Introduction 1 of authentication service method before transaction
Ensure secure card transaction through credit card owner's authentication
before transaction
The originality of this technology
Existing high tech security token H/W is not safe in memory hacking method etc
This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.
Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information
The Technical competitiveness
More convenient and cost effective than current transaction connected to OTP HW.
Easy deployment with mobile certificate technology for the public
Supplier: Security software
Services:
Supplier: Computer software, CCTV camera, IP camera
Supplier: Computer security software
Buyer: Computer security software
Supplier: System security software, robots
Supplier: Software
Supplier: Mobile Phone , Laptops , Desktops , Cctv Cameras , Cat6 Wire , Ram
Services: Broker
Supplier: Products include fingerprint locks, fingerprint time & attendance systems, payroll software, time attendance software, fingerprint access control systems, electronic safes, fingerprint modules & usb fingerprint scanners, automatic boom barriers, turnstiles, parking solutions, gps vehicle tracking systems, cctv cameras, digital video recorder, dvr, showroom anti-theft systems, handheld metal detectors, door frame metal detectors, rfid based attendance & access control solutions, home security systems & other accessories
Buyer: CCTV camera (IP & AHD), NVR & DVR, audio door phone, attendance machine, access control systems, video door phone, electronic lock