SIPbiz‎ > ‎ Services


The focus of the offering, called the Cyberspace Identity System (CIS), is identity management. CIS is based on the PKI X.509 Certificate format and CRL Profile and the related Internet standards embodied in RFC5280. Like other X.509 applications, the CIS is reliable and secure, but unlike other X.509 applications, our solution is built on a decentralized architecture with distributed key system and doesn't depend on the X.509 Certificate hierarchy and therefore the CIS can scale with the size of the network.

Cyberspace Identity System enhances privacy and cybersecurity protection by
  • building trusted communities of networks based on mutually agreed connectivity and working together to exclude inappropriate membership and intruders.
  • continuously monitoring and reporting real-time security status of the access and transport of the sensitive information of each CIS identity. The security administrator may take action based on alarm status reports or depend on the monitoring applications for immediate remediation actions.
Core Competencies

Our software product offering includes:
  • Confidentiality via encryption, authentication, continuous monitoring, cloud perimeter security solutions, and VoIP security, all based on, but going beyond, federal and commercial standards.
  • Default versions of these product capabilities or tailor and adapt them to your specific needs. is platform independent and is fully capable of working with your existing solution to enhance your specific security system.
Our services include:
  • Cybersecurity professionals, Public Key Infrastructure (PKI) experts, and Java software developers:
    •  X.509 Certificate, PKCS KeyStores.
    • Java Secure Socket Extension (JSSE), SSL,TLS.
  • Software development expertise in Java Cryptography Architecture (JCA):
    • Encryption: Advanced Encryption Standard (AES) - FIPS PUB 197.
    • Key Exchange: Elliptic Curve Diffie-Hellman (ECDH) Key Agreement - NIST SP 800-56A.
    • Digital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) - FIPS PUB 186-3.
    • Hashing: Secure Hash Algorithm (SHA) - FIPS PUB 180-4