Contact Us |Site Map

Home » Product Directory » CHESEN ELECTRONICS CORP.

Member Since 2017-11
CHESEN ELECTRONICS CORP.
Total 44 products in CHESEN ELECTRONICS CORP.
Show: 50 items
iOS Smart Card Reader

iOS Smart Card Reader 2016-11-28 07:20:21

iOS Smart Card Reader for Internet banking user, If internet transaction without entity are not safety enough, For some businessman large transaction are necessary, iOS smart card reader with enti ...

iOS Mobile Security

iOS Mobile Security 2016-11-28 07:20:10

iOS Mobile Signature Key iOS Mobile Signature Key is digital signature generated either on a mobile phone or on a SIM card, Dual channel two factor authentications is the ideal solution to meet ...

iOS Fingerprint Authentication

iOS Fingerprint Authentication 2016-11-28 07:20:00

iOS Fingerprint Certification Key We always only enter account and password to authenticate our identity when we do mobile payment, online payment or online transfer. iOS Fingerprint Certificat ...

iOS Fingerprint Security

iOS Fingerprint Security 2016-11-28 07:19:48

iOS & PC Fingerprint Encryption Key Our encrypt engine is cross operating system working, Using biometric technology on encryption make easy to remember password. iOS & PC Fingerprint ...

Smart Home Security

Smart Home Security 2016-11-28 07:19:34

Facing the trend of Internet of Things (IoT), Smart Home that based on automation control and application provides the higher value application scenarios for family life. Smart Home usually connec ...

Logistics Security

Logistics Security 2016-11-28 07:19:24

Through the technology of big data, IoT and Internet, Industry 4.0 make the supply chain, producing process and logistics that connecting together. The production will be fully automated, so the l ...

IoV Security

IoV Security 2016-11-28 07:19:14

Internet of Vehicles (IoV) Security Nowadays, Telematics have more and more functions such as GPS navigation and mobile phone connection, and even the connectivity with cloud and networks, so i ...

Healthcare Security

Healthcare Security 2016-11-28 07:19:01

With the development of Internet of Things (IoT), the related applications are gradually implemented in the field of healthcare. In the application for healthcare, it is used to build applications ...

POS System Security

POS System Security 2016-11-28 07:18:48

Point of Sales (POS) Security Most of the industries in the retail, service or food business that use the POS system as checkout tools. Consumers usually use payment such as credit cards or mob ...

mPOS Security

mPOS Security 2016-11-28 07:18:37

mPOS (mobile point of sale) is a smartphone, tablet or dedicated wireless device that performs the functions of a cash register or electronic point of sale terminal. mPOS ...

POS Security

POS Security 2016-11-28 07:18:30

Medical POS Security There are many medical institutions have been using POS or mPOS system, such as Mobile Nurse Station. Because the medical institutions have a large number of patient privac ...

Industry 4.0

Industry 4.0 2016-11-28 07:18:15

Facing the trend of Internet of Things (IoT), industrial applications have begun to integrate a variety of technologies and had a new industrial revolution that is the evolution of industry 4.0. L ...

Personal Authentication

Personal Authentication 2016-11-28 07:17:51

Identity Authentication The communication or cloud storage software such as Facebook, Twitter, Dropbox or Google Drive, these we used software. Their common identity authentication is using acc ...

Personal Information Protection

Personal Information Protection 2016-11-28 07:17:40

Identifying Information Protection Our identifying information such as name, birthday, ID number, jobs or contact info were stored in the system when we did registrations, online shopping or ap ...

Asset Security

Asset Security 2016-11-28 07:17:24

Device Management & Control Nowadays, information technology makes variety of devices for we used, such as desktop, laptop, mobile phone and tablet. We are used to store confidential docume ...

Personal Data Protection

Personal Data Protection 2016-11-28 07:17:14

Data Protection From government to personal do have some secret need protect, If we are ever being watched, inadvertently or not, we can hide our data by using properly implemented cryptosystem ...

Mobile Signature

Mobile Signature 2016-11-28 07:16:59

To deal with information or official documents from various users' mobile devices, many agencies need a tool of digital signature to endorse or confirm daily processes anywhere and anytime. To dif ...

Secure Mobile Payments

Secure Mobile Payments 2016-11-28 07:16:47

Mobile Payment Nowadays, people expect to spend money without real credit cards but embed the secure elements into mobile devices instead. Users won't worry about cards jam in wallet if all cre ...

Mobile Banking Security

Mobile Banking Security 2016-11-28 07:16:36

Mobile Banking Cyber attacks at banks could dampen customers' enthusiasm to pay for things online or with their phones. Many banks are trying to develop ecommerce and mobile payments projects i ...

Fingerprint Mobile Security

Fingerprint Mobile Security 2016-11-28 07:16:26

Mobile payment also referred to a payment service using mobile devices and through integrated solution of OTG Key with Fingerprint Identification function for mobile money transfer. Mobile pay ...

Identity authentication

Identity authentication 2016-11-28 07:15:55

can provide our customer to use E-Sign, E-provision chain, E-consumption, and E-commerce would be ensured that: a signature, contract or other record relating to such transaction may not be deni ...

Enterprise Data Protection

Enterprise Data Protection 2016-11-28 07:15:41

Data Protection Most enterprises lost their confidential properties may be leaked by hackers, former employees or people who are interested in obtain. Information system administrator may obtai ...

Behavior Management

Behavior Management 2016-11-28 07:15:29

Behavior Management & Control Facing the increasing threats of information security, 's enterprise security solutions provide a safe and efficient IT environment to help enterprises buildi ...

Asset Management Control

Asset Management Control 2016-11-28 07:15:15

Asset Management & Control Through IT asset management and control, enterprises can classify the assets according to the operating process and value of assets, and then plan the safeguard f ...

PC Fingerprint Security

PC Fingerprint Security 2016-11-28 07:14:59

PC Fingerprint Encryption Key PC Encryption Key is a file and folder encryption USB hardware key for Windows based OS PC. Through the embedded security chip, it allows you to protect your files ...

Fingerprint Identification Card

Fingerprint Identification Card 2016-11-28 07:14:44

Fingerprint Identification Access Card Fingerprint Identification Access Card is the general access card integrates the fingerprint sensor. The most difference is that NFC sensor must be enab ...

Encryption Key

Encryption Key 2016-11-28 07:14:32

Android and PC Encryption Key Android and PC Encryption Key is an encryption hardware key especially design for Android OS smartphones and Windows OS PC. It allows you to protect your files by ...

Mobile Phone Fingerprint Security

Mobile Phone Fingerprint Security 2016-11-28 07:14:20

Android & PC Fingerprint Encryption Key Use fingerprint identification and security chip brings you the most safety mobile application and also makes your mobile device has extra memory. It ...

Mobile Communication Security

Mobile Communication Security 2016-11-28 07:13:55

Secure Communication Since Internet is ubiquitous, Voice over IP market is taking traditional telecommunication's place. However, The transmitted voice is easily to be tapped or wired. provid ...

Identification Security

Identification Security 2016-11-28 07:13:45

Many Apps need to login personal account to use, such as communication, games, banking or customer service Apps. When we registered the account, we have already entered the privacy information. Th ...

Mobile Data Protection

Mobile Data Protection 2016-11-28 07:13:31

Data Protection security chip embedded technology allows the mobile phones transformed into the most secure security phone. It can protect the phone's data by AES 256bit hardware encryption. ...

Mobile Payment Security

Mobile Payment Security 2016-11-28 07:13:20

Authentication、Signature、Payment Mobile applications such as mobile payment, online transfer or mobile signature, etc. are the future of mobility. If these applications are not based on strong ...

Storage Module

Storage Module 2016-11-28 07:12:47

The Storage Module of Authentication Storage Hardware Security Module (AS-HSM) can be used to control the access of plug-in type or embedded type memory. The plug-in type memory supports SD/micr ...

Secure Module

Secure Module 2016-11-28 07:12:33

The Secure Module of Authentication Storage Hardware Security Module (AS-HSM) integrates the certificated secure chip that embedded secure element. It's used for the security operation such as K ...

Cross Platform

Cross Platform 2016-11-28 07:12:21

Authentication Storage Hardware Security Module (AS-HSM) mainly by Control Module, Secure Module and Storage Module. It's compatible with Windows, Mac OS, Linux, iOS and Android OS. The Security ...

Control Module

Control Module 2016-11-28 07:12:08

The Control Module of Authentication Storage Hardware Security Module (AS-HSM) uses the self-developed controller. It's the main controller IC for components, data storage, connectivity & RF ...

Secure Element

Secure Element 2016-11-28 07:11:43

UART/I2C/SPI Interface In addition to the USB and SD/MMC that the interface for big data transferring, USB OTG Controller also have interfaces that use for communicating with other controller ...

Embedded Flash

Embedded Flash 2016-11-28 07:11:30

eFlash & Logic process OTG controller uses logic process and embedded memory process the two kinds of production. The controller produced by logic process is low cost and high yield, more ...

Storage Chip

Storage Chip 2016-11-28 07:11:20

Dual USB & Dual SD Controller USB OTG Controller is an integral micro-controller that includes 8-bits high performance micro-controller (CSM8051). It has dual USB On-The-GO high speed int ...

Encryption Chip

Encryption Chip 2016-11-28 07:11:07

AES Encryption Controller USB OTG Controller is built-in Embedded encryption/decryption engine. It' has Advanced Encryption Standard (AES) that a specification for the encryption of electroni ...

Storage Security

Storage Security 2016-11-28 07:10:52

Well-Protected Secure Storage Security System Development Platform uses the self-developed controller with AES 256bit hardware encryption technology, and is for storage memory and individual ...

Cross Platform System

Cross Platform System 2016-11-28 07:10:30

Cross-Platform Execution Security System Development Platform supports cross-platform OS. It supports Windows, Mac OS and Linux in computer OS and supports iOS and Android in smart phone OS. ...

Certified Security

Certified Security 2016-11-28 07:09:53

Certified Secure Element The Secure Element (SE) plays a key role in mobile transaction. With the Secure Element, the mobile phone will be more safety when you use mobile payment. Featuring a s ...

Biometric Identification

Biometric Identification 2016-11-28 07:09:28

The biometric technology of Security System Development Platform uses the capacitance fingerprint sensors. The identity authentication is that users need to put the correct fingerprint, and the ...

1