Terminal protection

Endpoint security is the application of solutions to protect endpoint devices such as computers, laptops, mobile phones, tablets, and devices. IoT devices and other network-connected devices. The goal of endpoint security is to prevent, detect, and respond to security threats at the endpoint

1. Mobile device protection

  • Product: Mobile Security
  • Company: Dream Security

Dream Security’s Mobile Security solution provides encryption/decryption and digital signature capabilities across diverse mobile environments: Provides a mobile authentication environment dynamic optimization through certificate transfer, certificate authentication, and digital signatures.

Key solution features:

  • Complies with global PKI standards.
  • Includes encryption module certified to NIS standards and has passed NIS security compliance verification through public project.</li >
  • Supports multiple mobile platforms including iOS, Android, blackberry, Windows Mobile/ Phone/ Metro, etc.
  • Ensures fast encryption/decryption with single network transfer based on server certificate (Magic SE).
  • Ensures interoperability with various client modules such as keyboard security, anti-tampering and anti-virus.
  • Server Lib, developed in Pure Java, is not affected by OS/WAS version or server revision. This ensures the operational stability of the service server.
  • Ensures interoperability with various client modules such as keyboard security, anti-tampering and anti-virus.

2. Protection for IOT devices:

  • Product: IoT Security
  • Company: Dream Security

Dream Security’s IoT Security solution is the optimal security solution for IoT environments such as smart homes, factories, smart cars,…


Main features include:

  • Authentication key infrastructure: PKI system for device certificate issuance (providing simple/batch certificate issuance functionality), custom SCVP system for the device’s operating environment.
  • Key management system: Manage key lifecycle such as key generation, distribution, etc. suitable for IoT devices and environments.
  • Secure communication: Key exchange uses the PANA protocol to ensure secure communication between devices. Secure communication using (D)TLS protocol for IoT environments using TCP/UDP.
  • Encryption module: Lightweight and energy-efficient encryption algorithm for limited power and resources. Firmware-based lightweight encryption, Adopt chip-based hardware encryption module.