Skip to content
  • There are no suggestions because the search field is empty.

What inherent security features does the Troverlo software have?

Troverlo Platform Security Features

Troverlo Platform Security features are outlined in Troverlo Platform Security Brief.

Troverlo Tags Security Features

Troverlo Tags emit 802.11 compliant WiFi beacon frames in 2.4GHz spectrum only announcing their presence intended for detection by any Wi-Fi devices. Troverlo Tags do not allow any connections to be established to themselves at any layer therefore preventing any modifications to emitted beacons and Troverlo Tag software.

Troverlo Tag Readers Security Features

Troverlo Tag Readers detect 802.11 beacons emitted by Troverlo Tags and other Wi-Fi devices and report the presence of those detected devices to Troverlo Platform. Troverlo Tag Readers perform this detection reporting utilizing Troverlo Platform API. The Readers are authenticated by the platform and each detection report is authorized by the platform using reader credentials.

Troverlo Tag Readers provide management interfaces to obtain their status and statistics information and perform reboots while access to all other administrative functions provided through those interfaces is further protected using local credentials. Troverlo Platform allows for remote management of Tag Readers depending on the model of the reader utilizing proprietary authentication and authorization mechanisms.

Autonomo Security Features

Autonomo Windows application is an application installed only by privileged Administrator users for the Windows machine where the application is installed. Only Administrator users of the Windows machine can then alter the running state, update, or uninstall the Autonomo application. Autonomo application functions as both Tag and Tag Reader and contains the same security features as Tags and Tag Readers described above. Autonomo application is a headless application that does not provide any local administrative interface allowing users access only to its log files. Autonomo log files do not contain any sensitive private identifying information.

Troverlo Mobile Apps Security Features

Troverlo Mobile Apps operate on Android and IOS operating systems and devices. These apps function similar to Troverlo Tag Readers in that they detect and report surrounding WiFi devices to Troverlo Platform. The apps also provide access to customer data available at Troverlo Platform utilizing app user interface which in turn utilizes Troverlo Platform API implementing user authentication and authorization controlled by Troverlo Platform.