Platform

The Full Stream of Mobile Security:
Device / User / Data

Designed with the express goal of providing a mobile data storage and retrieval solution that can eliminate fraud and identity theft in real-world environments, the BluStor platform is the first—and only—solution to address the full stream of mobile security: device, user, and data. It is the result of combining currently available technologies in a creative and proprietary solution integrated into the ubiquitous smart card form factor. Its high-capacity flash storage provides sufficient memory to house the multiple biometrics files required for the most demanding match-on-card security applications. And, most importantly, BluStor features Bluetooth 4.0/LE, making the BluStor platform compatible with virtually any mobile device, including iPhones, iPads and laptops.

Mobile Apps + Web-Based Administration

Effective security requires separating the 'keys' from the device. That's where BluStor comes in. Using the BluStor card together with biometrics-based identity authentication software gives application developers a way to ensure totally secure mobile computing. To access sensitive protected information a user must authenticate himself to the BluStor card first, using a randomly selected biometric feature, such as fingerprint, iris, voice, etc.

The basic BluStor authentication and management app includes:

  • Biometric ID access
  • Password management
  • Secure access to designated apps
  • Secure file storage and cloud backup

In addition, BluStor offers access to a web-based administration system that includes tracking of individual cards and comprehensive analytics. This powerful management software has been developed in partnership with Gemalto, the worldwide leader in personal mobile services, payment security, authenticated cloud access, identity and privacy protection, eHealthcare and eGovernment efficiency, convenient ticketing and dependable machine-to-machine (M2M) applications.

Key Technologies


Bluetooth 4.0/LE

Bluetooth is the ubiquitous wireless standard, high-speed and secure. And the new Low Energy protocol means it's efficient too. (BluStor also supports legacy applications via USB or ISO 7816-3 interface.)


Embedded Security

Hardware cryptographic engine to facilitate PKI-based applications, including asymmetric encryption and digital signature generation/verification. Symmetric encryption of bulk data via the AES algorithm.


Multi-GB Flash Storage

Multi-GB flash provides sufficient storage for the complex biometrics files required by highly secure applications, with room left over for gigs of secure apps and sensitive data files.


Polymer Battery

Ultra-thin rechargeable lithium ion battery, with recharging mechanism via the USB/ISO 7816-3 interfaces.