$WOLV The Enigma Mobile Security App uses 3 Stages
Post# of 35442
Stage 1:
Manages network segments, addresses, ports, and other network attributes are authenticated by routers, bridges and firewalls.
Stage 2:
Manages user IDs, passwords, biometrics and other user attributes are authenticated by the application or enterprise sign-on servers.
Stage 3:
In stage three the Enigma Mobile Security App uses the actual application process logic along with the system business logic to authenticate transactions or user request actions.
Stage 3 is the Critical Solution
The Stage 1 and Stage 2 authentication process is very easy to by-pass, and as result, unauthorized user access to mobile devices has become trivial and common. The mobile device owner is unaware that unauthorized users have full access to their device.
The Enigma Mobile Security App has created the crucial Stage 3 authentication process where ALL unauthorized users are blocked from accessing the owner’s mobile device.
The Enigma Mobile Security App is developed using a patented technology language called a “Causal Inference Engine” to authenticate unlimited business logic steps or states. All results are integrated with a simple and easy to use dashboard which reports the attempted access by unauthorized users.
http://www.davechalk-keynotespeaker.com/
http://en.wikipedia.org/wiki/Dave_Chalk_(entrepreneur)
http://enigmamobile.com/