Real-time secure technology to transmit and receive e-code Incusys Co., Ltd. 17 th May 2012 Baik, Ky Young. E-mail : [email protected]
Dec 26, 2015
Real-time secure technol-ogy
to transmit and receive e-code
Incusys Co., Ltd.17th May 2012
Baik, Ky Young.
E-mail : [email protected]
Introduction Our company
Introduction
What’s LIPEX® ?
The application of LIPEX® 1~5
The details of SHUFFLER.
The application of LIPEX® 1~3
Awards & Acquisitions.
Properties.
Organization.
Contacts.
Contents
Introduction Our company
We, INCUSYS LTD., are the new concept of security, communication and file transmission and reception technology development, while any device that can store files securely on the development of technology is lead-ing to a more widespread.
The INCUSYS is the security technology, communications, market-leading Smart Phone securityand text message communications, documents, images, etc. in real-time security technology that can transmit and receive, and save the module clouding system development is complete secu-rity is a new concept and communication technologies.
We also developed a new concept of security technology, software technology, as LIPEX ® and Shuffler, Republic of Korea have already acquired the sta-tus of the patent is registered, the United States, Europe and pending patents in major countries, in March 2012 after 21 days patented in the United States is determined to be issued a patent certificate is waiting.
INTRODUC-TION
Shuffler
LIPEX®
Introduction Our Technol-ogyLIPEX®
LIPEX®L) was accredited by KTL(Korea Testing Laboratory) through the Certificate of Software Quality
▶Featuring◀ Any image 1 / n with randomly split into, you can recover the originally.
LIPEX®
LIPEX®LIPEX
®LIPEX
®
1th Program screen 2ndLoading Screen 3rd After Encryption 4th After Decryption
Scheme of Mona Lisa Encryption Process
Introduction Our Technol-ogy
security technology was already developed
▶Application Range 1◀ Mobile Messenger with the various real-time image transmission and reception
technology, security, and document files.
▶Image conversion & receiving, transmission
▶ Documents conversion & receiving, transmis-sion
LIPEX®
conversion transmission receiving & storage
conversion
transmission
receiving & storage
Introduction Our Technol-ogy
Barcodes or QR codes created cleave-intermingle with the code can be used to print.
▶ Application Range 2◀ Various identification and credit cards, passport, anti-forgery technology.
ID Passport ID Passport
Image restoration
Take a photo
Ky BAEKINCUSYS.,LTD.CEO010-5405-2902
Code restoration
Take a photo
LIPEX®
Introduction Our Technol-ogy
This document, leaked by insiders and followers according to information leakage prevention and mailing middle to prevent view-ing.
▶ Application Range 3◀ Various print the document leak prevention technology (anti-forgery
technology)Original Document
Printing Docu.(Keeping)
Restoration(Web-cam, scanner, Smart Phone)
LIPEX®
Introduction Our Technol-ogy
Printed on civil documents, split an unspecified mix of Smart Phone image taken as the rule by restoring the tensile or QR code reading Data.
▶ Application Range 4◀ Various civil documents to prevent forgery and
authenticity identification techniques.
LIPEX®
Smart PhoneSmart Phone
Restoration
INCUSYS.,LTD.CEO / Song Geum HoSeal and Logo
Ky BAEKINCUSYS.,LTD.CEO010-5405-2902
Restoration
Introduction Our Technol-ogy
Self-compression technology and using technology LIPEX ® storage technology security and compression
▶ Application Range 5◀ Storage and information protection and storage compres-
sion technology clouding.
Storage(10-tera byte)
Financial documents of a conventional storage methods.
10-tera byte document
Scanner
Scanned Storage
How to save the financial documents LIPEX ®
Scanned Storage
Conversion to pixel docu.
10-tera byte documentScanner
LIPEX®
Storage(under 5-tera byte)
Introduction Our Technol-ogy
SHUF-FLER▶Technical Overview◀
Conventional fixed and consistent break with the way the algorithm created
by Shuffler, an algorithm with no knowledge of all people to freely Parameter
of the algorithm allows you to adjust the binary files created Saint-intermingle
(Cleave intermingle / split scrambling technology ) technology. Shuf-
fler, as well as anyone on the file blocks and bytes (Byte) or bit (Bit) by do-
ing so you can define the disposal, the existing uniform approach to ap-
plying password hacking or password to escape was impossible to
solve.
Here would be impossible to hack or decryption confidently express reason,
the form of a block of the file, unlike the other algorithms in a pattern or a uni-
form list is never created, so true.
So now the encryption algorithm, a professional public intellectuals, but no-
body can show that the technology is a technology will.
Introduction Our Technol-ogy
Real-time encrypted communication based on IP communications implementation.No burden charge (WIFI, 3G and voice communications, data communication switch).Incorporating encryption and decryption device itself (not hacking).PC communication in real time implementation of encryption(PC and Smart Phone communicate).
▶ Application Range 1◀ Tablet PC and Smart Phone's real-time voice and video
communications encryption technology.
SHUF-FLER
Smart Phone Smart Phone
Tablet PCTablet PC
Introduction Our Technol-ogy
Through-the-fly encryption software radio communication technology (8bit, 32bit)
▶ Application Range 2◀ Analog and digital radio transmission and reception of real-time communi-
cation encryption technology.
SHUF-FLER
Radio Radio
Introduction Our Technol-ogy
Analog and digital video encoding and broadcasting real-time compression technology.
▶ Application Range 3◀ Satellites and UAV's real-time encryption technology to transmit
video.
SHUF-FLER
Smart Phone Commanding control center
Satellite Imagery Trans-
mission
Introduction Our Technol-ogy
AWARDS & CERTIFICA-TIONS
2009 Technol-ogy-Patent Awards: 2nd
Prize
9th Informa-tion &
Telecomm-unications
Venture Start-up Competi-
tion: Top Prize
New Technol-ogy Invention
Financial Support Con-
firmation
Certificate of Software Quality
Superior In-vention Manu-
facturing Support Con-firmation Let-
ter
Introduction Our Technol-ogy
PROPER-TIES
10-2010-0006563
LIPEX
Shuffler
Introduction Our Technol-ogy
ORGANIZATION
Company
CFO CMO/TBD
CEOSong, Gum Ho
CTO
Administration / Support: 3
Advisory group
Partnership Group
Business Advisor / C.S. Lee (Confidential)
Technical Advisor / 3 University Professors Lo-cated in the Daejeon Area
MAZ Ventures, LLC (Washington D.C) – Joint Tech-nology Development
Korea Fujitsu – Domestic Marketing Support
Introduction Our Technol-ogyCONTACTS
Main OfficePerson in charge : Baik, Ky Young
6F Daejeon Post Office, 34-1 Won-dong, Dong-gu, Daejeon, Korea
Tel) +82-42-621-3789Fax) +82-42-631-3836
Mobile: +82-10-5405-2902Email: [email protected]
Main OfficePerson in charge : Baik, Ky Young
6F Daejeon Post Office, 34-1 Won-dong, Dong-gu, Daejeon, Korea
Tel) +82-42-621-3789Fax) +82-42-631-3836
Mobile: +82-10-5405-2902Email: [email protected]
Branch Office(If you use the English)Person in charge : Bruno Young Kim
12F Portview Officetel, 4-8 Jungang-dong 3Ga, Jung-gu, Incheon, Korea
Tel) +82-32-761-2912Fax) +82-32-761-2915
Mobile: +82-10-5448-8267Email: [email protected]
Branch Office(If you use the English)Person in charge : Bruno Young Kim
12F Portview Officetel, 4-8 Jungang-dong 3Ga, Jung-gu, Incheon, Korea
Tel) +82-32-761-2912Fax) +82-32-761-2915
Mobile: +82-10-5448-8267Email: [email protected]
Web Page: www.incusys.kr