Certicom Corp.

Safety & Security Equipment

Certicom Licenses Elliptic Curve Cryptography to IdentiPHI for Advanced Enterprise Security and Suite B Compliance

IdentiPHI to Incorporate Certicom's ECC Security into New Biometric and Smart Card Authentication Products for Businesses and Government Agencies MISSISSAUGA, Ontario - (Nov. 28, 2007) - Certicom Corp. (TSX: CIC) today announced that it has licensed its Elliptic Curve Cryptography technology to IdentiPHI Inc., an industry leader in enterprise advanced authentication, single sign-on and endpoint...

Read More »
Services

Service issues digital certificates to device manufacturers.

Capable of issuing digital certificates based on Elliptic Curve Cryptography as well as legacy RSA, Certicom Device Certificate Authority benefits manufacturers that produce HDTVs, cable set-top boxes, mobile handsets, and security-sensitive sensor and control devices. All certificates are issued using policies and procedures that have been developed to ISO 27001 security standard.

Read More »
Software

Data Security Software uses NSA recommended algorithms.

Security BuilderÂ-® API for .NET enables independent software developers to utilize elliptic curve and Suite B algorithms in new and legacy applications running on multiple Windows platforms. Software features government level security and compatibility with 20 .NET languages. Suite acts as an abstraction layer to the cryptographic providers within the CerticomÂ-® Security...

Read More »
Software

Software Plug-In enables OpenSSL developers to support ECC.

Using Security Builder API for Open Source, OpenSSL developers can add elliptic curve cryptography to their applications. SSL shim, or abstraction layer, allows developers to plug SSL applications into software cryptographic providers that include elliptic curve and Suite B algorithms as well as pre-approved FIPS-140-2 cryptographic module.

Read More »
Software

Software Development Module brings UMA to mobile devices.

Certicom UMA Device Software helps device manufacturers implement unlicensed mobile access (UMA) protocol in order addresses fixed mobile convergence (FMC) market. Built for resource-constrained devices, this standards-based portable module contains APIs to facilitate integration of UMA module with other elements that comprise mobile device. It is also integrated with Certicom Security Builder...

Read More »
Software

MobileAware Meets Customers' Need for FIPS Validation with Certicom Technology

The small footprint and proven implementations of Certicom's security ideal for mobile applications. MISSISSAUGA, ON, April 16 -- Certicom (TSX: CIC) today announced that MobileAware has licensed Security BuilderÂ-® GSE(TM) to meet the FIPS 140-2 security level requirement demanded by a growing number of security-conscious corporate and government organizations. By using Certicom's FIPS...

Read More »
Software

Security Solution prevents gray market chip theft.

CerticomÂ-® Security for Silicon Design Protection(TM) helps fabless semiconductor designers protect proprietary chip designs and reduce problem of illicit surplus chip manufacturing. Combining software-based Certicom KeyInject(TM) with hardware IP core, solution enforces security policies throughout silicon manufacturing process. Multi-stage authentication and key generation, also included,...

Read More »
Materials

Network Security Solution promotes flexible topologies.

Comprised of Certicom MCE software module and Certicom ECC Core hardware IP core, Certicom Security for Sensor Networks secures low-power, wireless sensor networks and enables them to be scalable, mobile, and self-configurable. Product uses elliptic-curve cryptography to add provable identity to sensor devices, which provides security from design and development through to manufacturing,...

Read More »
Software

Multi-Layer Solution secures VoIP communication.

Suited for desktop VoIP handsets and mobile VoIP devices, Certicom Security for VoIP consists of multiple integrated modules that implement key security protocols such as IPSec, SSL/TLS, and DTLS. Flexible, standard-based solution also provides underlying cryptographic algorithms, trusted boot, secure provisioning, and code signing technology, all of which help secure advanced applications. Its...

Read More »
Software

Certicom Launches Security Solution for Digital Rights Management (DRM)

Comprehensive Platform Achieves Robust DRM Implementations by Securing Device from Silicon up to the Application MISSISSAUGA, ON, Dec. 6 / -- Certicom today announced Certicom Security for DRM, a comprehensive solution that implements digital rights management (DRM) agents as part of a trusted platform. To achieve DRM robustness, device manufacturers must ensure that only trusted applications...

Read More »
Safety & Security Equipment

Certicom Licenses Elliptic Curve Cryptography to IdentiPHI for Advanced Enterprise Security and Suite B Compliance

IdentiPHI to Incorporate Certicom's ECC Security into New Biometric and Smart Card Authentication Products for Businesses and Government Agencies MISSISSAUGA, Ontario - (Nov. 28, 2007) - Certicom Corp. (TSX: CIC) today announced that it has licensed its Elliptic Curve Cryptography technology to IdentiPHI Inc., an industry leader in enterprise advanced authentication, single sign-on and endpoint...

Read More »
People in the News

Certicom Appoints Karna Gupta as New Chief Executive Officer

MISSISSAUGA, Ontario - (January 8, 2008) - The Board of Directors of Certicom Corp. (TSX: CIC) (the Company ) today announced that it has appointed Karna Gupta as Chief Executive Officer and a member of the Board of Directors, effective January 21, 2008, replacing Mr. Bernard Crotty, currently serving as President and Chief Executive Officer on an interim basis. Mr. Crotty will remain on the...

Read More »
Services

Service issues digital certificates to device manufacturers.

Capable of issuing digital certificates based on Elliptic Curve Cryptography as well as legacy RSA, Certicom Device Certificate Authority benefits manufacturers that produce HDTVs, cable set-top boxes, mobile handsets, and security-sensitive sensor and control devices. All certificates are issued using policies and procedures that have been developed to ISO 27001 security standard.

Read More »
Software

Data Security Software uses NSA recommended algorithms.

Security BuilderÂ-® API for .NET enables independent software developers to utilize elliptic curve and Suite B algorithms in new and legacy applications running on multiple Windows platforms. Software features government level security and compatibility with 20 .NET languages. Suite acts as an abstraction layer to the cryptographic providers within the CerticomÂ-® Security...

Read More »
Software

Software Plug-In enables OpenSSL developers to support ECC.

Using Security Builder API for Open Source, OpenSSL developers can add elliptic curve cryptography to their applications. SSL shim, or abstraction layer, allows developers to plug SSL applications into software cryptographic providers that include elliptic curve and Suite B algorithms as well as pre-approved FIPS-140-2 cryptographic module.

Read More »
Software

Software Development Module brings UMA to mobile devices.

Certicom UMA Device Software helps device manufacturers implement unlicensed mobile access (UMA) protocol in order addresses fixed mobile convergence (FMC) market. Built for resource-constrained devices, this standards-based portable module contains APIs to facilitate integration of UMA module with other elements that comprise mobile device. It is also integrated with Certicom Security Builder...

Read More »
Software

MobileAware Meets Customers' Need for FIPS Validation with Certicom Technology

The small footprint and proven implementations of Certicom's security ideal for mobile applications. MISSISSAUGA, ON, April 16 -- Certicom (TSX: CIC) today announced that MobileAware has licensed Security BuilderÂ-® GSE(TM) to meet the FIPS 140-2 security level requirement demanded by a growing number of security-conscious corporate and government organizations. By using Certicom's FIPS...

Read More »
People in the News

At RSA Conference 2007 Industry Experts Discuss the Factors That Make ECC Ready for Prime Time in TLS

Panel representing Certicom, Microsoft, Red Hat and Sun Microsystems discuss how the Internet, mobile devices and the new TLS standard are spurring ECC's adoption MISSISSAUGA, ON, Jan. 31 -- Certicom (TSX: CIC) today announced that its chief technology officer, Bill Lattin, will speak at the RSA Conference 2007 about the important new application of elliptic curve cryptography (ECC) in TLS. He...

Read More »
Software

Security Solution prevents gray market chip theft.

CerticomÂ-® Security for Silicon Design Protection(TM) helps fabless semiconductor designers protect proprietary chip designs and reduce problem of illicit surplus chip manufacturing. Combining software-based Certicom KeyInject(TM) with hardware IP core, solution enforces security policies throughout silicon manufacturing process. Multi-stage authentication and key generation, also included,...

Read More »
Materials

Network Security Solution promotes flexible topologies.

Comprised of Certicom MCE software module and Certicom ECC Core hardware IP core, Certicom Security for Sensor Networks secures low-power, wireless sensor networks and enables them to be scalable, mobile, and self-configurable. Product uses elliptic-curve cryptography to add provable identity to sensor devices, which provides security from design and development through to manufacturing,...

Read More »

All Topics