gtag('consent', 'update', { 'ad_storage': 'granted' }); Secure Mobile Phone Technology Against Threats | Intactphone
top of page

TECHNOLOGY

Crafting smartly secure connected devices

01

TRUSTED HARDWARE

02

SECURE SOFTWARE

03

LOCKED DOWN NETWORK

04

DEFENSES

& CONTROLS

BUILT FROM THE GROUND UP

HOLISTIC DEVICE PROTECTION

IntactPhone is a monolithic contained device, protecting the user from known and unknown cyber-attacks. Unlike other high-security devices that quest to compromise between privacy and security, the game-changing IntactPhone is designed as a unified container to safeguard the entire mobile device regardless of the attack.

MULTI-TIERED SECURITY

IntactPhone is designed to provide unmatched protection against mobile cyber-crime. The API level integration across its components narrows the attack surface for cybercriminals and delivers a one-of-a-kind, highly robust defense.

SECURE MOBILE

ARCHITECTURAL FUSION

Intact Applications

Intact Device Management

Encrypted Communications

Enhanced ROM 

Intact ROM Utilities

Secure Boot

Hardware of Trust

BEST-IN-CLASS MOBILE ENCRYPTION

  • Encrypted voice calls with ZRTP protocol:

    • Call initiated via a secure Transport Layer Security (TLS) channel

    • Secure connection established via a geo-located Real-time Transport Protocol (RTP)

    • Encrypted connection formed through a random 256 byte ZRTP key and SHA-2 hashing

    • Keys discarded after every call which precludes retroactively compromising the call by future disclosures of key material

    • Midway encrypted connection established via Secure RTP (SRTP) over SIP

  • Contained messaging

    • Messages encrypted with 256-bit AES cipher

    • RSA 2048 used to establish secure connection

    • Different keys for every chat session

    • Encrypted attachments with built-in sharing control

    • Self-destruct messages

 

COMPLETE MOBILE USER PRIVACY

IntactPhone device ensures that device owners have complete privacy: proprietary push notification mechanism assures that no communications data can be stored by a third party. The disk encryption key is known only to the device owner who actually sets it up, and it is not kept by any other party. No backdoors of any kind.

A SECURE MOBILE BUILD

IntactPhone secure build provides a trusted environment by a secure boot process, integrity validation and detection, obfuscation layer across device resources, and the generation of security keys and device passwords.

FLEXIBLE DEPLOYMENT OPTIONS

IntactPhone can be delivered as a hosted-solution to reduce operating costs or as an on premise deployment to provide complete control by the customer.

Please reload

bottom of page