Brochures

Security BuilderTM Software Libraries

When you need to add proven security to an electronic system, you can find it at the “Library”. Ensure confidentiality, data integrity, and authentication with Certicom’s battle-hardened software libraries.

Secure Cryptographic Asset Management System: AMS

Without a secure supply chain, there is no security. Today's digital products require security that is built-in, and starts in a secure factory. The key to digital security is keeping secret cryptographic keys secret at every step in the supply chain, and that is what the Asset Management System (AMS) from BlackBerry's Certicom subsidiary is designed to do.

Managed Public Key Infrastructure (PKI) Hosting Services

Security matters for all connected devices. To reduce or eliminate the risk of attack, security must be designed into electronic systems and products right from the start.

Why Use Cryptography?

As data breaches become all too common in today’s hyper-connected world, the prevailing importance of ensuring security in your electronic systems can not be understated. But what is security, anyway?

Not Just Secure… But BlackBerry Secure

There is a reason BlackBerry is synonymous with security. Put simply, security is in BlackBerry’s DNA. BlackBerry security has earned over 70 government certifications and approvals and is the mobility partner of all G7 governments. In addition, Certicom, part of BlackBerry Technology Solutions, has developed Elliptic Curve Cryptography (ECC) algorithms that have been licensed and standardized by the US National Security Agency (NSA).

Use Cases

XM Radio Success Story

Using a blend of Certicom Developer Toolkits and custom development, Certicom has built on award-winning work with customers such as XM Satellite Radio to demonstrate the skills, tools and products to address customer requirements for conditional access systems, policy enforcement, encryption, and key management.

Check 21 Solutions from Certicom

The Certicom Security Architecture for Check 21 is a comprehensive solution that allowed check application and transport vendors to quickly and cost-effectively add digital signature functionality per ANSI X9.37 security standards.  These digital signatures brought strong security to the digital image exchange process.  Should a signed image be compromised (e.g., have its own value or the name of the payor or payee altered), the signature will not be verifiable, and the check will not be cleared.

A more complete discussion of Check 21 can be found in Code and Cipher Volume 1, No. 3.

Certicom Security for RFID Authentication

Commercial industries and government agencies face a number of issues – theft, grey market competition, brand integrity, liability, inventory control, supply chain inefficiencies, privacy concerns, and government mandates – that can be solved with Certicom's RFID solution that guarantees product authenticity and keeps unauthorized individuals from viewing product information.