We specialise in security and the hardening of banking and communication processes. CORONIC is a market leader in Trojan protection and the prevention of phishing attacks against the computers of German banks’ private clients.
“Who am I?” That is the question! Philosophers could hardly answer it – but now there is an answer in the case of online payment transactions: legal regulations such as the Payment Service Directive 2 (PSD2) have set forth what biometric characteristics are and who can use them, in order to do online banking, for instance. One can be authenticated through facial recognition, voice recognition, a fingerprint, a proven piece of hardware or even with a password or PIN. Unfortunately, banks and financial service providers have their own ideas as to how these biometric characteristics should be applied to their online transactions. With the CORONIC ID App, everything is easier: traditional processes such as the use of PINs, TANs, passwords, cards and signatures can be integrated, as well as push messages or real biometric authentication characteristics. An ID app as universal proof of identity for all payment processes and logins – everywhere, anytime.
The task of a browser is to open up every single webpage and play every video. That is why a browser is the exact opposite of a safe software program – because it opens up everything! A modern security concept must therefore be based on the browser itself. If a Trojan attack on the browser is prevented, then all online transactions are protected from manipulation.
VR-Bankengruppe promotional video
Secure transaction authentication for smartphones and desktops – no special hardware required. SIGN supports internet TANs via push and cloud services, immediate authorisations without TANs, automatic migration of the app data onto new mobiles and authentication on smart devices. All these options for online banking and online payment transactions with credit cards, for instance.
Can one perform a secure online banking transaction on a computer or tablet that has been infected by a Trojan? Can secure SSL communication be established even if Windows’ wininet.ddl has been hacked? How can mobile apps be hardened after their installation in order to make them extra secure? Thanks to PROTECT products, you can work on any PC or mobile device both easily and securely – even if the operating system is already vulnerable.