• Security


    Vulnerability Assessments
    Designing systems takes experience and focus. All components of the system must follow a common design goal. We can design the complete enterprise or a specific component to interoperate with the rest of the enterprise.

    Secure Embedded

    Secure Embedded Systems
    We have been building mission critical systems for over a decade. We've also designed and developed highly secure embedded technology and systems. Or expertise in smart card technology is evidenced by patents already awarded for our designs.

    Security Surveys

    Industrial Security Surveys
    We can prepare a survey for your specific environment or we can also perform the survey. Don't wait until after a big issue to kick yourself for not taking security threats seriously. Think of how easily you could lose everything if a hacker entered your computers or bypassed your physical security.

    Security Audits
    Designing a secure system begins with an audit of the existing system and process. Even if you plan to have your internal team do the development, we are available to perform an independent analysis of your security systems and processes.

    Computer Forensics
    Recover lost data, understand why a system crashed, or simply unerase a deleted file. There are tools available that help, but when those don't work, give us a call. If it is for a legal matter, don't touch the systems yourself – we understand how to collect, preserve, and present evidence.

    Smart Card

    Smart Card Systems
    We will design and build you a smart card application tailored to your exact specification. We can provide pre-built applications for many standards or develop to your standard. In many cases, we are able to develop a card that will co-exist with your existing system.

  • Development


    databases

    Databases
    Customized database design, development, and maintenance. Proficient with Oracle, SQL Server, My SQL, Postgres, 4D, and others. Proper architecture will results in a well operating and maintainable database.

    plug in

    System Architecture
    Proper design is imperative to a successful project. We have many years of experience designing embedded and large enterprise systems. We can review your architecture, work with you to refine it, or build you a solid architecture to your specific requirements.

    Special
    If you can describe it, we can spec it and build it. No reason to learn engineering – that's our job. You think of the idea and describe it as best you can. We'll work with you to make it real.

    small systems

    Small Systems
    Complex functionality targeted at very small computing devices. Small devices don't need to do small things. We do very complex things in small devices, and have the Patents to prove it. Describe your needs and we'll point you to the best components.

  • Development

    Additional Services

    From secure network devices to access control, we know how it works, and we will make it work for you.

    databases

    Databases
    Customized database design, development, and maintenance. Proficient with Oracle, SQL Server, My SQL, Postgres, 4D, and others. Proper architecture will results in a well operating and maintainable database.

    Plugin Development
    Customized plug-in design and development for 4th Dimension. If the 4D language can't meet your needs, we can build you that high performance plugin that meets your exact operational and performance requirements.

    Small Systems
    Complex functionality targeted at very small computing devices. Small devices don't need to do small things. We do very complex things in small devices, and have the Patents to prove it. Describe your needs and we'll point you to the best components.

    Special
    If you can describe it, we can spec it and build it. No reason to learn engineering – that's our job. You think of the idea and describe it as best you can. We'll work with you to make it real.

  • patents

    Todd Carper, President of TEC Solutions, Inc., has been awarded the following patents which may be viewed online via the US Patent Office web site. Click on the title to view the entire patent at the US Patent Office web site.

    System and method for facilitating multiple applications on a smart card
    A system and method for facilitating the operation of multiple applications on a smart card are disclosed. One application may call another application, or leave a message for it.
    read more 6,256,690

    Smart card patch manager
    The present invention provides a system and method for patching ROM based programming in a smart card. By means of a ROM management record and a ROM management record address indicator, patch code downloaded to and installed in read/write memory may be used to completely replace ROM based programming code.
    read more
    6,338,435

    System and method for installing/de-installing an application on a smart card
    A set of related routines allows an application to be securely installed on, or de-installed from a smart card or other portable token. The capabilities of a true operating system on the smart card are used to facilitate installation/de-installation.
    read more
    6,390,374

    Smart card memory management system and method
    A system and method for memory management in a smart card are disclosed. The memory manager, preferably part of a true operating system, is the single device by which memory in the smart card is allocated and deallocated.
    read more
    6,480,935

    Authentication platform and related method of operation
    An authentication platform comprises an authentication unit configured to authenticate the user based on received input data, and a control unit configured to enable communication between a client device and an authentication host as a consequence of successful authentication of the user by the authentication unit.
    read more
    8,713,660
    read more
    9,111,084

    Biometric Authentication System and Biometric Sensor Configured for Single User Authentication
    The biometric sensor can be configured for single user authentication through an enrollment procedure in which one or more sensing parameters are adjusted based on unique characteristics of the user.
    read more
    8,799,167
    read more
    9,111,126

  • Company

    Having a reliable company to turn to with critical questions is imperative to long-term success. We know the chips, we know the tools, and we'll make it work for you. We will guide you through the process of acquiring and configuring the proper toolsets. Once you're up and running you can keep us within reach to support your questions during ramp-up and ongoing activities. TEC provides secure on-line forum support for our customers in addition to email and telephone assistance. If you have a questions, we'll get you the answer and keep your confidentiality in place.

    mail us

    TEC Solutions, Inc.
    1669 Hollenbeck Ave, Suite 2-202
    Sunnyvale, CA 94087

    E-mail: todd@tecs.com