Licence for use in applications or services. Please contact for further information.


  • Secure storage, management and control of cryptographic keys
    • Utilises known and trusted techniques and mechanisms
    • Can enhance PKI and other schemes for the management of cryptographic keys, or serve as a robust alternative
  • Ideal for software environments where dedicated hardware solutions are not desirable or appropriate


  • A software solution, but elements can be incorporated in to hardware if appropriate
  • Can be integral to an application, or be provided as an add-on or service to enhance existing solutions
  • Centralised or individual management and control over the use of security values
  • Can provide management of closed or private groups or domains of control
  • Assumes any system elements can be compromised and is designed to remain secure in such an event, with the ability to refresh