Introduction 2 of authentication service method before transaction
Ensure setting the periods and the number of secure card transactions through credit card owner's authentication before transactions
The originality of this technology
Existing high tech security token H/W is not safe in memory hacking method etc
This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices.
Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information
The Technical competitiveness
More convenient and cost effective than current transaction connected to OTP HW.
Easy deployment with mobile certificate technology for the public
Introduction 1 of authentication service method before transaction Ensure secure card transaction through credit card owner's authentication before transaction The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 3 of authentication service method before transaction The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public