Thinc USB

A tamper-proof compact USB device with on-board biometrics for secure authentication, encrypted storage and read-only operating system for secure remote access.

Salient Features

On-Board Biometrics (Up To 40 Fingerprints)
AES 256 Encryption (Optional Custom Cipher & Keys)
FIPS 140-2 Level 3 Compliant
FIDO 1.0 Compliant
Device To Pc/Laptop/Server Binding
Individual & Shared Partitions with Read/Write permissions

latest news

Hackers leak emails from UAE ambassador to US
Emails taken from inbox of Yousef al-Otaiba reveal Emirati ambassador played role in campaign to tarnish Qatar's image.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form

Use Cases

Work from Home

When enterprises require employees to work from home by remotely connecting to their servers and networks using sanitized operating systems.

Bring Your Own Device (BYOD)

When enterprises allow the employees to bring their own devices to work. Usually personal PC/Laptops are infected due to the nature of internet browsing habits. ZERO Compute sets aside the personal hard drive and loads the read only sanitized OS thus utilizing the compute power of the PC yet through a sanitized environment.

Remote Vendor Access

Same use cases as the above but to manage remote vendor access using sanitized OS and registered vendors only.

FIDO – PC/Laptop Login

Use FIDO to biometrically authenticate the user to gain access to this workstation/PC/Laptop. This eliminates the need for username/password and prevents any outsider or intruder to login to the employee’s workstation.

Restrict Malware Propagation

Where ever copy/duplication from a read only storage is required, ZERO can effectively protect against malware propagation. For write access, limited protection is offered as referred in the scenario table above.

Password & Sensitive Data Storage

When top officials need to store passwords, credentials and other personal documents, ZERO is best possible device that has on-board biometrics along with tamper protection.

Remote Database & Network Administration

Same use cases as the above but to allow remote administration using sanitized OS packed with advanced admin tools required for remote support.

Pre-Configured VPN Clients, Firewalls & Proxy Settings

Using, pre- installed VPN clients (Cisco, Citrix etc.) and access to the VPN network from a customized read-only OS offers double the protection. Few banks in India have requested for this specific configuration and PoC has been successfully demonstrated.

Restricted Website Access

End-users can browse only allowed/pre- configured websites and will not be able to browse any other sites or applications.

Restricted Network, Bluetooth, Disk Drives, SUDO permissions & Command-line Terminals

A completely customized OS by removing access to external drives, networks and terminals can be packaged into the ZERO Compute device thus proofing against most vulnerabilities of a regular OS.

Restricted File Sharing on WiFi & Internet

ZERO Compute could be configured in such way that the end-users could browse the internet while preventing file sharing over the internet.

Hidden Partition

ZERO Compute could host a hidden partition to store persistent data like configuration files and any user downloaded resources. This partition is accessed only using a custom tool and is not recognized by the OS or other programs.

Address Ransomware

ZERO Compute is the only solution to rightly address the ransomware attacks as the contents cannot be encrypted or written on to. Backups and anti-viruses cannot really help which has been proven with many ransomware attacks including WannaCry.

Restrict Malware & Viruses

Malware cannot be installed on the read-only operating system. It may run temporarily but when rebooted will be wiped off. With appropriate server binding, firewall configuration, VPN access and network configuration, one can limit the sources of malware and viruses.

FIDO – No More Passwords!

With the specification of FIDO, passwords and any identity information is not required to be transmitted over the networks and stored at a centralized server. ZERO’s biometric authentication can quickly gain access to the server applications with a fingerprint scan. 

THINC - Storage Variant

ATM Software Distribution

ZERO read-only storage device allow bank executives to push software updates and drivers to the ATMs completely preventing malware propagation as the device is read-only.

Copy ATM Logs and Video Feeds

Banks require to copy the videos and logs from the ATM to the bank servers. Since the partition requires write access, please refer to the scenario table above.

FIDO – PC/Laptop Login

Use FIDO to biometrically authenticate the user to gain access to this workstation/PC/Laptop. This eliminates the need for username/password and prevents any outsider or intruder to login to the employee’s workstation.

Protect Confidential Legal Documents, Bids, Contracts, R&D Blueprints and Certificates

Same as above with shared partition for multiple users to access the same partition with independent biometric access.

Restrict Malware Propagation

Where ever copy/duplication from a read only storage is required, ZERO can effectively protect against malware propagation. For write access, limited protection is offered as referred in the scenario table above.

Password & Sensitive Data Storage

When top officials need to store passwords, credentials and other personal documents, ZERO is best possible device that has on-board biometrics along with tamper protection.

Share Reports & Sensitive Data with Vendors and Regulatory (Eg. RBI)

When certain reports are to be shared with regulatory authorities or vendors, ZERO devices come in handy.

Share Code and Resources within the Software Development Teams

To share critical code and resources among or across development teams.