CUCo
Firmware Security
Unique Security Technology
Security Guarantee
Inclusive Projects Enabler
Firmware Security
Unique Security Technology
Security Guarantee
Inclusive Projects Enabler
scroll down to discover more

CUCo´s Solutions are:

Security

(CUCo Security Solution)

CUCo Security Solution also serves as a theft deterrent successfully locking down the device in case it is lost or stolen. In conjunction with hard drive encryption, sensitive data is kept out of the hands of anyone who should not have access to it. The owner of the device simply makes a phone call to the support team and, after confirmation of the identity, the device is immediately locked down.

Objectives

The main purpose of the CUCo Firmware Security solution is to enable a computing device to perform a contractual self-compliance check, based on predefined rules, allowing the protection against theft and abuse of the user´s devices, through an auto firmware lock and remote unlocking system, independent of its connectivity status.

Usage Benefits
Protection of Property

Device owner is fully protected since any event of lost, stolen or contract abuse (e.g. device not returned at contractual date) allow the device owner to remotely lock and recover these devices

Device owner can have multiple brands and diverse operating systems on its network, all protected with the same security system

In Device as a Service scenarios, the device owner can assure the return and recovery of the device in the event of any contractual breach and easily enforce the missing recurrent payments of the contract

Theft deterrence is as black-market value nullity

Protecting Users

The theft deterrence nature of CUCo technology is the most effective protection against user´s abuse

Devices with CUCo, being remotely locked, are not a target to be stolen, wrongly reported missing or traded in black markets, which creates a safer usage environment for the end user of the device

solutions img

Firmware Security

solutions img

Security Guarantee

solutions img

Unique Security Technology

solutions img

Inclusive Projects Enabler

Developed and patented by Softi9 within an European consortium including research engineers specialized in security. Latest version is optimized for CometLake, AlderLake, GeminiLake and JasperLake Intel families and leverages the UEFI standard security model for future development.

Most major computer manufacturers are already licensed and validated compatible devices with CUCo. CUCo is available for licensing by ODMs, MNCs, hardware SIs, IDHs under CUCo brand or white label scenarios and can be activated in many scenarios by governments, schools, universities, telecom operators, leasing companies and any DaaS project owners.

The server component to control the device, can be cloud shared or on-premises installed by the DaaS project owner, depending on the size of the project. Server side can be deployed in Microsoft Azure and optionally hooks into Microsoft Intune MDM functions.

This unique security technology has been verified and guaranteed against vulnerability attacks.

CUCo’s internal rules engine has thresholds timer intervals and actions to take, independently of device network connectivity status. CUCo Firmware Security provides local, tamper-resistant, policy-based protection that works even if the operating system is reimaged or a new hard drive is installed.

CUCo is a unique security technology for computers, tablets and smartphones - currently developed for 86x, Intel architecture. ARM under development -, leveraging hardware, firmware and software agents to enable a device to self-compliance check, automatic or manual remote lock, remote unlock and locate, even before the operating system is running.

CUCo enables an intelligent protection of lost and stolen devices, intended to prevent unauthorized use of a computer, running on all modern x86 devices - Currently developed for x86, but ARM based under development and expected available in Q1 2020. Given some technological limitations of the ARM architecture, not all security defences are implemented in ARM, as they are compared to x86 implementation -, from the lowest end tablet or smartphone, to the highest spec laptop, workstation or server. CUCo does not require traditional proprietary CPU or chipset security features.

CUCo dramatically improves the odds of hardware recovery and contract compliance, allowing inclusive and non-discriminatory projects that would otherwise face economically insurmountable obstacles. It’s truly the unlock key to Device as a Service (DaaS) projects, as it solves the main obstacle of DaaS: the device control by the project owner while under a service contract.

Now, large projects on education, where inclusivity and non-discrimination are paramount priorities, are finally possible. Telecom operator x86 device handout when subscribing an Internet service, can finally happen at same time of the traditional smartphone handout on service subscription. Leasing companies can finally tap the vast SMB, SoHo and consumer market strongly limiting the default risk associated to the instalment payments.

Case Studies

E-School Project

Contact us