Secure and unique email communication

Email2Push

Email is the best way to communicate with your customers. Back end systems already exist for anybody to use; however, they are not safe and companies have told their customers that use of email can be potentially harmful.

We are able to remedy these issues with our technology.

No functional changes are needed. Our Email2Push interposes a type of mail robot which takes control of emails from the mail server by transmiting them via KOBIL‘s secure Digitanium Channel.

This ensures that the message reaches the intended user who also confirms receipt instantly with just one click.

Email is the best way to communicate with your customers. Back end systems already exist for anybody to use; however, they are not safe and companies have told their customers that use of email can be potentially harmful.

We are able to remedy these issues with our technology.

No functional changes are needed. Our Email2Push interposes a type of mail robot which takes control of emails from the mail server by transmiting them via KOBIL‘s secure Digitanium Channel.

This ensures that the message reaches the intended user who also confirms receipt instantly with just one click.

Send secure messages to your app

Display Messaging

What is Display Messaging?

Viewing secure messages on an existing app is quite easy. But displaying and transmitting them safely can be challenging.

To address the issue. we have developed a method that allows us to safely transmit a message and display it accordingly.

In the following video, we introduce the method of bank publishing. To authorize transactions, the TAN is displayed in the same app via secure display.

What is Display Messaging?

Viewing secure messages on an existing app is quite easy. But displaying and transmitting them safely can be challenging.

To address the issue. we have developed a method that allows us to safely transmit a message and display it accordingly.

In the following video, we introduce the method of bank publishing. To authorize transactions, the TAN is displayed in the same app via secure display.

ATM alerts - be informed about every interaction

ATM Security

What are ATM Alerts?

Skimming is still a very common form of attack on users. Although many countries already use Chip & PIN, the traditional method of reading the magnetic stripe is still very common.

This method is no longer safe and can be copied by attackers with very little effort.

One way to protect customers is to always have each cash dispensing transaction confirmed through a final release from the user. In the event of a cash withdrawal, Core Banking sends a release request to the account holder who must release the payment. If this is done, the ATM process will complete.

What are ATM Alerts?

Skimming is still a very common form of attack on users. Although many countries already use Chip & PIN, the traditional method of reading the magnetic stripe is still very common.

This method is no longer safe and can be copied by attackers with very little effort.

One way to protect customers is to always have each cash dispensing transaction confirmed through a final release from the user. In the event of a cash withdrawal, Core Banking sends a release request to the account holder who must release the payment. If this is done, the ATM process will complete.

About Skimming

Skimming is a man-in-the-middle attack whereby data is fraudulently gleaned from credit cards or bank cards. „Skimming means card data is illegally obtained by reading data from magnetic strips and copying it onto counterfeit cards“.[1] The counterfeit card is then used for withdrawals or payments at the expense of the lawful cardholder.

KOBIL Trusted Notification helps you to protect yourself from these types of attacks.

Relinquish control ;-)

Family Protection

What is Family Protection?

Do you own multiple credit cards or would you like to provide a credit card for your children? Then you should consider real-time monitoring. You will receive information about every purchase, preventing the card from being maxed out.

Optionally, this can also be combined with a final release which means that the transaction will not be approved until a final confirmation has been recceived from you.

This is a practical solution for families that empowers children to learn how to handle money while keeping parents in control at all times.

What is Family Protection?

Do you own multiple credit cards or would you like to provide a credit card for your children? Then you should consider real-time monitoring. You will receive information about every purchase, preventing the card from being maxed out.

Optionally, this can also be combined with a final release which means that the transaction will not be approved until a final confirmation has been recceived from you.

This is a practical solution for families that empowers children to learn how to handle money while keeping parents in control at all times.

Information about Point of Sales

The point of sale (POS) or point of purchase (POP) refers to the time and place where a retail transaction is carried out. At the point of sale, the merchant calculates and indicates the amount owed by the customer, (optionally) prepares an invoice for the customer (could be a cash register printout) and informs the customer of payment options. At this point, the customer also makes a payment to the merchant in exchange for goods or after provision of a service. Upon payment, the merchant may issue a printed or electronic transaction receipt.

DUAL 7 Layers of Security

Server checks the client, the Client checks the server

Secure Device
  • Security Status of Device
  • Detect OS
  • Malware
  • Device Binding
  • Rooting & Jailbreaks
Secure App & Web
  • Detect Code Injection, Manipulation
  • App Integrity
  • Signature
  • Whitelisting
  • Certificate PIN
  • SSL Hooking
Digitanium Channel
  • Own SSL/TLS Implementation
  • Independent
  • Own Trust Store
Virtual Smart Card
  • Independent Key Stores
  • Unlocking Only By Security Server
  • Encapsulated Private Key
Trusted Identity
  • A focus on identity is an integral part of the process.
Digital Signature
  • Private/Public Key Principle
  • Signature-based Interaction
One Technology for all platforms:
Comply with the regulatory:
  • eIDAS
  • GDPR
  • PSD2

Technology

Get in Touch