Page 10 - FNSV_Catalog_01_211213
P. 10

The Solution                                                                            BSA


















                                  01                    Developed by FNS Value Co. Ltd (Korea), G-CCS (BSA) is certified by the Korean government




                                                        (Certificate of Software Quality) and deployed with more than 1 mil users in Korea.







                                  02                    In the process of global product security certification by Cyber Security Malaysia (CSM)



                                                        for ISO/IEC 15048 Common Criteria (CC).







                                  03                    Passwordless




                                                        No passwords required or stored in the server to eliminate the risk of stolen passwords.







                                  04                    Tokenless – One Time Security Key (OTSK) a volatile runtime key is created for each transac-




                                                        tion and distributed for multiple verification process using blockchain by randomly selected


                                                        multiuser credentials with separate authentication to prevent hacking.






                                  05                    Authentication process is completed within 3 seconds with at least 2FA and 3-layers




                                                        of security encryption in 8-step process of verification.



                                                        First Layer : Biometric or Icon identity as the key to validate ownership of the device.

                                                        Second Layer : A unique code generated by the user’s device and the server makes it virtually impossible

                                                                                  for a remote hacker to replicate.

                                                        Third Layer : A One Time Security Key (OTSK) is generated using unique key generated in the second layer,

                                                                              distributed and validated with multiple users using block-chain verification technology.






        10
   5   6   7   8   9   10   11   12   13   14   15