Please click here to check who's online and chat with them.

Authentication Software

Supplier From South Korea (Republic Of Korea)
May-16-17

Introduction 3 of authentication service method before transaction

The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification

The originality of this technology

Existing high tech security token H/W is not safe in memory hacking method etc

This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.

Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information

The Technical competitiveness

More convenient and cost effective than current transaction connected to OTP HW.

Easy deployment with mobile certificate technology for the public


Recent User Reviews

This user has not received any reviews yet!

Verification Status


 
 
Contact Supplier
Renew

More Items Similiar to: Authentication Software

Oct-11-10

Dialmantra

$300
MOQ: Not Specified
 
Complete gui based interface and operation
Predictive dialing
Answering machine detection (upto 90%)
Music on hold
Voice recording and retrieval
Crm
Three-way calling
Call back scheduler
Complete software based solution
Call snooping
Call barging
Live monitoring
Agent quality management
Web based reporting query engine
Call history
Simultaneous inbound/outbound calling
Local and remote call agents
Call detail records
Authentication
Call queuing (inbound)
Web-based administration
Multiple campaigns and lead sets
Full featured a.C.D.
Powerful reporting
Web control panel
Realtime queue stats (inbound)
Call parking
Conference bridge
Blind transfer
Call forward on no answer
Multiple voip gateways
Call hunting
Call conference
Call transfer
Voice mail
Call forwarding
Barge in
Admin console
Use as intra office pbx
Use as ip pbx
Use as multilocation
Compatible with e1
Campaign selection while sign in for multiple campaigns
Script integration
Campaign wise crm pop up and scripting
Campaign wise dispositions
Tpv or third party verification
Hold or unhold self-other-self or away
Call scheduling
Agent call transfer
Remote login
Oct-10-22
 
The Xeon Phi 7290 1.5 GHz Processor from Intel is a 72-core processor with a maximum memory capacity of 384GB (dependent on memory card). It features an Intel AES-NI instruction set that enables fast and secure data encryption and decryption. AES-NI is useful for a range of cryptographic applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption. Idle state (C-state) saves power when the processor is idle, while the thermal monitoring technologies protect the processor package and the system from thermal failure. The Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.
Oct-10-22
 
The Xeon Phi 7230 1.3 GHz Processor from Intel is a 64-core processor with a maximum memory capacity of 384GB (dependent on memory card). It features an Intel AES-NI instructions set that enables fast and secure data encryption and decryption. AES-NI is useful for a range of cryptographic applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption. Idle state (C-state) saves power when the processor is idle, while the thermal monitoring technologies protect the processor package and the system from thermal failure. The Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.

Verification Status