Critical security interface

The most damaging attacks on devices tend to be the ones that we don’t see, getting through without triggering any security response. The critical security interface can provide enhanced visibility and greater trust that ensures our government partners’ devices are operating in an uncompromised state. 

Offering continuous validation and authentication.

Our critical security interface framework operates in a deeper execution level for greater visibility and improved resilience to rootkit attacks. It provides application programming interfaces (APIs) to the mobile application platform—allowing continuous validation and monitoring of third-party apps, run-time integrity checking of devices, and continuous user authentication.  

Providing reliable threat protection when it matters most.

Our hardware-anchored continuous validation and threat protection could be used to uncover previously unseen advanced persistent threats, provide increased usability to enable a wide array of government and industry use cases, and allow organizations to quickly isolate compromised devices, eliminate malicious apps, and strengthen the user-authentication process.  

Device health

Providing TrustZone-based real-time device integrity checks. 

Behavior-based malware detection

Delivering continuous validation and monitoring of how third-party applications are operating on a device.

User Authentication

Offering continuous user authentication leveraging multiple biometric and contextual factors.

Demonstrating enhanced security to the DHS. 

Attacks on mobile devices are routinely attempted in a variety of forms, and the most damaging attacks tend to be the ones that aren’t seen until the damage has been done. In collaboration with the Department of Homeland Security (DHS), the critical security interface is engineered to showcase enhanced visibility into these types of advanced threats.  

Education

 Visit our education page to download documents, get information on past QGOV projects, learn about our tools and training, and more.

Get in touch with us.

Talk to us and see how we can help meet your mission-critical needs.

©2020 Qualcomm Technologies, Inc. and/or its affiliated companies.

References to "Qualcomm" may mean Qualcomm Incorporated, or subsidiaries or business units within the Qualcomm corporate structure, as applicable.

Qualcomm Incorporated includes Qualcomm's licensing business, QTL, and the vast majority of its patent portfolio. Qualcomm Technologies, Inc., a wholly-owned subsidiary of Qualcomm Incorporated, operates, along with its subsidiaries, substantially all of Qualcomm's engineering, research and development functions, and substantially all of its products and services businesses. Qualcomm products referenced on this page are products of Qualcomm Technologies, Inc. and/or its subsidiaries.

Materials that are as of a specific date, including but not limited to press releases, presentations, blog posts and webcasts, may have been superseded by subsequent events or disclosures.

Nothing in these materials is an offer to sell any of the components or devices referenced herein.