Detailed introduction:
The security problem of mobile Internet is becoming increasingly serious. Phishing is shocking, and related cases are increasing year by year; SMS hijacking is rampant. At present, there is no stable, reliable, and convenient financial security entrance in the market, and the user's operating environment has no protection, which is worrying.
The extremely dense browser launched by Weitong Xincheng efficiently and conveniently solves the above problems, providing a secure and convenient access to the pan financial sector. The pan financial industry requires a secure operating environment, and in the past, most browsers only had simple encryption, which not only makes them easy to crack but also poses security risks. With the continuous development of mobile Internet, there are more and more financial operations on intelligent devices. Therefore, the extremely confidential browser provides users with a safe and convenient solution.
Jimi Browser is independently developed by Beijing Weitong Xincheng Network Technology Co., Ltd. and has a technologically innovative entry level application. To provide a secure and convenient operating environment for customers in the pan financial industry, through integrated security controls, key management, signature verification management and other services, ensuring the information security of users operating in the pan financial field.
The main functions and features of Extreme Browser:
1. A mobile browser that supports one-way and two-way SSL communication (supporting national security SM2/3/4 algorithms)
2. A mobile browser that supports password controls to protect sensitive information input such as user passwords
3. Mobile risk control information collection control (terminal software and hardware information, network information, geographic location information, keystroke behavior characteristics including 3D Touch pressure collection ratio, etc.), anti transaction fraud
4. A mobile browser that supports digital certificate lifecycle management (application, download, import, update, parse, delete) and digital certificate applications (identity authentication, encryption, signature verification)
5. Support integration of audio key, Bluetooth key, and lighting interface key
6. A browser that supports secure mobile office, secure payment, and secure mobile banking transactions
7. Using built-in domain name and page similarity algorithms to assist with blacklist and whitelist mechanisms, a mobile terminal security browser that supports network phishing prevention
8. Provide a unified interface for local native capabilities required by HTML5 applications (such as address book access, geographic location information, camera, microphone, fingerprint recognition, NFC calling, local software and hardware features, keystroke behavior features, local sensitive data encryption, sensitive communication data encryption, and other APIs), enabling mobile web applications and apps to have the same functionality and user experience
9. Support local environment security detection (whether the Android system ROOT, whether there is a screenshot recording program, keyboard eavesdropping program, SMS acquisition program, etc. basic detection, Trojan virus and other malicious code detection, whether mobile security is installed, etc.) LBE、 Mobile Security Manager and other security software
10. Support fingerprint authentication applications (login, payment)
11. Applications that support gesture passwords (login, payment)
12. Support facial recognition applications (password modification, reserved phone number change, login, payment, and other scenarios)
13. Mobile devices provide QR code security for scanning and logging in, reducing the chance of password exposure
14. Support SMS encryption decryption security module to prevent SMS verification codes from being intercepted and exploited
15. Integrate software and hardware account security protection with Jimi Shield (supporting operating systems such as Windows, iOS, Android, etc.)
16. Provide natural person identification services, portrait comparison services, bank card comparison (elements two, three, and four)
17. Real name verification of mobile phone numbers and online real name authentication applications based on second-generation ID cards
18. Provide crowdsourcing testing, performance monitoring and other services for pan financial institutions
19. Provide users with a closed-loop secure trading environment such as search, decision-making, purchase, redemption and query of Internet financial products
20. Proposed to support online rapid identification (FIDO) standards
The usage scenarios of Extreme Browser include:
lThird party payment login operation
lInternet financial business login operation
lCredit reporting business login operation
lSecurities business login operation
lE-commerce platform login operation
lMobile telecommunications service login operation
lLogin operation for government related business