Standalone components and MVPs
Smart tools for stronger security and smoother performance.
System Components
System components comprise a set of standalone components and applications designed to enhance security and improve overall system efficiency. Equipped with defined integration interfaces and an administrative console for configuration, these components strengthen the security of the systems into which they are integrated.
MVPs include pilots based on modern biometric verification to demonstrate advanced features and explore real-life use cases.

Tamper-Proof Audit Logging
Cryptographically secured logs stored in chained blocks, ensuring traceability and integrity — even from administrators.
Access & Role Management
Centralized user control with customizable roles and privileges for secure access to system resources.
Key Management System
Secure generation, storage, and use of cryptographic keys via HSMs and smart cards, exposed through a web service interface.
Legally Valid Time-Stamps
Provides irrefutable proof of time for digital transactions and documents, compliant with RFC 3161 standards.
Qualified Certificate Authority
Issuance and lifecycle management of X.509 certificates with full Root & Intermediate CA hierarchy, HSM integration, CRL & OCSP support.
Secure Reverse Gateway
Enhance the security of existing systems with a reverse proxy that enforces cryptographic standards — no infrastructure changes needed.
Document Storage & Tracking
Smart logistics for blank and personalized ID documents — with real-time location tracking and inventory control.
Biometric Data Capture
Captures facial, fingerprint, iris, and digital signature data — seamlessly integrated with biometric devices and system components.
Modern online services like banking and e-commerce demand strong user authentication. Traditional methods rely on passwords or external devices – often inconvenient and insecure.
Mobile Biometric Authentication enables secure access using only a mobile phone and a face scan, eliminating the need for passwords or extra hardware. Fast, simple, and secure – tailored for today’s digital habits.

Mobile applications powered by a cryptographic security module — via microSD, embedded Secure Element (SE), or NFC — enable secure communication between clients.
Crypto Voice uses an internet connection for encrypted voice communication.
Crypto SMS operates securely over the GSM channel, requiring no internet access.
Together, they ensure protected, reliable communication in any connectivity environment.

Mobile Crypto Suite enables secure, contactless use of electronic ID documents via NFC, supporting:
Digital signature creation
Data encryption
Secure document exchange
Strong client authentication
The suite also includes a desktop version, ensuring seamless and secure communication between mobile and desktop devices for a consistent user experience across platforms.

Border management
← View previous


National register
View next →