H-TOKEN GERONIMO Overview

The H-Token Geronimo looks deceivingly simple, just like any standard USB device. Under its hood, however, this token is packed with powerful electronics and components, making it one of the most versatile and powerful security devices in the market. The internal smart card is secured against DPA/SPA attacks and supports encrypting the H-Token Middleware channel used by the applications accessing the device.

The H-Token Geronimo allows storing data on its multi-partitioned flash in CD-ROM, Read-Only, Read-Write, Encrypted or Hidden (raw access) mode. When required, this token can be also used a SSCD device for legally binding, non-repudiation tasks.


Back to Top

Specifications

  • Capacity: 512MB (default), 1GB-4GB
  • Multi-partitioned Flash (CD,R/O,R/W,E,H)
  • AES-256 CBC hardware encryption
  • Anti-Tampering Protection
  • Cryptographic Smart Card Chip (EAL 4+)
  • Bus/Memory encryption
  • Secured against DPA/SPA attacks
  • USB 2.0, CE, FCC, RoHS






Back to Top

Why Secure Browser?
Window Overlay and Event Emulation
Social Engineering & Interface Manipulation
Static Code Dumping & Patching
Dynamic Code Dumping And Patching
Screen Capturing
mTan & OOB Methods
Keystroke and Event Emulation
Keystroke and Mouse Logging
PDF Form Spoofing
Session Hijacking

Videos

Successful hacking always leverages flaws in both the underlying technology as well as in our understanding of the transaction process. The short videos provided in this section try to fill this gap by describing how typical e-banking sessions are hacked and the key vulnerabilities exploited in each case.

We'd love to hear from you: let us know if you experienced any of such attacks and if you have any others to report.


Back to Top

Resources

Achieving good practical security requires the collaboration of informed users: basic knowledge of online security practices can go a long way to avoiding the majority of online frauds. Here you can find some resources of growing complexity to guide you through what our products do and why they provide outstanding practical security.

Back to Top

Hardware Specifications

Size 66mm x 19mm x 7mm
Weight 11g
Operation Temperature 0°C - 40°C
Storage Temperature -10°C - 70°C
Operation Humidity 30% - 80%
Storage Humidity 20% - 93% (40°C)
Sequential Read Rate 8 MiB/s
Sequential Write Rate 5 MiB/s
Memory Endurance 5000 Program/Erase Cycles
Data Retention JEDEC comlpiant

Back to Top

Testimonials from our Partners & Customers:

Your products gave me the peace of mind I needed to believe that Internet can still be
a safe place for our business. James Cooley, COO (UK)

The EISST team is the best I have interacted with and your support is excellent.
Jayakaran Paul, Technology Risk Manager, (UAE)

...no other solutions and products can match the range and strength of your protection
mechanisms. Compass Security Audit (CH)

Doing out of band transaction verification with your device provides our most valued
customers with the level of service and security they expect. Hans Bloch, CISO (FR)

Your products provide state of the art protections without losing sight of the need to
keep security usable. James Polster, CISSP (USA)