[product advantages] 1. Convenient to operate by everyone 2. Double safety device to prevent from electrical accident : current fuse + thermal fuse (bi-metal) 3. Automatic power shutoff system to prevent the electrical accident from overheat or malfunction 4. 3step temperature control (low-mid-hi) to keep the set temperature invariably 5. Low power consumption(80w) and high heating efficiency 6. Using time (timer) : 2hr, 4hr, 6hr, automatic power set 7. Applied of infrared carbon fiber heating device : generation of even, constant and soft heat, emission of 90% infrared ray 8. Available to use with wearing shoes in office or home 9. Place to use : office, home, library, study room, sink, factory production line, etc.) [product specifications] 1. Product type : carbon fiber heating apparatus (low power consumption) 2. Cord length : body - controller : 0.6m / controller - power plug : 1.4m 3. Product size : 316 x 450 x23cm 4. Weight(set) : 1.65kg 5. Safety device : current fuse (3a) / thermal fuse(bi-metal:80c) 6. Surface temp. : hi (60c) / mid (50c) / low (40c) 7. Rating : ac 100v/220v, 60hz, 80w 8. Power consumption/hour : hi (49w) / mid (37w) / low (26w) 9. Composition : heater body, controller and power cord, user's manual, gift box
Korea cosmetics, digital cameras, electrical goods.
Valve, cable & wire, electronic component, transmitter, isolator, thermometer, hygrometer.
dietary foods, korea probiotics, postbiotics, sinbiotics, viva liver, night knight, korean fish collagen, enzyme, vhabit, sd lifescience, plabank, boyaz zavagyun, covicheck, plasma virus cleaner, solid type clo2, korean cosmetics and korean beauty pleincell, plasmapp low temperature plasma sterilizer, korea laver and seaweed, ongjin charm laver, korean medical device, korean laboratory equipment.Provide packing, transportation, clearing, insurance services are acceptable.
Mobile phones, cdma1x pc modem card, pocketpc (pda), wired/wireless pos terminals, CDMA networking equipment, hfc network equipment and services, DVR, system performance supporting software solutions.
Kitchen appliance, home appliance, sports product.
LCD / LED TV, computer monitor.
Cosmetics, Food, Electronics .
Electronic and electric equipment such as pump, motor, boiler, screw , generators machinery and equipment.
Description - It Is An Electronic Computer Which Implements Algorithms Using The Analog And Digital Signals Received From Flow Meters, Temperature, Pressure. Origin - Korea Packaging Details (w*d*h)/mm" - 200*150*200 Weight(kg) - 1 FOB ($) - " Retail Price + (Shipping Cost) " MOQ - 1set NOTE - All the product information may be changed depending on the specification.
Description - Filtration Commonly Refers To The Mechanical Operation Of Separation Of Solid Particles (contaminants) From The Fluids By Interposing A Filter Media Through Which The Fluids Pass But Solid Particles Of Targeted Sizes Do Not. Origin - Korea FOB ($) - " Retail Price + (Shipping Cost) " MOQ - 1set NOTE - All the product information may be changed depending on the specification.
DESCRIPTION - It can help easily monitor liquid flow rates for water, fuels, viscous fluids and more. ORIGIN - Korea SIZE - "PACKAGING DETAILS (w*d*h)/mm" - 200*150*200 WEIGHT(kg) - 0.5 FOB ($) - " Retail Price + (Shipping Cost) " MOQ - 1set NOTE - All the product information may be changed depending on the specification.
Introduction 2 of authentication service method before transaction Ensure setting the periods and the number of secure card transactions through credit card owner's authentication before transactions The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 3 of authentication service method before transaction The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 1 of authentication service method before transaction Ensure secure card transaction through credit card owner's authentication before transaction The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 1 of authentication service method before transaction Ensure secure card transaction through credit card owner's authentication before transaction The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
Introduction 3 of authentication service method before transaction The S2K users can safely and conveniently confirm your identity for your data of portal and Nothing can access to all of your important data such as documents, photos and videos, without a certification The originality of this technology Existing high tech security token H/W is not safe in memory hacking method etc This technology averts hackers' attempt to change maliciously original transaction data through users' smartphone devices. Even though the malignant codes are installed in users' smart phones, this S2K technology is secure from the exposure, grabbing and attack of authentication information The Technical competitiveness More convenient and cost effective than current transaction connected to OTP HW. Easy deployment with mobile certificate technology for the public
The foremost solution for protecting your PCâ??s information and for regulating your childrenâ??s computer and internet usage in order to prevent addictive behavior. 1) Service content This is a program which is executed every time the PC is turned on. You will be able to login to your PC only when you have approved of the login request from your smartphone. In other words, this is a PC login approval service. The S2K Login Technology protects your whole computer and all of the information present from being accessed by an unauthorized individual. This technology has received a GS (Good Software) Certification by the Software Testing and Certification Laboratory. 2) Service characteristics It prohibits any access to a PC without appropriate approval It allows for the user to access their PC at times when their smartphone does not have a network connection or no battery power. It has an easy UI experience that does not require a learning process. It has the potential to be implemented with powerful encryption technology such as Public Key and also Transaction Synchronized OTP It has the potential to replace the role of ID Cards.
SSH VPN allows you to securely access and connect to your company is network from an external area via the Internet, so you can use your company is email, business applications, file sharing, printer sharing, and also remote desktop connections. It also accesses the company network and connects with the gateway server which allows for connection to the company is external servers and networks. A solutions that allows for employees to gain access to corporate servers and information from remote locations outside of the company in a completely secure manner.
The product was nominated as the invention at the 46th of the invention day The product was selected as Good Design (No.3974) The product was awarded the grand prize of 'The best new technology Korea' The product was proved as the best product by Korea Standards Association(KSA) The product was broadcasted on the GS Home Shopping and selected as the popular products by customers