 |
niceAccess™
protects data that only authorized personnel
can access. Hackers cannot, nor the system
administrator.
niceAccess™
server can authenticate outsiders who have
no account on the server. |
|
|
 |
niceAntiRE™
provides anti-reverse engineering of
software.
Before compiling source code to release a
software, niceAntiRE™
converts readable code to unreadable code in
random characters. |
|
|
 |
niceAuthen™
lets the client authenticate the server to
avoid connecting to fake servers.
It lets the server to authenticate the
client even if the client has no account on
the server. |
|
|
 |
niceAuthorize™
authorizes niceRaker®
agents, governments, companies, schools,
etc. to issue customized niceCoupon™
to facilitate product promotion.
It authenticates the issuers and verifies
the electronic signature of niceCoupon™. |
|
|
 |
niceCoupon™
is a unique anti-forgery mechanism to
promote products, adapt to company's budget
process, control the use of products, and
precisely calculate the niceRaker®
agents due revenue shares. |
|
|
 |
niceCyber™
prevents data theft and provides the ability
to track data leaks.
It is very useful for protecting the secrets
of countries or companies. |
|
|
 |
niceDatabase™
eliminates the installation of conventional
database products.
No hassle with schemas, SQL commands, etc.
Based on an intuitive graphical user
interface, a simple click will create
complete software coding in minutes.
It protects confidential data with random
encryption, which is almost impossible to
decrypt even if the entire database is
stolen. |
|
|
 |
niceDoR™
is an electronic message transfer mechanism.
DoR stands for 'delivery on request'.
The sending server detains the outgoing
messages and waits for the intended
recipients to request the messages. The
sending server can authenticate the message
requesters even if the requesters have on
account on the sending server.
niceDoR™
effectively eliminates junk or malicious
messages. |
|
|
 |
niceEsign™
is an electronic signature mechanism in
niceRaker®
proprietary format.
It authenticates the signer and verifies the
signed content. |
|
|
 |
niceExpand™
expands Internet applications from closed to
open environments.
For example, niceLibrary™
lets school libraries to expand the services
externally. The library servers can
authenticate outsiders who have no account
on the servers. |
|
|
 |
niceFinTech™
covers several financial technology segments
including online payment, remittance, loan,
insurance, and financial advising.
It allows financial institutions to take
over the control of market from third party
service providers and clean up the market
chaos.
niceFinTech™
simplifies the current common practices of
financial activities, effectively prevent
frauds, and eliminates the process
inconvenience. |
|
|
 |
niceHashSalt™
is a niceRaker proprietary algorithm that
converts ordinary data into a randomly
salted irreversible hash value. |
|
|
 |
niceID™
combines niceAuthen™
and niceNobody™
to come out with a unique identification
information that can be used as digital ID.
niceNobody™
allows Internet accounts to be anonymous but
have authenticated links to real
informational accounts such as bank
accounts, driver's license accounts,
passport accounts, etc. |
|
|
 |
niceInternet™
protects applications from fraud, and also
protects privacy, not only from hackers, but
also from service providers.
For example, the online store can collect
payments without knowing the payer's bank
account number. |
|
|
 |
niceInvisible™
embeds information in standard graphics, the
information is typically used for
authentication or electronic signatures.
Scanning, photographing, faxing, etc. cannot
preserve the embedded information.
|
|
|
 |
niceLang™
quickly exports product packages from
English to a new language within hours to
days.
A product package includes software, product
website, product introduction and tutorials
with voice descriptions, etc. |
|
|
 |
niceManagement™
automates business management including
human resources, marketing, sales, forecast,
cash flow, etc.
It provides effective management of
niceRaker business. |
|
|
 |
niceModuleLib™
manages niceRaker®
proprietary software module library,
possibly partially licensed to outsiders.
It controls the access of authorized
personnel to the authorized modules.
It also keeps access history. |
|
|
 |
niceQA™
provides functions for debugging and
diagnostic testing.
It is very useful for thorough testing
before releasing products, and to ensure
that no new bugs are created when upgrading
products. |
|
|
 |
niceSoftware™
automates software development to the
extreme.
It consists of tens of automation platforms
developed over many years.
Simply one click can generate software codes
of more than 1,000 modules from a rough
draft of graphical user interface; simply
one click can automatically convert computer
software codes to more than 95% of mobile
phone software codes. |
|
|
 |
To address concerns about software
backdoors, niceRaker®
may provide software source code to one
representative national government agency.
niceSourceCode™
is to help government examiners understand
the software structure and be able to easily
trace the source code. |
|
|
 |
niceTrack™
is a mechanism for tracking the delivery
flow of goods, materials, etc.
It can be used to authenticate the
certificates of genuine goods, is
particularly useful for the strict control
of national strategic materials.
|
|
|
 |
niceVideo™
uses a descriptive language to replace
tedious manual efforts for automatic
generation of 3D models and motion
animations, greatly improves efficiency.
niceVideo™
will be used to generate a lot of videos for
advertising services. |
|
|
 |
niceXplatform™
allows applications to communicate across
different platforms.
For example, niceChat™
enables any social apps of different
platforms to communicate with each other.
|
|
|