Home

TECHNOLOGY

Scroll

IoT security solution

AEGIS_Mutual authentication security solution
AEGIS is an IoT-based device authentication solution that uses blockchain.
Blockchain is applied to mutual authentication method required during the recognition process between IoT devices / device and user.
CHARACTERISTICS
IoT Device 보안

IoT device security

IoT  
	                				Data 통합

IoT data integration

Bigdata 분석 활용

Utilizing big data analysis

IoT Device 간 e-currency 결제

E-currency payment
between IoT devices

Blockchain data security authentication
benefits
Allows verification between specific devices by applying blockchain P2P authentication algorithm to IoT.
Data society
Decision-making in accordance with the rules defined in each device
Customized control service using smart contract
Low cost with robust security
Blockchain technology applied to mutual authentication process
Impossible to modify mutually approved addresses
Reliable communication system
between devices
Reliable service connection through combination of public & private keys
Various services available
applied service
AEGIS is applied to the following DoubleChain service :

Consensus algorithm

ePoW_PoW based on equitable chance and energy-saving
Block window module consisting of consensus algorithm to prevent mining monopoly.
Patent no.: 10-1827373
CHARACTERISTICS
Fair miningopportunities

Fair mining opportunities

Equitable mining distribution

Equitable mining distribution

Efficient use of energy for mining

Efficient use of energy for mining

benefits
ePoW consensus algorithm prevents energy waste due to excessive computing power input from intensive mining competition and aims for fair mining opportunity.
Prevents waste of energy
Block window concept applied
A successful mining node is idle during the block window period
Creates healthy mining environment
Prevents mining monopoly
Motivates other mining nodes to participate
Network distribution and scalability
ASIC-resistant Lyra2Rev2 algorithm applied, giving more opportunities to larger number of nodes
Mining network scalability
applied service
ePoW is applied to the following DoubleChain service :

Virtual account platform

EVA_Enterprise virtual account
A fintech platform supporting virtual account system (virtual banking system).
CHARACTERISTICS
Virtual account with deposit and withdrawal (synchronized with existing bank account))

Virtual account with deposit and withdrawal functions
(synchronized with existing bank account)

Provides currency charging and exchange rate calculation function

Provides currency charging and exchange rate calculation function

Provides bank transfer/deposit code issuance function

Provides bank transfer/deposit
code issuing function

Provides Rest API for B2B and B2C services

Provides Rest API for B2B and B2C services

benefits
EVA platform supports secure virtual account payment services for cryptocurrency transactions.
User-centric payment ensures secure consumption
Minimizes steps when providing sensitive financial information
Distributed management of payment information
Minimizes information leakage if hacked
Independent ecosystem configurable according to service
Controlling the use/management range according to service
Direct interaction of each node, service independence
Ensures data integrity using blockchain
Encoding transactions between nodes and recording them in a blockchain
Safe settlement without any third parties
applied service
EVA is applied to the following DoubleChain service :

Security authentication system

Private security authentication system based on blockchain
Security authentication solution that combines Quantum Random Number (QRN) and data security mutual authentication method based on blockchain.
Patent no. : 10-1887964
CHARACTERISTICS
Robust security

Robust security

Wide application

Wide application

Appropriate migration

Appropriate migration

Latest technology applied

Latest technology applied

Private security authentication
benefits
Based on blockchain, security services that are customized to each online services and functions are provided.
QRN generation and data security mutual authentication
Impossible hacking with invisible one-time password
Enhanced security with blockchain technology
Used for online services
Can be used in various online services
Can be applied to various functions such as login, registration, certificates, payment etc.
Optimized and constantly operational
Customized to the characteristics and environment of various services
Always running while using the service and sends notification when hacking detected