Tech Offer/Tech Need
Select

Technology Offers ( Infocomm - Security & Privacy )

Highly Secure 3-Factor Voice Authentication and Signature

This technology is a patented 3-factor in 1-touch Voice-Biometric solutions for Secure Authentications and Voice E-Signatures.It is an...

Read More

GPS Security Tracking for Supply Chains

With the rise of new threats to cargo security, it is becoming increasingly important for companies to deploy electronic cargo tracking solution in their...

Read More

Method to Prevent Information Leakage in Information Dispersal

Information Dispersal Algorithm (IDA) can be used to secure data stored in the cloud, as an alternative to encryption. By dispersing data...

Read More

LDPC Codes for Storage System

Ahighly reliable storage system achieved by low spatial, computation...

Read More

Intelligence Reconstruction Gear OS (IRGO) and and Real-Time Packet Reconstruction Technology (RTPR) for Cyber Security & Intelligence

The marketplace requires a breakthrough network packet forensics...

Read More

Cloud Network Access Control

Harness the Power of the Cloud to Make Managing Your Network Security Easier than Ever. No more unknown, unmanaged, unsecured devices in your network. Device platform...

Read More

Lip Password: Double Security System for Identity Authentication

The use of biometric data such as fingerprints to unlock mobile devices and verify identity at immigration and customs counters are...

Read More

Mobile Ethereum Wallet and Messenger with Machine-Learning Security

Electronic ethereum address, which is now a very complex number, is difficult to use by ordinary users and is not safe from hacking...

Read More

Blockchain for e-Mail and Document Security

In most organizations, the e-mail represents on the one hand one of the most difficult to track attack vectors, and on the other hand both attachments and e...

Read More

Pages