◆ Product Introduction
Ankeren - Dual system controlled tablet computer ( Type : RY-SP2-C ) | Ankeren -dual-system controllable tablet computer is composed of file encryption system and Android system. It is controlled by double physical buttons. The switch between the two systems is realized by means of hardware isolation and power failure switching. Among them, Android system adopts universal design, which can meet the daily entertainment life. File encryption system has software and hardware dual secret certificate, CPK encryption algorithm to complete the encryption and decryption of files. This product in the intelligent terminal control security, data security, application security, communications security reinforcement, and solved using ordinary tablets for network privacy, sensitive data is stored, physical control leak no encryption, information and communication, the application installation is not controllable, operating system vulnerabilities, data interaction and security, classified, and the classified storage space sharing problems, such as the products meet the technical requirements of mobile Internet security 2.0, is the domestic first to meet the requirements of insurance such as 2.0 mobile security terminal products. |
◆ Product Advantages
Facial recognition function. | File secure storage and transfer function. | Remote teminal management function. | |||||
The device can be unlocked through facial recognition technology to ensure user access to the system safely. | By combining software and hardware, files are encrypted for storage and transmission, ensuring the security of files. The encrypted file can be saved to the terminal or to the server. It can be decrypted and viewed by designated users when files are encrypted for transmission. | Bind the SIM card with the device. When forcibly removing or replacing another SIM card, the device automatically locks the screen. The device can be remotely locked, unlocked, shut down, restarted, and other operations. When the device is in Danger, all data can be cleared to ensure the security of data information. | |||||
Whitelist function. | Instant messaging function. | Snapchat function. | |||||
Restrict downloading, installing, and running apps. Users are prohibited from downloading and installing apps through other channels. | Provide a secure communication tool for users. All files and text information will be encrypted before transmission, ensuring the security of data information. | The document will self-destruct after the recipient reads the document. |
◆ Product Features
Product Features | Application Security | Communications Security | |||||
File encryption system built-in original encryption program, software and hardware dual encryption certificate and CPK dual encryption algorithm. | The black and white list controls software installation and restricts unauthorized software installation and automatic operation. | Exclusive private security network, support operators to customize. | |||||
Identification | Physical Isolation | Authoritative Attestation | |||||
Face recognition, pattern password, encryption password and other authentication methods are available. | The storage space of the two systems is independent, and the data information cannot be intercommunicated, effectively guaranteeing the data security of the file encryption system | Products through the Ministry of Public Security computer information system security products detection |
◆ Industry Application
In addition to the features of easy and fast movement of ordinary tablet computers, unlimited geographical limits and flexible office work, Ankeren - dual-system controllable tablet computer also provides a better choice for secure mobile office by virtue of its original security design and reliable encryption technology, and has a wide range of applications in the field of critical information infrastructure.
★ Government system : Unique identity authentication function and encrypted transmission, to protect sensitive information, classified documents and other protection from theft.
★ Financial system : Black and white list control, refusing illegal software to read user information; Domestic encryption chip and encryption algorithm double support, the user's personal privacy as solid as gold.
★ Medical system : Two-system convenient switching, physical isolation of information and data, widely used in mobile medical and mobile care.
★ Enterprises and institutions -- proprietary network encryption data transmission, build data security network.
◆ Qualification
Sales License for Computer Information System Security Special ProductsInformation Technology Product Security Testing Certificate | Certificate for China Compulsory | Product Certification |
◆ Product Introduction
Ankeren - Dual system controlled tablet computer
( Type : RY-SP2-C )
Ankeren -dual-system controllable tablet computer is composed of file encryption system and Android system. It is controlled by double physical buttons. The switch between the two systems is realized by means of hardware isolation and power failure switching. Among them, Android system adopts universal design, which can meet the daily entertainment life. File encryption system has software and hardware dual secret certificate, CPK encryption algorithm to complete the encryption and decryption of files.
This product in the intelligent terminal control security, data security, application security, communications security reinforcement, and solved using ordinary tablets for network privacy, sensitive data is stored, physical control leak no encryption, information and communication, the application installation is not controllable, operating system vulnerabilities, data interaction and security, classified, and the classified storage space sharing problems, such as the products meet the technical requirements of mobile Internet security 2.0, is the domestic first to meet the requirements of insurance such as 2.0 mobile security terminal products.
◆ Product Advantages
Facial recognition function. | |
The device can be unlocked through facial recognition technology to ensure user access to the system safely. |
File secure storage and transfer function. | |
By combining software and hardware, files are encrypted for storage and transmission, ensuring the security of files. The encrypted file can be saved to the terminal or to the server. It can be decrypted and viewed by designated users when files are encrypted for transmission. |
Remote teminal management function. | |
Bind the SIM card with the device. When forcibly removing or replacing another SIM card, the device automatically locks the screen. The device can be remotely locked, unlocked, shut down, restarted, and other operations. When the device is in Danger, all data can be cleared to ensure the security of data information. |
Whitelist function. | |
Restrict downloading, installing, and running apps. Users are prohibited from downloading and installing apps through other channels. |
Instant messaging function. | |
Provide a secure communication tool for users. All files and text information will be encrypted before transmission, ensuring the security of data information. |
Snapchat function. | |
The document will self-destruct after the recipient reads the document. |
◆ Product Features
Data Security | |
File encryption system built-in original encryption program, software and hardware dual encryption certificate and CPK dual encryption algorithm. |
Application Security | |
The black and white list controls software installation and restricts unauthorized software installation and automatic operation. |
Communications Security | |
Exclusive private security network, support operators to customize. |
Identification | |
Face recognition, pattern password, encryption password and other authentication methods are available. |
Physical Isolation | |
The storage space of the two systems is independent, and the data information cannot be intercommunicated, effectively guaranteeing the data security of the file encryption system |
Authoritative Attestation | |
Products through the Ministry of Public Security computer information system security products detection |
◆ Industry Application
In addition to the features of easy and fast movement of ordinary tablet computers, unlimited geographical limits and flexible office work, Ankeren - dual-system controllable tablet computer also provides a better choice for secure mobile office by virtue of its original security design and reliable encryption technology, and has a wide range of applications in the field of critical information infrastructure.
★ Government system : Unique identity authentication function and encrypted transmission, to protect sensitive information, classified documents and other protection from theft.
★ Financial system : Black and white list control, refusing illegal software to read user information; Domestic encryption chip and encryption algorithm double support, the user's personal privacy as solid as gold.
★ Medical system : Two-system convenient switching, physical isolation of information and data, widely used in mobile medical and mobile care.
★ Enterprises and institutions -- proprietary network encryption data transmission, build data security network.
◆ Qualification
The Ministry of Public Security:
Sales License for Computer Information System Security Special ProductsInformation Technology Product Security Testing Certificate
Certificate for China Compulsory
Product Certification