You are safe with ICTK

We Protect Your Values!

2013 The Encounter with HY univ.TTA and ICTK cooperate and agree on mobile payment payments

NFC 기술을 활용한 ICT융합산업 전 분야에 역량 강화할 것

[보안뉴스 김경애] 한국정보통신기술협회(이하 TTA, 회장 이근협)와 아이씨티케이(이하 ICTK, 대표 김동현)는 2일 국내 모바일 지급결제 생태계 활성화 지원을 위한 시험인증 업무협약을 체결했다고 밝혔다. 

양사는 공동협력의 첫 일환으로 스마트폰과 비접촉식 결제기 간 인식성능 및 호환성 문제해결을 위한 금융 NFC 상호운용성 테스트베드 구축을 올 상반기 중 완료할 예정이다. 또한, 모바일 결제단말기(POS) 도입과 이종 사업주체간 합종연횡으로 빠르게 변화하고 있는 국내 모바일 지급결제 서비스의 활성화와 관련 기술의 안정화를 위해 공동 노력할 계획이다.

To read more:

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

Introduction to vertical business areas 

Go >

We do these things.
PUF Technology

What is PUF?

Unique Inborn ID 
(PUF, Physically Unclonable Functions)

•Silicon Inborn ID using the randomness of passive device generation in the semiconductor manufacturing process

• As a Physical ID created with physical characteristics, it is fundamentally impossible to falsify or duplicate the value

• Since each semiconductor chip generates a different unique ID, it is called a semiconductor fingerprint.

PUF Advantages

AS Via PUF provides unique Silicon Inborn ID characteristics,  It provides the Root of Trust (RoT), the source of all trust

•Via PUF guarantees stability that is impervious to 
various types of hacking attacks.

•Via PUF is a method of forming via holes between 
metal layers during semiconductor processing.

•As a passive device method, it is an innovative method
that solves all the problems of existing technologies.

•PUF that satisfies all randomness, homeostasis and 
security •Unlike other technologies, no error correction
circuit (ECC) is required.

What you can do with PUF

VIA PUF can be applied to various IoT devices and solutions  that require strong security.

•ICTK's security chip generates a key pair of a private key and a public key in the security chip using an algorithm called ECC based on the key generated by PUF.

•ICTK's PUF security chip provides encrypted RAM (Random Access Memory) and encrypted eFlash (flash memory) inside.

•ICTK's security chip can be operated in PQC (Post Quantum Cryptography), a quantum security algorithm.

ICTK's security chip is the most powerful existing method to provide the Root of Trust function based on PUF.