
unprecedented technology
We present a new paradigm
Company History
Venture company, corporate research institute Operation
Quality Certificate
Domestic and international patents
Overseas activities
· Google Play Store, Apple App Store
· ISO/IEC 27001 Information Security Management System Management
· Software Copyright Registration
· KISA Korea Internet & Security Agency Rapid Verification of Convergence New Technology
· GS Certification Grade 1
· Software Security Vulnerability Diagnosis National Authorized Examination
· Vulnerability Analysis Evaluation National Authorized Examination
· Random Key Result Verification National Authorized Examination
· Domestic patent registration
· US patent registration (algorithm class A)
· Chinese patent registration
· Japanese patent registration
· Vietnamese patent registration
· European patent registration
· Received the US Presidential Award
· Established a local research institute at Victor University in California, USA
· Invited to local headquarters of Apple, Google, and Tesla and had a technology briefing
Problem
Why are existing authentication systems so complex and difficult?
It becomes more complicated and difficult to use, such as using two-factor authentication, because other people besides me can use it.
Why would anyone else be able to use it?
First, the existing system sets a password (key value) and the user inputs it. Second, anyone other than me can use it by simply inputting it.
What if we eliminate the user input behavior itself and don't reuse key values?
Since there is no input information, the usage becomes simple, since there is no input information, others cannot even try, and since key values are not reused, hacking (theft) itself is impossible.
All existing authentication systems on the planet reuse key values, requiring users to enter key values.
Compared to Zero Trust
Zero trust security model, zero trust architecture (ZTA) describes an approach to the strategy, design, and implementation of IT systems.
The key concept of the Zero Trust security model is “never trust, always verify.”
▴ key point
Zero Trust is an approach to the strategy, design, and implementation of IT systems, not a perfect product. It is not something that is completed or finished with one installation, but rather the key is to create a secure environment.
The security environment has improved, but
Critical vulnerabilities still exist
Reuse key values
Always verify
User identification is unclear
Differences between existing authentication technology and TSID verification technology
All of the authentication technologies we are currently using are Because it is based on a "fixed value" with a "number of cases", it is highly vulnerable to hacking and theft incidents that occur daily, and if infected with malware, like the recent "SKT SIM card information hacking incident", it is easy to steal the administrator's account access rights (ID, password). However, if the nationally certified TSID non-fixed value algorithm is installed, even if any malware infiltrates and infects, it will be impossible to steal the administrator's account access rights (ID, password), so hacking and theft damage can be blocked at the source.
TSID verification technology can block hacking and theft accidents with a " non-fixed value" that has no "number of cases" at all, and "account access rights" can be used even with quantum computers. It is the world's first verification technology to obtain the "Nationally Certified Ultra-Gap New Technology Certification" by proving that it is impossible to steal .
The traditional way for a server to 'authenticate' a user
Problems managing dozens of login accounts on each site
Because it is a method of comparing and contrasting input content, sharing and theft are possible.

