The CipherToken design has the same foundational core as other ID-ware solutions provided for government, police and other high security organisations. Each CipherToken follows a detailed end-client consultation to produce an operational requirement with a secure design and deployment methodology.
Features include:
- End-client Key Sovereignty (control of encryption keys)
- Master Keys stored on EAL 6 SAMs
- AES Encryption
- Key Diversification
- Key Rolling capability
- PACS system and reader independence