OPEN MENUCLOSE MENU

INTEGRITY™ OS

The HOYOS INTEGRITY smartphone represents the successful engineering of a unique security platform starting with the integration of Green Hills Software™ INTEGRITY-178™ OS. Green Hills Software is the only company in the world to build an Operating System that has recieved the NSA's highest certification level (EAL 6+). INTEGRITY-178 is purpose built from the ground up for safety, reliability and security. As part of its pedigree history, Green Hills Software has developed secure Operating Systems with no detectable vulnerabilities. This Operating System is similar to the Operating Systems used in devices and technology such as military vehicles, civilian aircraft, automobiles, and private and supervisory control devices for over the past 18 years.

HOYOS INTEGRITY DEDOS™

With our proprietary biometric solution that touchless scans multiple fingers (up to 4) on one hand at once, we are able to bind the User’s Identity with their biometrics. DEDOS can provide 150 DOF (Degrees of Freedom) for a much more secure biometrics. DEDOS works utilizing the rear camera of the device, in day or night, indoors or outdoors.

HOYOS INTEGRITY BIOMETRICS SERVER (BOPS)

The Hoyos-invented Biometric Open Protocol Standard (BOPS) is an end-to-end specification describing the standards necessary to perform server-based enhanced biometric security on a client device. It comprises a set of rules that govern secure communications and the management of biometric data among a variety of client devices, including mobile phones and computers. BOPS is how we make sure that authenticating is not only convenient, but extremely secure. We don’t store any user information on our server; instead, everything is stored exclusively on the users mobile devices, giving them total control of their digital identity. BOPS was adopted by the International Institute of Electrical and Electronics Engineers (IEEE) and now represents the global standard for biometrics security. BOPS uses a 2-way SSL Secure Connection with 571 bit ECC TLS (Elliptic Curve Cryptography for the Transport Layer Security Protocol).

In addition to authenticating to unlock the smartphone, here are a few examples of how BOPS can be deployed to ensure greater security within an organization or business:

  • DIGITAL ACCESS CONTROL - BOPS can store your password for any secure service. Using biometric authentication, BOPS will grant you access to that service without having to type a long complex password. Passwords can be shared, biometrics can't.

  • PHYSICAL ACCESS CONTROL – in the same way that your digital assets are vulnerable when passwords can be shared, your physical access tools can also be shared: keys, beepers and cards that open doors and gates are examples of things that can end up in the wrong hands. BOPS can communicate with gates, magnetic locks (and other type of door locks) and other places with electronic locks (safes, cars, etc.) and grant access to only the biometrically authorized user.

  • FILE SHARING - This is offered as INTEGRITY DATA. You can share encrypted files with other people that will need to authenticate biometrically to view the file. This guarantees that only the people you want to see a file are the ones with access to it.

  • GEO-FENCING – Combining BOPS with a device’s secure GPS or locations service can create a powerful tool. Let's say you have a secure perimeter like a military base. BOPS can have guards patrolling the area authenticate at a given period of time or have them authenticate when they enter or leave the perimeter. This is done monitoring the device's geolocation or (if underground) with Bluetooth beacons.

SECURING THE CONNECTED WORLD

  • Our use of INTEGRITY goes beyond smartphones. HOYOS INTEGRITY’S technology and product roadmap, in conjunction with Green Hills Software, is directed at creating an entire ecosystem of truly secure, connected INTEGRITY-based devices and solutions. We have either built or are in the process of building INTEGRITY gateways, desktop PCs, laptops, and even nano-satellites.

  • Our strategic objective is to establish and nurture a long-term partnership and securing all government and business cyber operations in the world.