Beijing Weitong Xincheng Network Technology Co., Ltd
Home>Products>Extremely dense GEEMEE
Product Groups
Firm Information
  • Transaction Level
    VIP member
  • Contact
  • Phone
    13581866671
  • Address
    1707 Office Building, Block B, No. 2 Lantianchang East Road, Haidian District, Beijing
Contact Now
Extremely dense GEEMEE
Detailed introduction: the security problem of mobile Internet is becoming increasingly serious, the phishing crime is shocking, and the related cases
Product details

Detailed introduction:

The security problem of mobile Internet is becoming increasingly serious. Phishing is shocking, and related cases are increasing year by year; SMS hijacking is rampant. At present, there is no stable, reliable, and convenient financial security entrance in the market, and the user's operating environment has no protection, which is worrying.

The extremely dense browser launched by Weitong Xincheng efficiently and conveniently solves the above problems, providing a secure and convenient access to the pan financial sector. The pan financial industry requires a secure operating environment, and in the past, most browsers only had simple encryption, which not only makes them easy to crack but also poses security risks. With the continuous development of mobile Internet, there are more and more financial operations on intelligent devices. Therefore, the extremely confidential browser provides users with a safe and convenient solution.

Jimi Browser is independently developed by Beijing Weitong Xincheng Network Technology Co., Ltd. and has a technologically innovative entry level application. To provide a secure and convenient operating environment for customers in the pan financial industry, through integrated security controls, key management, signature verification management and other services, ensuring the information security of users operating in the pan financial field.


The main functions and features of Extreme Browser:

1. A mobile browser that supports one-way and two-way SSL communication (supporting national security SM2/3/4 algorithms)

2. A mobile browser that supports password controls to protect sensitive information input such as user passwords

3. Mobile risk control information collection control (terminal software and hardware information, network information, geographic location information, keystroke behavior characteristics including 3D Touch pressure collection ratio, etc.), anti transaction fraud

4. A mobile browser that supports digital certificate lifecycle management (application, download, import, update, parse, delete) and digital certificate applications (identity authentication, encryption, signature verification)

5. Support integration of audio key, Bluetooth key, and lighting interface key

6. A browser that supports secure mobile office, secure payment, and secure mobile banking transactions

7. Using built-in domain name and page similarity algorithms to assist with blacklist and whitelist mechanisms, a mobile terminal security browser that supports network phishing prevention

8. Provide a unified interface for local native capabilities required by HTML5 applications (such as address book access, geographic location information, camera, microphone, fingerprint recognition, NFC calling, local software and hardware features, keystroke behavior features, local sensitive data encryption, sensitive communication data encryption, and other APIs), enabling mobile web applications and apps to have the same functionality and user experience

9. Support local environment security detection (whether the Android system ROOT, whether there is a screenshot recording program, keyboard eavesdropping program, SMS acquisition program, etc. basic detection, Trojan virus and other malicious code detection, whether mobile security is installed, etc.) LBE、 Mobile Security Manager and other security software

10. Support fingerprint authentication applications (login, payment)

11. Applications that support gesture passwords (login, payment)

12. Support facial recognition applications (password modification, reserved phone number change, login, payment, and other scenarios)

13. Mobile devices provide QR code security for scanning and logging in, reducing the chance of password exposure

14. Support SMS encryption decryption security module to prevent SMS verification codes from being intercepted and exploited

15. Integrate software and hardware account security protection with Jimi Shield (supporting operating systems such as Windows, iOS, Android, etc.)

16. Provide natural person identification services, portrait comparison services, bank card comparison (elements two, three, and four)

17. Real name verification of mobile phone numbers and online real name authentication applications based on second-generation ID cards

18. Provide crowdsourcing testing, performance monitoring and other services for pan financial institutions

19. Provide users with a closed-loop secure trading environment such as search, decision-making, purchase, redemption and query of Internet financial products

20. Proposed to support online rapid identification (FIDO) standards


The usage scenarios of Extreme Browser include:

lThird party payment login operation

lInternet financial business login operation

lCredit reporting business login operation

lSecurities business login operation

lE-commerce platform login operation

lMobile telecommunications service login operation

lLogin operation for government related business


Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!