伟德体育在线(中国)官方网站

Product
Product
Ankeren - Dual System Controllable Tablet

◆ Product Introduction


3-nr_04.jpg

Ankeren - Dual System Controllable Tablet

 ( Type : RY-SP2-C )


    Ankeren-Dual system controllable tablet as a mobile network security product was developed Chinese academician and the company's technical team. The product has two independent operating systems: Security system and Android system. The Security system has a built-in national security chip for security work; the Android system is used for entertainment. The two systems installed in different chips switches after disconnecting power.


    The Security system adopts a number of security restrictive measures, such as the call function and WIFI function are restricted in underlying system, the special Bluetooth device is connected safely and controlled, the TYPE-C interface is only limited to charging and does not support data transmission, etc. Installation file encryption system in Security system solves data security issues during the process of enterprise mobile informatization, such as device management, log audit, remote instructions, instant messaging, secure storage, etc. Interconnection can be realized between tablets by security server and VPDN network.


    The product has strong adaptability and high stability. Pay attention to user privacy protection and data information security. Simplifying the installation and deployment process offers users a superlative out-of-box experience.


    The product has passed Sales License for Computer Information System Security Special Products issued by the Ministry of Public Security and Information Technology Product Security Testing Certificate issued by National Quality Supervision and Testing Center of Security Product for Network and Information System. It is an ideal mobile terminal product of realizing secured mobile office and provides mobile network security services for key information infrastructure and is widely used in government, finance, telecom, energy, healthcare and other fields.



◆ Product Advantages


6383668594704997221997751.jpg

Facial Recognition Function


3-nr_09.jpg

File Secure Storage 

and Transfer Function 


3-nr_11.jpg

Remote Teminal

Management Function 

The device can be unlocked through facial recognition technology to ensure user access to the system safely.



By combining software and hardware, files are encrypted for storage and transmission, ensuring the security of files. The encrypted file can be saved to the terminal or to the server. It can be decrypted and viewed by designated users when files are encrypted for transmission.

Bind the SIM card with the device. When forcibly removing or replacing another SIM card, the device automatically locks the screen. The device can be remotely locked, unlocked, shut down, restarted, and other operations. When the device is in Danger, all data can be cleared to ensure the security of data information.


3-nr_16.jpg

Whitelist Function


3-nr_17.jpg

Instant Messaging Function


3-nr_18.jpg

Snapchat Function

Restrict downloading, installing, and running apps. Users are prohibited from downloading and installing apps through other channels.
Provide a secure communication tool for users. All files and text information will be encrypted before transmission, ensuring the security of data information.
The document will self-destruct after the recipient reads the document.


◆ Product Features


3-nr_22.jpg

Data Security


3-nr_23.jpg

Application Security


3-nr_24.jpg

Communications Security

Built-in encryption program based on National Commercial Cryptography Algorithm and Combined Public Key Technique. Obtain encryption software and hardware certification.



The black and white list controls software installation and restricts unauthorized software installation and automatic operation.
Exclusive private security network, support operators to customize.
3-nr_28.jpgIdentification
3-nr_29.jpg

Physical Isolation


3-nr_30.jpg

Authoritative Attestation

Face recognition, pattern password, encryption password and other authentication methods are available.
The storage space of the two systems is independent, and the data information cannot be intercommunicated, effectively guaranteeing the data security of the file encryption system
Products through the Ministry of Public Security computer information system security products detection


◆ Industry Application


    As the advances in modern information and Internet technology, especially the develop of cloud computing, big data and mobile network. Ankeren-Dual system controllable tablet realized crossregional secured office and provided mobile network security services for clients.Regardless of being on business trip or working from home, the clients are not constrained by time and space. The product makes office more safe, accessible, and effective and ensures the security of unit and personal information.It is widely used in government, finance, telecom, energy, healthcare and other fields.



◆ Qualification


3-nr_38.jpg3-nr_40.jpg3-nr_42.jpg

Sales License for Computer Information System Security Special Products issued by the Ministry of Public Security

Information Technology Product Security Testing Certificate issued by National Quality Supervision and Testing Center of Security Product for Network and Information System.

Certificate for China Compulsory Product Certification



Product Introduction

sj-3-nr_07.jpg

Ankeren - Dual system controlled tablet computer

 ( Type : RY-SP2-C )


Ankeren -dual-system controllable tablet computer is composed of file encryption system and Android system. It is controlled by double physical buttons. The switch between the two systems is realized by means of hardware isolation and power failure switching. Among them, Android system adopts universal design, which can meet the daily entertainment life. File encryption system has software and hardware dual secret certificate, CPK encryption algorithm to complete the encryption and decryption of files.

This product in the intelligent terminal control security, data security, application security, communications security reinforcement, and solved using ordinary tablets for network privacy, sensitive data is stored, physical control leak no encryption, information and communication, the application installation is not controllable, operating system vulnerabilities, data interaction and security, classified, and the classified storage space sharing problems, such as the products meet the technical requirements of mobile Internet security 2.0, is the domestic first to meet the requirements of insurance such as 2.0 mobile security terminal products.


◆ Product Advantages


sj-3-nr_15.pngFacial recognition function. 
The device can be unlocked through facial recognition technology to ensure user access to the system safely.
sj-3-nr_24.jpg

File secure storage

and transfer function. 

By combining software and hardware, files are encrypted for storage and transmission, ensuring the security of files. The encrypted file can be saved to the terminal or to the server. It can be decrypted and viewed by designated users when files are encrypted for transmission.
sj-3-nr_26.jpg

Remote teminal 

management function. 

Bind the SIM card with the device. When forcibly removing or replacing another SIM card, the device automatically locks the screen. The device can be remotely locked, unlocked, shut down, restarted, and other operations. When the device is in Danger, all data can be cleared to ensure the security of data information.
打开.pngWhitelist function. 

Restrict downloading, installing, and running apps. Users are prohibited from downloading and installing apps through other channels.

sj-3-nr_30.pngInstant messaging function. 

Provide a secure communication tool for users. All files and text information will be encrypted before transmission, ensuring the security of data information.

sj-3-nr_32.png

Snapchat function. 

The document will self-destruct after the recipient reads the document.


◆ Product Features


sj-3-nr_34.pngData Security
File encryption system built-in original encryption program, software and hardware dual encryption certificate and CPK dual encryption algorithm.
sj-3-nr_36.pngApplication Security
The black and white list controls software installation and restricts unauthorized software installation and automatic operation.
sj-3-nr_38.png

Communications Security

Exclusive private security network, support operators to customize.
sj-3-nr_40.pngIdentification

Face recognition, pattern password, encryption password and other authentication methods are available.

sj-3-nr_42.pngPhysical Isolation

The storage space of the two systems is independent, and the data information cannot be intercommunicated, effectively guaranteeing the data security of the file encryption system

sj-3-nr_44.png

Authoritative Attestation

Products through the Ministry of Public Security computer information system security products detection


◆ Industry Application


In addition to the features of easy and fast movement of ordinary tablet computers, unlimited geographical limits and flexible office work, Ankeren - dual-system controllable tablet computer also provides a better choice for secure mobile office by virtue of its original security design and reliable encryption technology, and has a wide range of applications in the field of critical information infrastructure.

★ Government system : Unique identity authentication function and encrypted transmission, to protect sensitive information, classified documents and other protection from theft.

★ Financial system : Black and white list control, refusing illegal software to read user information; Domestic encryption chip and encryption algorithm double support, the user's personal privacy as solid as gold.

★ Medical system : Two-system convenient switching, physical isolation of information and data, widely used in mobile medical and mobile care.

★ Enterprises and institutions -- proprietary network encryption data transmission, build data security network.


◆ Qualification


sj-3-nr_47.jpg


The Ministry of Public Security: 

Sales License for Computer Information System Security Special ProductsInformation Technology Product Security Testing Certificate

 Certificate for China Compulsory 

Product Certification


Return to List
Baidu
sogou