Product Features

This product is based on high efficiency, high security, and high stability. It adopts advanced encryption algorithms to support distributed deployment of local and private networks. It uses independent dongle to protect the entire system, and fully guarantees operator information security.

Hight Efficient
Flexible
Security
Distributed
No Card
Variable
Dynamic
Independent
Advanced
Rich

High Efficiency

Support ECM bandwidth range: 15kbps-30kbps, EMM bandwidth range: 20kbps-1mbps. In order to reflect the immediacy of user authorization response, the EMM sending strategy was optimized to ensure that every day 20,000 users, the fastest about 5 minutes can receive all their authorization information.

Security

Focus on leading security technology, using white box algorithm technology, regional chain technology, and the most advanced cryptography technology, to encrypt the generation, transmission, storage process of the data.

No Card

The cardless advanced security solution is mainly used the advanced-security system based on hardware decryption level. The cardless design could save the terminal hardware costs and maintenance costs.

Dynamic

The dynamic key is used during the interactive session between modules, to protect the data transmission and prevent the system data from being cracked.

Advanced

Use the most advanced security encryption algorithms.

Flexible Management

By optimizing the authorization speed and data security algorithms, it achieves high concurrency, high load, and flexible management of system performance. The system can also be in a good working state even the number of users reaches the level of 10 million.

Distributed

The system can deploy each module in a distributed way to realize multi-level control and unified authorization. Operators can distribute and deploy in multiple regions or countries, use the specialized network to unified management and statistics of the CARDS, packages and recharge.

Variable

The cloud variable KEY can be changed in an unfixed time, which can effectively prevent various data copies.

Independent

The ECM and EMM are encrypted by a specific encryption chip and provided to the MUX device, ensuring data security and high efficiency.

Rich

Can support a variety of user payment methods, such as mobile phone SMS, credit cards, business hall recharge, other third-party platforms, and other recharge methods.