FSET’s Innovative Solution
Securing remote access to sensitive data has long been one of the biggest challenges across industries like law enforcement, healthcare, and government. Desktop-first environments weren’t quite designed with today’s mobility in mind. While they typically serve well for on-site security, the demands of modern, expansive mobile solutions require far more extensive encryption, authentication, and flexibility to prevent vulnerabilities that arise when data is accessed beyond the secure perimeter of traditional networks.
FSET has developed a patented solution that enables secure, remote access to mission-critical data for enhanced workplace mobility. By combining advanced cryptographic techniques with mobile device integration and virtual desktops, users can access sensitive databases seamlessly and securely.
How It Works
Our patented process begins with the user’s Personal Identity Verification (PIV) certificate, which serves as a secure digital identity typically stored on a token or smartcard. When the user connects their PIV-enabled token or smartcard to a mobile device via a reader, the certificate is securely captured. Instead of passing the certificate through the mobile device’s operating system, which could expose it to vulnerabilities, the system routes the certificate directly into a virtual desktop session.
The virtual desktop, hosted on a secure cloud infrastructure, becomes the user’s protected workspace. Since no sensitive data is stored on the mobile device itself, the risk is mitigated if the device is lost, stolen, or compromised. The virtual desktop serves as a secure operating environment, allowing users to access critical databases and applications while keeping sensitive data isolated from the mobile device.
The key innovation here is the certificate pass-through technology. The process ensures that the PIV certificate is securely passed from the mobile device to the virtual desktop, where it is authenticated. Once authenticated, the user is granted secure access to systems and applications.
This solution also allows users to run native mobile applications alongside the virtual desktop environment. For example, users can open and operate Android applications while simultaneously accessing a secure Windows desktop, creating a seamless workflow between mobile apps and critical desktop applications. Additionally, our system integrates with platforms like Citrix and VMware, allowing users to connect securely to any database or application.
Key Elements
- PIV Certificate Authentication: Ensures only authorized users can access sensitive data by securely passing digital certificates through mobile devices to a virtual desktop.
- Virtual Desktop Integration: Isolates sensitive data within a cloud-hosted environment, preventing exposure to the mobile device’s operating system.
- Seamless Access: Allows users to securely access systems from any location, whether law enforcement databases, healthcare records, or government platforms.
- Scalability: The system is adaptable to organizations of any size, across various industries.
- Dual-Purpose Use: Combines both logical system access and physical security for entry into secure locations, streamlining workflows.
Applications
Our patent is particularly transformative for law enforcement, where secure, real-time access to sensitive data has historically been an Achilles heel. Officers in the field can now use mobile devices to securely connect to systems like Niche RMS, enabling them to retrieve case files, run background checks, and update reports—all without needing to return to a station. The certificate pass-through technology ensures that all communications and data exchanges are protected, maintaining compliance with regulatory standards while allowing officers to stay mobile and responsive.
For example, an officer could access the virtual desktop from a patrol car or on foot, logging into the Niche RMS system with their PIV certificate securely passed through the mobile device into the virtual desktop. They gain immediate access to necessary information without exposing data to vulnerabilities. The ability to combine both logical access (system and data) with physical access (to secured facilities) through the same technology is especially beneficial in high-security law enforcement environments where officers need to move between field operations and secure premises. Our patent is the backbone of our ConnectedOfficer® solution.
The impact goes far beyond law enforcement. We’re using the same approach to enhance security and mobility in healthcare, emergency medical services, education, and other critical sectors.
Prioritizing Security, Enabling Mobility
Our MobilityFirst® strategy sets us apart by enabling secure, real-time access from any location, giving professionals the flexibility to work beyond traditional desktop setups. Many legacy solutions don’t fully support the demands of mobile environments, but with our approach, professionals across industries can access sensitive data without compromising security. Contact us today to explore a MobilityFirst strategy for your organization.