-
Security
Vulnerability Assessments
Designing systems takes experience and focus. All components of the system must follow a common design goal. We can design the complete enterprise or a specific component to interoperate with the rest of the enterprise.Secure Embedded Systems
We have been building mission critical systems for over a decade. We've also designed and developed highly secure embedded technology and systems. Or expertise in smart card technology is evidenced by patents already awarded for our designs.
Industrial Security Surveys
We can prepare a survey for your specific environment or we can also perform the survey. Don't wait until after a big issue to kick yourself for not taking security threats seriously. Think of how easily you could lose everything if a hacker entered your computers or bypassed your physical security.
Security Audits
Designing a secure system begins with an audit of the existing system and process. Even if you plan to have your internal team do the development, we are available to perform an independent analysis of your security systems and processes.
Computer Forensics
Recover lost data, understand why a system crashed, or simply unerase a deleted file. There are tools available that help, but when those don't work, give us a call. If it is for a legal matter, don't touch the systems yourself – we understand how to collect, preserve, and present evidence.
Smart Card Systems
We will design and build you a smart card application tailored to your exact specification. We can provide pre-built applications for many standards or develop to your standard. In many cases, we are able to develop a card that will co-exist with your existing system.
-
Development
Databases
Customized database design, development, and maintenance. Proficient with Oracle, SQL Server, My SQL, Postgres, 4D, and others. Proper architecture will results in a well operating and maintainable database.System Architecture
Proper design is imperative to a successful project. We have many years of experience designing embedded and large enterprise systems. We can review your architecture, work with you to refine it, or build you a solid architecture to your specific requirements.
Special
If you can describe it, we can spec it and build it. No reason to learn engineering – that's our job. You think of the idea and describe it as best you can. We'll work with you to make it real.
Small Systems
Complex functionality targeted at very small computing devices. Small devices don't need to do small things. We do very complex things in small devices, and have the Patents to prove it. Describe your needs and we'll point you to the best components.
-
Development
Expertise
Additional Services
From secure network devices to access control, we know how it works, and we will make it work for you.
Databases
Customized database design, development, and maintenance. Proficient with Oracle, SQL Server, My SQL, Postgres, 4D, and others. Proper architecture will results in a well operating and maintainable database.Plugin Development
Customized plug-in design and development for 4th Dimension. If the 4D language can't meet your needs, we can build you that high performance plugin that meets your exact operational and performance requirements.Small Systems
Complex functionality targeted at very small computing devices. Small devices don't need to do small things. We do very complex things in small devices, and have the Patents to prove it. Describe your needs and we'll point you to the best components.Special
If you can describe it, we can spec it and build it. No reason to learn engineering – that's our job. You think of the idea and describe it as best you can. We'll work with you to make it real. -
patents
Todd Carper, President of TEC Solutions, Inc., has been awarded the following patents which may be viewed online via the US Patent Office web site. Click on the title to view the entire patent at the US Patent Office web site.
System and method for facilitating multiple applications on a smart card
A system and method for facilitating the operation of multiple applications on a smart card are disclosed. One application may call another application, or leave a message for it.
6,256,690
Smart card patch manager
The present invention provides a system and method for patching ROM based programming in a smart card. By means of a ROM management record and a ROM management record address indicator, patch code downloaded to and installed in read/write memory may be used to completely replace ROM based programming code.
6,338,435
System and method for installing/de-installing an application on a smart card
A set of related routines allows an application to be securely installed on, or de-installed from a smart card or other portable token. The capabilities of a true operating system on the smart card are used to facilitate installation/de-installation.
6,390,374
Smart card memory management system and method
A system and method for memory management in a smart card are disclosed. The memory manager, preferably part of a true operating system, is the single device by which memory in the smart card is allocated and deallocated.
6,480,935
Authentication platform and related method of operation
An authentication platform comprises an authentication unit configured to authenticate the user based on received input data, and a control unit configured to enable communication between a client device and an authentication host as a consequence of successful authentication of the user by the authentication unit.
8,713,660
9,111,084Biometric Authentication System and Biometric Sensor Configured for Single User Authentication
The biometric sensor can be configured for single user authentication through an enrollment procedure in which one or more sensing parameters are adjusted based on unique characteristics of the user.
8,799,167
9,111,126
-
Company
Having a reliable company to turn to with critical questions is imperative to long-term success. We know the chips, we know the tools, and we'll make it work for you. We will guide you through the process of acquiring and configuring the proper toolsets. Once you're up and running you can keep us within reach to support your questions during ramp-up and ongoing activities. TEC provides secure on-line forum support for our customers in addition to email and telephone assistance. If you have a questions, we'll get you the answer and keep your confidentiality in place.
mail us
TEC Solutions, Inc.
1669 Hollenbeck Ave, Suite 2-202
Sunnyvale, CA 94087
E-mail: todd@tecs.com