The HOYOS Communicator Smartphone represents the successful engineering of a unique security platform starting with the integration of Green Hills™ Software's INTEGRITY-178™ OS. Green Hills Software is the only company in the world to build an Operating System that has recieved the NSA's highest certification level (EAL 6+). INTEGRITY-178 is purpose built from the ground up for safety, reliability and security. As part of its pedigree history, Green Hills Software has developed secure Operating Systems with no detectable vulnerabilities. This Operating System is similar to the Operating Systems used in devices and technology such as military vehicles, civilian aircraft, automobiles, and private and supervisory control devices for over the past 18 years.


Our proprietary biometric solution, DEDOS™, uses a touchless scan of multiple fingers on one hand at once, to bind the User’s Identity with their biometrics. DEDOS™ can provide 150 DOF (Degrees of Freedom) for a much more secure biometrics. DEDOS™ works utilizing the rear camera of the device, in day or night, indoors or outdoors.


The HOYOS-invented IEEE2410 Standard is an end-to-end specification describing the standards necessary to perform server-based enhanced biometric security on a client device. It comprises a set of rules that govern secure communications and the management of biometric data among a variety of client devices, including mobile phones and computers. IEEE2410 Standard is how we make sure that authenticating is not only convenient, but extremely secure. We don’t store any user information on our server; instead, everything is stored exclusively on the users mobile devices, giving them total control of their digital identity. IEEE2410 Standard was adopted by the International Institute of Electrical and Electronics Engineers (IEEE) and now represents the global standard for biometrics security. IEEE2410 Standard uses a 2-way SSL Secure Connection with 571 bit ECC TLS (Elliptic Curve Cryptography for the Transport Layer Security Protocol).

In addition to authenticating to unlock the smartphone, here are a few examples of how IEEE2410 Standard can be deployed to ensure greater security within an organization or business:

  • DIGITAL ACCESS CONTROL - IEEE2410 Standard can store your password for any secure service. Using biometric authentication, IEEE2410 Standard will grant you access to that service without having to type a long complex password. Passwords can be shared, biometrics can't.

  • PHYSICAL ACCESS CONTROL – in the same way that your digital assets are vulnerable when passwords can be shared, your physical access tools can also be shared: keys, beepers and cards that open doors and gates are examples of things that can end up in the wrong hands. IEEE2410 Standard can communicate with gates, magnetic locks (and other type of door locks) and other places with electronic locks (safes, cars, etc.) and grant access to only the biometrically authorized user.

  • FILE SHARING - This is offered as HOYOS Data Manager. You can share encrypted files with other people that will need to authenticate biometrically to view the file. This guarantees that only the people you want to see a file are the ones with access to it.

  • GEO-FENCING – Combining IEEE2410 Standard with a device’s secure GPS or locations service can create a powerful tool. Let's say you have a secure perimeter like a military base. IEEE2410 Standard can have guards patrolling the area authenticate at a given period of time or have them authenticate when they enter or leave the perimeter. This is done monitoring the device's geolocation or (if underground) with Bluetooth beacons.


  • Our use of INTEGRITY goes beyond smartphones. HOYOS INTEGRITY’s technology and product roadmap, in conjunction with Green Hills Software, is directed at creating an entire ecosystem of truly secure, connected INTEGRITY-based devices and solutions. We have either built or are in the process of building HOYOS Communicator gateways, desktop PCs, laptops, and even nano-satellites.

  • Our strategic objective is to establish and nurture a long-term partnership and securing all government and business cyber operations in the world.