EN
EN
EN

SASe USB Key

Introducing Our Revolutionary USB Key

Products made for you

Products made for you

Products made for you

Ankhor Key

Ultimate Security in Your Pocket

Experience Unmatched Versatility and Security

Experience Unmatched Versatility and Security

In today's digital age, security is more critical than ever. That's why we're thrilled to introduce our cutting-edge USB key—a powerful, versatile, and secure solution designed to meet all your cryptographic needs.

This USB dongle is a full commercial integration of our SASe IC module, certified as a FIDO2 authenticator, and packed with advanced features to keep your data safe.

Unparalleled Security with Dynamic PUF Technology

Unparalleled Security with Dynamic PUF Technology

Our USB key is fortified with our dynamic PUF technology, enabling multiple root-of-trust and ensuring that your applications remain crypto-isolated.

This means you can run multiple applications securely, with each application benefiting from its own isolated cryptographic environment.

Key Features

Key Features

Versatile Applications for
Every Need

Our USB key is designed to handle a variety of cryptographic tasks, making it the ultimate tool for secure data management.

Dual FIDO Authentication

Integrate two separate FIDO authentications, one for 2FA secure boot and another for online accounts, each with different PINs.

Media Asset Signing

Sign media assets with C2PA for enhanced security.

File Encryption

File Encryption

Encrypt files uniquely so that only the USB key can decrypt them.

Password Manager

Password Manager

Offline password manager and TOTP system using MCU internal storage and PUF encryption.

API Key Manager

API Key Manager

Safely carry and transport your API keys.

End-to-End Encryption

End-to-End Encryption

Pair different USB keys to create private encrypted end-to-end channels, ideal for remote control of critical infrastructure or streaming sensitive data.

Customizable and Reprogrammable

Customizable and Reprogrammable

Customizable and Reprogrammable

Our USB key is designed with flexibility in mind. It can be reprogrammed on demand and comes with default integrated applications.

We provide a convenient API/SDK, allowing you to create your own crypto-isolated applications.

Whether you need a custom VPN or a remote control system protected with FIDO in a zero-trust architecture, the possibilities are endless.

Durable and User-Friendly Design

Durable and User-Friendly Design

Durable and User-Friendly Design

Our USB key is not only powerful but also designed with usability and durability in mind.

Join forces with us
for unmatched security with PUF Technology

Seamless Technology Integration

Seamless Integration

Discover how PUF technology can secure your data and the Internet of Things, providing a reliable solution tailored to your industry.

NYCU-IIST R&D Center

NYCU-IIST Joint research Focused on hardware security technology development

Enhance your systems' protection with PUF

Elevate your security effortlessly with PUF technology, where innovation meets unmatched protection

service@iist.com.tw

FAQ

For any questions, check our FAQ where we've compiled the most requested information.

What challenges are involved in enhanced device authentication?

What challenges are involved in enhanced device authentication?

What challenges are involved in enhanced device authentication?

What are the challenges of scalability in IoT secure deployments?

What are the challenges of scalability in IoT secure deployments?

What are the challenges of scalability in IoT secure deployments?

Why is secure key generation and storage important?

Why is secure key generation and storage important?

Why is secure key generation and storage important?

What is a true random number generator (TRNG) and why is it necessary?

What is a true random number generator (TRNG) and why is it necessary?

What is a true random number generator (TRNG) and why is it necessary?

How does resistance to cloning enhance security?

How does resistance to cloning enhance security?

How does resistance to cloning enhance security?

How can cost-effective security be achieved?

How can cost-effective security be achieved?

How can cost-effective security be achieved?