top of page

WE PRESENT A NEW PARADIGM

456.png

About

Time Sync IDentification

Designed to eliminate login information for the digital vulnerable, such as the elderly and the disabled, who cannot remember their IDs and passwords and have difficulty entering them

Established as the Telecommunications Technology Association(TTA)

Software Quality Certificate
GS Grade 1

Get

President of Korea Internet & Security Agency (KISA)

 

 

Convergence New Technology

 

Get

Software Security Vulnerability Diagnosis National Authorized Examination

TTA

No bonding

Vulnerability Analysis Evaluation National Authorized Examination

TTA

No bonding

Main Service

Try installing the TSID app on your smartphone

World's First International Patent Identification Proof Technology

There is no login information (ID, PW), so you don't have to memorize it site by site, device by device. Experience it now

Download on the App Store
Get it on Google Play
IMG_1194 2.jpg
IMG_1193 2.jpg
IMG_1198.jpg

Company History

Global IT Big Tech Company Technology Meeting / Patent

스크린샷 2025-10-13 오후 3.23.32.png

Apple, Google, Tesla

Invitation to local headquarters and technical briefings

image.png

U.S. Presidential Award Wins Local Research Institute

Joe Biden Wins Presidential Award

University of California, United States established a local laboratory

image.png
image.png
image.png
image.png

Domestic and foreign patent registration

Domestic patents, U.S. patents (Algebra A grade), and Chinese patents

Japanese Patent, Vietnamese Patent, European Patent Registration

Continuous R&D investment and test verification

스크린샷 2025-10-14 오전 10.50.55.png
스크린샷 2025-10-14 오전 10.51.13.png
무제.png

" TSID non-taxable key value " duplicate generation" ( duplicate generation

Test item

Measurement indicators

Result

Random key duplicate issuance measurement

○ Criteria: Check for duplication within the random key generation result 10 million times through generation code

○ calculation formula: X = ( ∑(1 - Ai / Bi) ) / n

   - Ai : ith duplicate key count 
   - Bi : ith number of random keys generated       - n  : Number of iterations

X = 1.0 (No redundancy)

No duplicate test results

Evaluation Agency - TTA

Software Security Weakness - Defect Action Completed

Vulnerability Analysis, Assessment - Vulnerability Action Completed

image.png
image.png
다운로드 (6).png
다운로드 (5).png

ISO/IEC 27001 Information Security Management System Management

GS Certification Grade 1

다운로드 (7).png
다운로드 (7).png

KISA Korea Internet & Security Agency Rapid Verification of Convergence New Technology

venture company

News

What the Press Says About TSID

Partner

What the Press Says About TSID

스크린샷 2025-06-20 오후 2.37.10.png
다운로드 (5).png
스크린샷 2025-06-17 오후 4.16.29.png
다운로드 (8).png
스크린샷 2025-05-30 오후 2.58.38.png
스크린샷 2025-04-02 오후 3.01.14.png
스크린샷 2025-04-02 오후 3.00.56.png
thsgoqhgja.PNG
다운로드.png
다운로드 (1).png
Ca_victor.png
다운로드 (13).png
KakaoTalk_Photo_2025-03-26-16-42-31.png
KakaoTalk_Photo_2025-03-27-11-47-25.png
다운로드 (3).png
다운로드.jpg
스크린샷 2025-09-16 오전 11.18.18.png
다운로드 (9).png
다운로드 (10).png
다운로드 (6).png
image.png
bottom of page