End of napkins era
Better information management
Got an idea? Note it. Thinking how to keep it secret? Encrypt it. Get all your notes on your phone protected with strong encryption. All your notes will be absolutely inaccessible by any unwanted watchers and readers. Be sure your information is kept private.
Keep it noted
Modern living makes us process tremendous amounts of information. It gets impossible to remember everything and keep it in mind. Something you do need to write and take notes. Good thing about it is that taking notes help to better organize working process and make it more effective.
Protect your notes
It is time to face the truth. Napkins are no longer an option for taking notes. Some services suggest you secure your notes and use password protection. Some services go further and offer notes encryption, e.g. you send your data over the Internet and they encypt it, as if Internet was a safe place.
Who encrypts your notes?
You are in charge of encryption
Yes, it is You who is in charge of securing your notes. Notes encryption happes right in your hands. All your data is processed on-card so not even a bit travels outside of secure environment.
Why it is different
No.1 BC: Notes application not does only use strong encryption which is launched only when you enter your PIN, but also gives you additional authorization level with passwords.
See everything yourself
How it works
No.1 BC: Notes uses hybrid encryption method and secures data with RSA-2028 in combination with AES-256 algorithm. Few quick steps below illustrate how your notes get encrypted. Your data is safe from unwanted reader, watchers or random viewer.
Launch No.1 BC: Notes
You may opt to set application password which will be requested every time you start No.1 BC: Notes. It gives you additional level of access authorization.
Every time you launch No.1 BC: Notes you need to enter your PIN to initiate data processing and access secure data.
It will load your list of notes, which is stored as encrypted piece of data.
Loading list of notes
When you enter PIN the System identifies you as the card owner and owner of encrypted data, so you are authorized to initiate decryption.
Encrypted list of notes
List of notes is stored on-card in encrypted format. To decrypt the list of notes you need to use corresponding AES256 key*.
Encrypted encryption AES key
Storing encryption keys ‘as is’ is not secure. AES key is encrypted by public RSA key. Only private RSA key matching the pair (which was generated on-card) can decrypt it.
Private RSA key decrypts required AES key, which was used to encrypt list of notes.
Private RSA key
Private RSA key is generated on-card and is never copied elsewhere. When you enter your PIN the card uses private key and decrypts required AES key
System launches decryption functions of the private RSA key** stored on-card.
AES key decrypts list of notes which is loaded on-screen.
Now you can see all your secure notes.
*Storing encryption keys ‘as is’ is not secure. AES key is encrypted by public RSA key. Only private RSA key matching the pair (which was generated on-card) can decrypt it.
**Private RSA key is generated on-card and is never copied elsewhere. It is protected by PIN.
Your list of notes
Now you can see the list of all notes you’ve created and dates when each entry was added. No.1 BC does not empose any time limits for storing notes; so basically, you can store them forever within subscription terms.
Adding a new note
Type the text you would like to keep secret and secured.
Save the note
When you are done, save the note. You will be requested to enter PIN every time you save a note.
To confirm that you are the card owner and have an intention to enctrypt some information you need to enter card PIN.
New note is encrypted with the random AES key (from step 2)
Encrypting data in some countries is illegal.
Service providers have to provide all secret keys for data decryption to Intelligence Agencies.
Random one-time key
The system generates one-time random AES-256 key, which will encrypt only the note you just created.
The System generates one-time random AES-256 key, which will encrypt just created note. Each note has own individual one-time encryption key.
Note is encrypted with randomly generated AES-256 key. Each note has own individual one-time encryption key
A pair of asymmetric keys are generated on-card. Public key is used for encryption. Private key (decryption key) stays on-card.
Entered PIN launches public key encryption. Asymmetric public and private keys, generated on-card, are activated only by PIN. Public key is used only for encryption. Private key used for decryption always stays on-card and is never copied outside of the card. Private key is stored on temper-resistant area and by no means can be extracted.
*Note title is enctrypted separately with a different encryption key.
Encrypting random AES key
Random one-time AES-256 key is encrypted with the public RSA key, which is stored on-card. Only matching private key can decrypt it.
Random one-time AES-256 key (from step 4) is encrypted with the public RSA key (from step 3).
Encrypted note and encrypted encryption key are stored by the System.
*Note title is encrypted separately with a different encryption key.
New notes entry
The latest note just appeared on top of the list. To read the note you will need to enter PIN, which initiates a chain of decryption processes similar to illustrated above.
Every time you need to add a new note, encryption process starts from begining – entering card PIN.
Every time you need to read a note decryption process starts from the very begining – entering card PIN.
Only No.1 BC offers this level of security powered by No.1 BC card. Only this approach allows to encrypt and decrypt data right in your hands without sending it somewhere on the Internet. No men-in-the-middle. No unwanted readers. Your data is safe and secured.
No.1 BC your notes
Talk to one of our sales partners. They will help to set everything up and will guide you through subscription process. They will also give you all instructions how to use it and when to renew subscription.
Unique AES key decrypts the list of notes
Private key decrypts and unlocks required ASE key
User confirmed. Initiated data decryption process.