USA flag logo/image

An Official Website of the United States Government

Company Information:

Name: Asier Technology Corporation
Address: 5068 West Plano Parkway
Suite 336
Plano, TX 75093
Located in HUBZone: No
Woman-Owned: No
Minority-Owned: No
URL: N/A
Phone: (972) 738-8577

Award Totals:

Program/Phase Award Amount ($) Number of Awards
SBIR Phase I $352,371.00 4
SBIR Phase II $1,728,326.00 2
STTR Phase I $65,799.00 1

Award List:

Integrated Data Compression and Security Algorithms

Award Year / Program / Phase: 2002 / SBIR / Phase I
Agency / Branch: DOD / MDA
Principal Investigator: Kevin Henson, VP CTO
Award Amount: $54,395.00
Abstract:
"Asier Technology is pleased to have the opportunity to propose a program to upgrade communications security with a proven encryption algorithm. High-speed, high-security encryption is Asier's core competency. Asier has developed a suite of highlyadvanced, processor-efficient encryption algorithms… More

Mobile Collaboration in Multi-Security Level Domains

Award Year / Program / Phase: 2003 / STTR / Phase I
Agency / Branch: DOD / NAVY
Research Institution: UNIV. OF TEXAS AT DALLAS
Principal Investigator: Kevin Henson, CTO
Award Amount: $65,799.00
RI Contact: Subbarayan Venkatesan
Abstract:
Asier will provide a collaboration tool with 2-way text messaging, file and image transfer, and limited voice capability over a secure, low-bandwidth connection.The Navy will benefit from wireless communication tools that act like a hybrid between e-mail and real time chat, storing messages, still… More

Integrated Data Compression and Security Algorithms

Award Year / Program / Phase: 2004 / SBIR / Phase II
Agency / Branch: DOD / MDA
Principal Investigator: Kevin Henson, CTO, Chief Scientist
Award Amount: $979,014.00
Abstract:
In Phase I of this SBIR, Asier conducted research to determine if telemetry data could be compressed and encrypted. Asier determined that two different types of MDA telemetry data could be compressed and encrypted in real-time (no added latency) and without damaging either the integrity or… More

Advanced Secure Supervisory and Data Acquisition (SCADA) and Realted Discribution Control Systems

Award Year / Program / Phase: 2004 / SBIR / Phase I
Agency: DHS
Principal Investigator: Kevin M. Henson, Chief Scientist
Award Amount: $99,478.00
Abstract:
The goal of this study is to attempt to place, where possible, highly efficient encryption and authentication algorithms in legacy devices already installed in the SCADA network. Where this is not possible, low cost inline security units will be proposed. On the larger scale, multi-level secure… More

Advanced Security for SCADA Systems

Award Year / Program / Phase: 2005 / SBIR / Phase II
Agency: DHS
Principal Investigator: Kevin M. Henson, Chief Scientist – (972) 738-8579
Award Amount: $749,312.00
Abstract:
This effort will seek to provide end-to-end security for America's existing critical infrastructure. Asier has gathered a broad coalition of SCADA industry leaders for this effort. Asier and its partners will demonstrate a low cost encryption / authentication firmware upgrade that can be installed… More

Computer Network Operations (CNO) for Ground-based Midcourse Defense (GMD)

Award Year / Program / Phase: 2005 / SBIR / Phase I
Agency / Branch: DOD / MDA
Principal Investigator: Kevin Henson, Chief Scientist
Award Amount: $99,806.00
Abstract:
Advanced Intelligent agents provide a tremendous benefit to the collection and analysis of information on computer networks. Unfortunaltely, intelligent agents are also susceptible to re-programming in such a manner as to cause them to mis-report, or not report at all. It is possible to intercept… More

Cryptographic Search Engines for Sharing Data Across Multiple Security Domains

Award Year / Program / Phase: 2006 / SBIR / Phase I
Agency / Branch: DOD / OSD
Principal Investigator: Kevin Henson, Chief Scientist
Award Amount: $98,692.00
Abstract:
Asier Technology is proposing an automated method for tagging, searching and sharing sensitive information across multiple security domains. This approach centers on a cryptographically enabled search engine and an automated method of adding XML meta-data to existing files to encrypting and store… More