top of page

Future Innovations

  1. Stop hackers by verifying the login device in addition to the user ID and password. This ensures that a hacker would need to physically steal your device to break in.

  2. Develop a new OS architecture with an application administrator role, ensuring that current admin, sudo, su, or root users cannot access application data fully.

  3. Introduce a password-free verification method. The security token for verification is based on a synchronized timestamp, rendering stolen passwords useless for hackers.

  4. Implement a new encryption method to replace the current public-private key pair system, as private key is vulnerable.

  5. Detect phishing websites by analyzing the hosting website's IP address. From the IP address, we can determine the location and owner information.

  6. Identify scam emails by verifying the sender's SMTP domain name.

  7. Display the location and owner information of robocall calls by checking caller's IP address, as most of these calls are based on the VoIP protocol. From the IP address, we can determine the location and owner information.

  8. Mitigate denial of service attack.

​​​

 Free Download Trial Version:

​

 

Seeking business partners to develop solutions

​

For inquiries, please send a USPS registered mail to

ChienSEC LLC

12400 SE 38TH ST #40151

Bellevue, WA 98015

​

US Patents: 8,214,899 8,621,604 9,015,090 9,674,145 9,912,677 10,084,791 10,277,626 10,382,436 10,542,006 10,826,912 11,188,622 11,438,145 11,509,463 11,677,754 and US patent pending application 18/113,037   

Japanese Patent No. 7248219, No. 7309880, and No. 7618057 

​

bottom of page