Examples of interventions:

Phone operators

Secure telecommunications equipment by incorporating cryptographic modules

  • Specifying a security chain of a multi-provider public phone system using new generation calling cards.
  • Functional specification of a cryptographic module (SAM) for payphone
  • Environment: Phonecard T2G, SM, cryptographic processors

Back to business areas