HOME
*





SlickLogin
SlickLogin was an Israeli start-up company that developed sound-based password alternatives. The company's goal was to enable end users to log in easily to password-protected websites by using a uniquely generated sound. The company was founded by Or Zelig, who served as the firm's CEO, Eran Galili, CTO, and Ori Kabeli, VP of R&D. They were recent graduates of the IDF's elite cyber-security unit-security unit and spent over six years working on information security projects. In February 2014, Google announced the acquisition of the company. SlickLogin used various protocols to start verifying your phone's position: WiFi, Bluetooth, NFC, visual markers like QR codes, and GPS. Their self-dubbed "secret sauce" was the use of uniquely generated sounds intentionally made inaudible to the human ear. The user's computer played sound through speakers, while a mobile app used the device's built-in microphone to pick up the audio, analyze it, and send the signal to the site's server ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Google Acquisitions
Google is a computer software and a web search engine company that acquired, on average, more than one company per week in 2010 and 2011. The table below is an incomplete list of acquisitions, with each acquisition listed being for the respective company in its entirety, unless otherwise specified. The acquisition date listed is the date of the agreement between Google and the acquisition subject. As Google is headquartered in the United States, acquisition is listed in US dollars. If the price of an acquisition is unlisted, then it is undisclosed. If the Google service that is derived from the acquired company is known, then it is also listed here. Google itself was re-organized into a subsidiary of a larger holding company known as Alphabet Inc. in 2015. , Alphabet has acquired over 200 companies, with its largest acquisition being the purchase of Motorola Mobility, a mobile device manufacturing company, for $12.5 billion. Most of the firms acquired by Google are based in the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SilverPush
Silverpush is a Singapore based marketing technology provider. The company was founded in September 2012, by Hitesh Chawla. After starting push notification advertisement in 2013, it launched India's first DSP platform in 2014. The company is backed by IDG Ventures, Palaash Ventures, Fabrice Grinda, K.Ganesh, 500 Startups, M&S Partners and Freak Out Inc, Japan. Silverpush's in-video context detection platform uses artificial intelligence and computer vision to accurately identify in-video contexts, including logos, faces, objects, actions, and scenes, to enable contextual video ad placements in line with content users are actively engaging with. And its brand safety platform uses in-video context detection to contextually filter out harmful and irrelevant content. Offering brands, a suitable video environment, surpassing traditional measures like keywords blacklist, whitelisted channels and more. Products * In April 2019, Silverpush introduced Parallels, an ad sync technolo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Password
A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the ''claimant'' while the party verifying the identity of the claimant is called the ''verifier''. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity. In general, a password is an arbitrary string of characters including letters, digits, or other symbols. If the permissible characters are constrained to be numeric, the corresponding secret is sometimes called a personal ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Near Field Communication
Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 cm (1 in) or less. NFC offers a low-speed connection through a simple setup that can be used to bootstrap more-capable wireless connections. Like other " proximity card" technologies, NFC is based on inductive coupling between two so-called antennas present on NFC-enabled devices—for example a smartphone and a printer—communicating in one or both directions, using a frequency of 13.56 MHz in the globally available unlicensed radio frequency ISM band using the ISO/IEC 18000-3 air interface standard at data rates ranging from 106 to 424 kbit/s. The standards were provided by the NFC Forum. The forum was responsible for promoting the technology and setting standards and certifies device compliance. Secure communications are available by applying encryption algorithms as is done for credit cards and if they fit the c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Software Companies Of Israel
Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists of machine language instructions supported by an individual processor—typically a central processing unit (CPU) or a graphics processing unit (GPU). Machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. For example, an instruction may change the value stored in a particular storage location in the computer—an effect that is not directly observable to the user. An instruction may also invoke one of many input or output operations, for example displaying some text on a computer screen; causing state changes which should be visible to the user. The processor executes the instructions in the order they are provided, unless it is instruc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Near Sound Data Transfer
Near Sound Data Transfer (NSDT) is a sound-based mobile transaction technology developed and patented by Tagattitude since 2005. NSDT uses a one time password sent through the audio channel of a mobile device to create an electronic signature enabling secure transactions.''Le cash, c'est fini: Quels sont les modes de paiement du futur''
dans '' 20 Minutes'' du 19 mars 2010 Because all mobile telephones have an audio input and output (speaker and microphone) built in, this technology is compatible with all mobile phones in use worldwide.


Applications

NSDT is primarily used for

picture info

Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit. Methods Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem is verifying that a given artifact was produced by a certain person or in a certain place or period of history. In computer science, verifying a user's identity is often required to allow access to confidential data or systems. Authentication can be considered to be of three types: The first type of a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Secret Ingredient
A secret ingredient is a component of a product that is closely guarded from public disclosure for competitive advantage. Sometimes the ingredient makes a noticeable difference in the way a product performs, looks or tastes; other times it is used for advertising puffery. Companies can go to elaborate lengths to maintain secrecy, repackaging ingredients in one location, partially mixing them in another and relabeling them for shipment to a third, and so on. Secret ingredients are normally not patented because that would result in publication, but they are protected by trade secret laws. Employees who need access to the secret are usually required to sign non-disclosure agreements. Notable secret ingredients *Merchandise 7X, the "secret ingredient" or "secret formula" in Coca-Cola. The ingredient has remained a secret since its invention in 1886 by John Pemberton. The description of the ingredient is kept in a vault at the World of Coca-Cola in Atlanta. * KFC's " Colonel's ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Global Positioning System
The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of the global navigation satellite systems (GNSS) that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. It does not require the user to transmit any data, and operates independently of any telephonic or Internet reception, though these technologies can enhance the usefulness of the GPS positioning information. It provides critical positioning capabilities to military, civil, and commercial users around the world. Although the United States government created, controls and maintains the GPS system, it is freely accessible to anyone with a GPS receiver. The GPS project was started by the U.S. Department of Defense in 1973. The first prototype spacecraft wa ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

QR Code
A QR code (an initialism for quick response code) is a type of Barcode#Matrix (2D) barcodes, matrix barcode (or two-dimensional barcode) invented in 1994 by the Japanese company Denso#Denso Wave, Denso Wave. A barcode is a machine-readable optical label that can contain information about the item to which it is attached. In practice, QR codes often contain data for a locator, identifier, or Website visitor tracking, tracker that points to a website or application. QR codes use four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to store data efficiently; extensions may also be used. The quick response system became popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard Universal Product Code, UPC barcodes. Applications include product tracking, item identification, time tracking, document management, and general marketing. A QR code consists of black squares arranged in a square grid on a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bluetooth
Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limited to 2.5 milliwatts, giving it a very short range of up to . It employs Ultra high frequency, UHF radio waves in the ISM bands, from 2.402GHz to 2.48GHz. It is mainly used as an alternative to wire connections, to exchange files between nearby portable devices and connect cell phones and music players with wireless headphones. Bluetooth is managed by the Bluetooth Special Interest Group (SIG), which has more than 35,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The Institute of Electrical and Electronics Engineers, IEEE standardized Bluetooth as IEEE 802.15.1, but no longer maintains the standard. The Bluetooth SIG oversees development of the specification, manages the qualificat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Login
In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves. The user credentials are typically some form of username and a matching password, and these credentials themselves are sometimes referred to as ''a'' login (or logon, sign-in, sign-on).Oxford Dictionaries
definition of ''login''.

detail and definition of ''login'' and ''logging in''.
In practice, modern secure systems often require a second factor such as