BEST POWERFUL SECURITY SOLUTION

WE MAKE GOOD

WHAT WE VALUE ?

PROFESSIONAL

We have assembled a world class team of experienced engineers, prominent researchers, system designers, and ninja coders. They are ready to build the best possible service for you.

FOCUS

Our team focus on the most cutting edge researches in system design and reliability analysis. We seriously think about how to build a more secure and robust kernel for modern devices, how to mitigate the instantaneous traffic surge of a data network, how to ensure the security of a sophisticated system interoperability, how to minimize the impact of side-channel power analysis to embedded hardware, and so on, to name a few.

CONFIDENTIAL

Our highly secured products in the form of device or system are your ultimate choice to protect your data from any type of known or unknown attack. By the mean time, the reliablity and stability are always in the highest priority of our system design consideration.


OUR PROJECTS

WHAT WE DO ?
Read More ››

CHEREB

CHEREB is a FLOSS( free/libre open source) based defensive security solution.

Its main objective is to provide a total solution from the angle of fundamental security ecosystem, in order to build an unified platform to enable system convergence by applying the core concept of security by design.

We provide open source consulting solution for data center based on Debian, e.g: Automation, High Availability, Virtualization, Cluster Storage etc. Debian GNU/Linux is a community-driven distro with numbers of high quality packages.

Based on the progress of PaX / Grsecurity, a huge amount of effords have been devoted from the aspects of compiler security, kernel level protection, TEE, standard library and framework security, vulnerability analysis, threat intelligence analysis and assessment, operational security, best practice of system deployment process, scenario analysis, and system design, to implement an optimized secure ecosystem.

The ecosystem provides a glueing logic platform to converge servers, clients, mobile terminals, IoT nodes and gateways, and interoperability devices, by the mean time to ensure the security of the entire ecosystem.

The security by design approach of the new ecosystem not only accelerate the system deployment process, but also mitigate the risk from design to production, which is liable to induce a huge amount of a variety forms of losses.

In addition, it is undoubtedly a stimuli to increase the time to market of an individual product, subsystem, system, or ecosystem from all the perspectives.

The symbolic meaning of CHEREB is about the adoption of an excalibur to cut off all the unauthorised or informal path between the god (kernel) and human being (application).

Read More ››

Gemini

Gemini is targeted to provide a comprehensive system-wise wireless security solution.

In general, majority of so-called wireless security solutions are just some kind of "distributed solutions" that only provide some level of application specific protection to clients, servers, and clouds, respectively.

Hence, the issues of system level interoperability are usually overlooked.

The core executive level of Gemini is based on a huge amount of real data being recorded in real-live environment.

The data is undoubtedly the most valuable source to reflect the almost real-time security trend and threat intelligence, after having big data analytics (BDA) and deep machine learning processes.

On the other hand, it is possible to provide strong encrypted link and cloud-based sandbox features in order to ensure the security by strengthening the communication channel and predicting malicious behavior.

Gemini can be easily deployed in different environments, without any code level modification and re-compilation.

The template based design method should be the most effective way to accelerate the time to market of any kind of system design.

ABOUT US

WHO WE ARE ?

INTRODUCTION

Guangzhou TYA Information Technology Co., Ltd. is the first China Company offering contemporary system design services for all kind of digital-based solutions, range from an individual product to a full-integrated solution. The scope of the application domain will cover fundamental science and technology, engineering, modern software and hardware implementation methodology, small form factor approach, advanced communication, and futuristic service-oriented platform in providing seamless convergence of technology to the human’s daily life. On the other hand, security issues are extremely emphasized in all the aspects of our design and implementation processes. Our team members are coming from a wide variety of background, from conventional digital security, hardware solution, system design, and telecommunication. The core team members are comprised by top tier scientists in telecommunication system, prominent researchers in infrastructure security, hardware design experts, and ninja-level security analyst.

CONTACT US

OUR SERVICES

We provide system design services in the form of consultation, solution provider, on-site technical support, intellectual properties (IP) management in terms of patent / copyright / licensing, OEM / ODM, and etc. For those who are looking for a tailor-made solution in a special topic or due to a very special reason, we can assign appropriate expert(s) in assisting to complete the project accordingly. We expect any other forms of collaboration between you and us.

KEEP IN TOUCH

HOW TO CONTACT US ?

E-Mail

mail#tya.email

TEL

08620-38551260

ADDRESS

1020-1024 (Level 10) Poly Clover Office Building, 406 Huasui Road, Tianhe District, Guangzhou City, Guangdong Province, China