Cocoon Connect Encryption
Is my data safe?
We adopted the world's most advanced financial-grade encryption technology for each piece of data and signed all-around confidentiality agreements with our customers.
Our Cloud Service has also been certified as Trusted Cloud.
Cocoon Connects main encryption system for services includes two parts.
The first part is encrypted storage of data and sensitive information on the client (your application) and server (our server running the application) ends.
On the client end, Cocoon Connect uses the AES and RSA algorithms, and hardware local data is encrypted using AES.
On the server end, a unified security development component is used for AES encryption of the data entering the database or HMAC desensitisation.
In addition, a unified desensitise component desensitises sensitive information in generated service logs, e.g. names and email addresses are masked so they cannot be accessed by third parties.
The second part is communication encryption.
Communication channels between apps and the cloud are encrypted using TLS, and signature verification is performed on sensitive information and communication data.
Communication data between the cloud and network access modules is encrypted using the AES algorithm based on dynamic keys of devices. If the firmware is updated to the latest version released at the end of January 2019, all communication channels are encrypted using TLS. Communications between the cloud and other hardware, including cameras, are also encrypted.
Can my privacy be guaranteed if I use the service of cloud storage for videos?
The service of cloud storage for videos encrypts video data and uses financial service encryption technologies for data transmission and dynamic keys during encryption.
As both the data and transmission channel are encrypted, hackers cannot play videos even if they intercept the videos.
How to ensure data security of Cocoon Connect devices connecting to a network without a Wi-Fi password?
We provide various security strategies to effectively ensure data security of user and device.
- As for device access, proprietary algorithms are employed to ensure data isolation, access authentication, applying for authorisation.
- As for data communication, communication using security algorithms and transmission encryption protocols and military-level information encryption transmission based on dynamic keys are supported.
- As for data processing, strict data filtering and validation and complete data audit are applied.
- As for data storage, all confidential information of users will be safely encrypted for storage.
Comments
0 comments
Please sign in to leave a comment.