Hello Mr. Müller, you have been successfully identified

CallID

This is a familiar concept. It comes into play when you call your service provider. The first step is to identify yourself to your service provider. This is usually followed by standard security questions.

Unfortunately, those tend to be simple questions that do not meet today’s security requirements. Futhermore, this exchange takes place only once and doesn‘t provide proper authorization. The intended action cannot be completed because it‘s impossible to obtain a final confirmation of identity.

This is where we come in with Trusted Call ID and enabled pre-call authentication. You will know immediately who you are dealing with and your call can proceed on that basis.

This is a familiar concept. It comes into play when you call your service provider. The first step is to identify yourself to your service provider. This is usually followed by standard security questions.

Unfortunately, those tend to be simple questions that do not meet today’s security requirements. Futhermore, this exchange takes place only once and doesn‘t provide proper authorization. The intended action cannot be completed because it‘s impossible to obtain a final confirmation of identity.

This is where we come in with Trusted Call ID and enabled pre-call authentication. You will know immediately who you are dealing with and your call can proceed on that basis.

What are fake calls?

Fake calls are unauthorized communications. Attackers make contact using false names and false company data in order to obtain information from users.

Communication is not their primary interest. Rather, they are interested in identifying customers and stealing their security features by phishing.

Trusted CallID ensures that two-way communication is properly authenticated. Moreover, with Trusted Verify, no interaction can take place without the user’s consent.

DocSigner. Put your stamp on it with your own digital signature

DocSigner

What is DocSigner?

Our mAST technology and the underlying PKI make it possible to sign PDF documents and send them back to the appropriate back end systems. For this purpose, the relevant document is displayed in the app and the digital signature is linked using optical input. This ensures that the applicable document is actually signed by the person in question. Once the digital signature has been added to the document, the document will be transmitted. As a result, you can trace which document has been signed, who has signed it, and when.

What is DocSigner?

Our mAST technology and the underlying PKI make it possible to sign PDF documents and send them back to the appropriate back end systems. For this purpose, the relevant document is displayed in the app and the digital signature is linked using optical input. This ensures that the applicable document is actually signed by the person in question. Once the digital signature has been added to the document, the document will be transmitted. As a result, you can trace which document has been signed, who has signed it, and when.

DUAL 7 Layers of Security

Server checks the client, the Client checks the server

Secure Device
  • Security Status of Device
  • Detect OS
  • Malware
  • Device Binding
  • Rooting & Jailbreaks
Secure App & Web
  • Detect Code Injection
  • Manipulation
  • App Integrity
  • Signature
  • Whitelisting
  • SSL Hooking
Digitanium Channel
  • Own SSL/TLS Implementation
  • Independent
  • Own Trust Store
Smart Security Management Server
  • App
  • Device
  • Identity
  • Certificates (TC)
  • Signature Verification
Virtual Smart Card
  • Independent Key Stores
  • Unlocking Only By Security Server
  • Encapsulated Private Key
Trusted Identity
  • A focus on identity is an integral part of the process.
Digital Signature
  • Private/Public Key Principle
  • Signature-based Interaction
One Technology for all platforms:
Comply with the regulatory:
  • eIDAS
  • GDPR
  • PSD2

Technology

Get in Touch