Beijing Weitong Xincheng Network Technology Co., Ltd
Home>Products>GeeMee UAMS Unified Authentication
Product Groups
Firm Information
  • Transaction Level
    VIP member
  • Contact
  • Phone
    13581866671
  • Address
    1707 Office Building, Block B, No. 2 Lantianchang East Road, Haidian District, Beijing
Contact Now
GeeMee UAMS Unified Authentication
Product Introduction: The design of extremely dense unified authentication is independent of various application systems, separating the security feat
Product details

Product Introduction:

The design of extremely dense unified authentication is independent of various application systems, separating the security features of the application from the application and handing them over to the unified authentication platform for processing, ensuring the security and flexibility of the application. The upgrade of applications and security is independent of each other, making system planning and development more flexible.

Ultra secure unified authentication supports traditional tokens UKEY、 On the basis of traditional authentication methods such as SMS authentication, the authentication engine has been expanded to support both traditional and new biometric and behavioral authentication methods. It is flexible and easy to use, providing authentication support as needed according to the scenario and user preferences, while also providing high security transaction scenarios.

Jimi Unified Authentication itself includes fingerprint, voiceprint, facial biometric recognition products, SMS verification code encryption authentication products, as well as support for the collection and authentication of keystroke behavior characteristics. At the same time, the platform can flexibly support different vendor solutions such as mainstream fingerprint authentication, voiceprint authentication, and facial authentication at home and abroad; Provide a unified server-side integration calling API for industry applications. Provide a combination authentication that integrates multiple authentication methods such as facial recognition, voiceprint recognition, encrypted SMS, and behavioral features, and offers a scalable and easy-to-use security authentication mechanism.


Product features:

1Capable of comprehensive expansion;

2. Support multi-channel and multi protocol access;

3. Support access to multiple authentication devices;

4. Support multiple deployment environments;

5. Multiple authentication methods have been integrated;

6. Support trading risk control strategies.



Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!