CAN-bus Firewall Chip System
This solution is a product which denies unknown/unauthorized signal credentials between vulnerable systems and Mission Critical Systems (MCS’s).
This is a middle-tier device — bridging input/output processes and services for embedded and external devices — which functions in a transparent manner by avoiding the common pitfall of affecting vehicle performance or system integration.
Utilizing a unique method of fusing the results of two parallel cryptographic functions in order to mathematically prove that an audit log has not been tampered with, modified, or replaced.
This product allows for a Single Origin Cryptographic Chain of Custody (SOCCC/SO-3C) which alleviates unnecessary overhead via expensive 3rd party log storage — with limited guarantees of integrity or prompt access by system administrators.
The European Union's (E.U.) General Data Protection Regulation (GDPR) took effect the 25th of May 2018 and applies to any company that handles personal data of European residents. It covers all companies operating in the E.U., even if there is no physical presence in the E.U.
GDPR specifies organizations must designate a technical and policy manager for data protection, certifying that data collection governance is minimizing the impact on privacy rights, collect only data that is needed immediately, and not stockpile information for later use.
The 'Treatise on Domestic and International Fraud, 2019 Edition' showcases actual criminal activity — and is a powerful resource for Chief Executives, Legal Advisors, Policy Makers, and broader market participants.
Publication contents have been obtained through real-time Honey Pot and Observational Research methodologies. All content material showcased in this report has previously been shared with Crime Victim(s), Insurance Providers, Legal Representative, and Law Enforcement agencies.
One particular method of revealing the patterns of a device user is via electronic hardware sound signature analysis. This advanced method of attack is becoming more frequently utilized with results.
This natively embedded solution modulates random keyboard stroke audio sequences in order to confuse and deny sound signature analysis attempts by malicious entities.
∙ ▪ ∙ ▪ ∙ ▪ ∙ ▪ ∙ ▪ ∙ info ＠ hippogriff.io
∙ ▪ ∙ ▪ ∙ ▪ ∙ 1-831.222.1337
∙ ▪ ∙ ▪ ∙ ▪ ∙ ▪ ∙ ▪ ∙ ▪ ∙ ▪ ∙ Mountain View, CA ◦ Chicago, IL