Keystroke encryption coming for Apple, Android phones

Developers looking to help make government phones more secure have a new arrow for their quiver with the announcement that the popular GuardedID software used to protect desktop computers is moving to mobile phones as a software developers’ kit. The SDK will allow developers to create products that can prevent keylogging and other malicious snooping programs from infecting phones.

GuardedID works on the desktop by encrypting each keystroke that a user types. That encrypted data is then sent through a unique path set up by the program to the browser, where it is unencrypted. Any keylogging programs that have been installed by hackers are thus sitting along routes that the data isn't taking anymore and would have to deal with the encryption even if they were able to intercept the click. The new mobile developer kit would allow companies to create products that can do the same thing for smartphones.

The SDK is being deployed by StrikeForce Technologies, a company that specializes in cybersecurity solutions for the prevention of data breaches and theft. The kit will work for both Apple iOS and Android phones and is being called GuardedID Mobile.

"We are very excited about having the Apple and Android developer community build our one-of-a-kind keystroke encryption technology into their mobile applications," said Mark L. Kay, CEO of StrikeForce. "Keystroke encryption is an extremely critical security technology which plays a major role in preventing the most widespread malware from stealing confidential information from mobile devices." 

StrikeForce is hopeful that its success in protecting desktop computers will translate into the mobile market.

GuardedID for Windows has had more than 6 million downloads, Kay said, and the company also has released a new beta version for Macs.  He said the company is targeting GuardedID Mobile particularly for use in government, health care and banking.

About the Author

John Breeden II is a freelance technology writer for GCN.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.