Examples of interventions:
Phone operators
Secure telecommunications equipment by incorporating cryptographic modules
- Specifying a security chain of a multi-provider public phone system using new generation calling cards.
- Functional specification of a cryptographic module (SAM) for payphone
- Environment: Phonecard T2G, SM, cryptographic processors
Back to business areas