搜索
搜索

Core technology

Provide embedded solutions in the field of industrial Internet and industrial security

Embedded system is application-centered, based on computer technology, and can be based on user needs.Function, reliability, cost, volume, power consumption, environment and other flexible cutting software and hardware modules, to build a special computer system that meets the requirements。

Cryptography includes key generation, key management, data encryption and decryption, digital signature, identity authentication, key negotiation, file management and so on。 Mainstream operating systems such as Linux and FreeBSD are supported。

Trusted computing technology adopts the "computing + protection" dual architecture to measure and control common computing components (including common hardware and firmware, operating system, application software and services), and establish a defense mechanism against malicious code attacks from the root, so as to ensure the trust of the entire computing environment。

Yunyong Zero Trust technology adopts software-defined boundary, SDP network security architecture,Through service hiding and SPA knocking technology, fine-grained minimum authorization management, dynamic risk identification and continuous audit, and data leak protection automatic loading technology,To provide enterprises with secure and reliable network access, access control and data security management solutions。

Application scenario

Provide embedded solutions in the field of industrial Internet and industrial security

Recommended product

Provide embedded solutions in the field of industrial Internet and industrial security

Smart edge iot close
Yunyong Smart edge Internet of Things, model YG-RK001P, using Ruixin Micro RK3568 processor, four-core ARM Cortex-A55 architecture, main frequency 2.0GHz,It has the advantages of high efficiency, high performance and low cost,Support 8G memory and 64G on-board storage;YG-RK001P gateway integrates Ethernet, 4G, 5G, WiFi, LoRa, RS485, RS232, HDMI, DI/DO and other functional interfaces;4G, 5G, WiFi, LoRa and other functions adopt modular design,Function configuration is more flexible。
更多 White arrow Black arrow
Network security isolation device
The network security isolation device is a kind of network security device which is made of special hardware with various control functions to cut off the link layer connection between networks on the circuit, and can carry out safe and moderate application data exchange between networks。
更多 White arrow Black arrow
Cloud surge host security hardening system
From the perspective of ensuring the system security of server 橾, the product takes trusted computing as the basis and inter-access control as the core, and constructs a server active defense system around the three dimensions of "trusted, controllable, and manageable" to ensure server security from the source。
更多 White arrow Black arrow
Cloud Chung zero trust security management platform
Yunyong Zero trust security management platform is based on the advanced zero trust concept, that is, never trust, always verify the principle,The boundary network security architecture is defined by SDP software,Through service hiding and single-pack knocking technology, fine-grained minimum authorization management and risk dynamic identification capabilities,Through micro isolation, data leakage prevention and other means,Provide secure and reliable network access and access control,Create a platform level identity and data security control system,Focus on remote network access security,And enterprise industrial equipment north-south data access security and east-west data access security。
更多 White arrow Black arrow

News center

Provide embedded solutions in the field of industrial Internet and industrial security

2022

05 16

Yunyong Technology has more than 15 years of project experience in the construction of digital archives and smart archives, providing customers with products and services such as integrated management and control platforms, intelligent archive management equipment, and smart Internet of Things applications。

2022

04 22

April 19, 2022,在习近平总书记“419”重要讲话发表六周年到来之际,The "2021 Cyber Independent Innovation Research Report" organized by China Critical Information Infrastructure Technology Innovation Alliance was officially released at the 5th Critical Information Infrastructure Independent Security Innovation Forum。

2022

04 22

April 19, 2022,在习近平总书记“419”重要讲话发表六周年到来之际,The "2021 Cyber Independent Innovation Research Report" organized by China Critical Information Infrastructure Technology Innovation Alliance was officially released at the 5th Critical Information Infrastructure Independent Security Innovation Forum。

Business partner

Provide embedded solutions in the field of industrial Internet and industrial security

Application scenario

Contact information

Headquarters Address:

No. 16, Tai 'an Road, Hailing District, Taizhou City, Jiangsu Province

Phone Number:

0523-86083877

底部
底部
底部
底部

With information security technology as the core, Yunyong Technology is determined to become an innovator and leader in the field of industrial Internet of Things。

Copyright © 2023 Jiangsu Yunyong Electronic Technology Co., LTD. All rights reserved   Website construction: First screen technology   |   Su ICP No. 15061053-1