj-3-nr_38.png

Communications Security

Exclusive private security network, support operators to customize.
sj-3-nr_40.pngIdentification

Face recognition, pattern password, encryption password and other authentication methods are available.

sj-3-nr_42.pngPhysical Isolation

The storage space of the two systems is independent, and the data information cannot be intercommunicated, effectively guaranteeing the data security of the file encryption system

sj-3-nr_44.png

Authoritative Attestation

Products through the Ministry of Public Security computer information system security products detection


◆ Industry Application


In addition to the features of easy and fast movement of ordinary tablet computers, unlimited geographical limits and flexible office work, Ankeren - dual-system controllable tablet computer also provides a better choice for secure mobile office by virtue of its original security design and reliable encryption technology, and has a wide range of applications in the field of critical information infrastructure.

★ Government system : Unique identity authentication function and encrypted transmission, to protect sensitive information, classified documents and other protection from theft.

★ Financial system : Black and white list control, refusing illegal software to read user information; Domestic encryption chip and encryption algorithm double support, the user's personal privacy as solid as gold.

★ Medical system : Two-system convenient switching, physical isolation of information and data, widely used in mobile medical and mobile care.

★ Enterprises and institutions -- proprietary network encryption data transmission, build data security network.


◆ Qualification


sj-3-nr_47.jpg


The Ministry of Public Security: 

Sales License for Computer Information System Security Special ProductsInformation Technology Product Security Testing Certificate

 Certificate for China Compulsory 

Product Certification


Return to List