• Market Cap
    $393.207B -0.86%
  • POW Market Cap
    $302.905B -1.72%
  • POS Market Cap
    $19.528B 0.40%
  • Masternodes Market Cap
    $1.202B 0.04%

FIX Network realize a Bitcoin message over the cellular network

By Inkarias - 2019-11-01

The core team of FIX Network is glad to announce the completion of a giant step towards objectives regarding securing transactions and private keys on SIM cards. This achievement serves as validation and proof-of-concept of the FIX core technology of storing and managing private keys on SIM cards and facilitating the completion of public and private signatures over the air. The FIX Network Security Protocol will completely ensure the security and safety of private keys that are used by applications running on mobile devices, providing a safe environment for protecting digital identities and digital assets in general.

State-of-the-art technology

A major innovation and a critical component of FIX solution is the storage of private keys on the subscriber’s SIM card, and the execution of cryptographic operations on that SIM card using cryptographic-enabled applets. Importantly, the private keys are never exposed to the mobile device or to a public network, and this architecture adds a significant layer of security to the storage of digital identities and assets, and for effecting digital transactions. This initial proof-of-concept testing successfully demonstrated the enrolment of private keys employing seed mnemonics and deterministic public key generation, with the signature using secp256k1 and the Elliptic Curve Digital Signature Algorithm (ECDSA). A next generation, FIX-enabled SIM card that natively supports advanced hashing algorithms was hosted in a mobile device to sign the transactions, with a customized Over-the-Air (OTA) gateway providing secure communications to the SIM card using a mobile network.

Finally, the FIX Network Security Protocol is the “Security Policy”, which is critical for managing the storage, use and recovery of digital assets and identities. Such policies define the rules for governing digital lives and are configured by the end-user to suit their specific requirements. Policies will be stored and secured by blockchain technology, and access to these policies will be through mobile devices via the existing cellular infrastructure

If you are looking for more information , you can visit https://fix.network/