Authentication


Rowem's unique integrated authentication package uses an innovative technology that ensures security in a minimized 2 channel 2 factor authentication process. Easy-to-use authentication procedure provides convenient authentication

Authentication


Rowem's unique integrated authentication package uses an innovative technology that ensures security in a minimized 2 channel 2 factor authentication process. Easy-to-use authentication procedure provides convenient authentication.

AUTHENTICATION

Authentication method adapted to your specific needs

Easy-to-remember SUPER PIN authentication

A safe and simple 4-digit password authentication using Rowem's patented technology and 2 channel 2 factor authentication system.

Biometric authentication using fingerprints and facial recognition.

A biometric authentication complying with the international standard FIDO2 structure.

Icon authentication that cannot be recognized even when someone is looking from the side

An icon authentication using Rowem’s patented technology that is excellent for social engineering attacks.

Location authentication that detects a specific location 

An authentication using Rowem’s patented technology becomes activated only in a specific location range.

AUTHENTICATION
Authentication method adapted to your specific needs

Easy-to-remember SUPER PIN authentication

A safe and simple 4-digit password authentication using Rowem's patented technology and 2 channel 2 factor authentication system. 

Icon authentication that cannot be recognized even when someone is looking from the side

An icon authentication using Rowem’s patented technology that is excellent for social engineering attacks.

Biometric authentication using fingerprints and facial recognition.

A biometric authentication complying with the international standard FIDO2 structure.

Location authentication that detects a specific location  

An authentication using Rowem’s patented technology becomes activated only in a specific location range.  

Secured Cloud


Secured Cloud is a cloud-only security technology that creates a cloud environment that does not require data security management. Use the cloud conveniently and safely, no worries about data leakage.

Secured Cloud


Secured Cloud is a cloud-only security technology that creates a cloud environment that does not require data security management. Use the cloud conveniently and safely, no worries about data leakage.

SECURED CLOUD
Secure cloud that even administrators cannot access

Wherever you need a secure cloud

A technology that can be easily integrated into any cloud ensuring
 a secure cloud environment. 


Convenience without data leakage 

Since data is automatically encrypted the moment it is synced to the cloud, it is convenient and you don't have to worry about data leaks.

SECURED CLOUD

Secure cloud that even administrators cannot access

Wherever you need a secure cloud 

A technology that can be easily integrated into any cloud ensuring a secure cloud environment. 

Convenience without data leakage 

Since data is automatically encrypted the moment it is synced to the cloud, it is convenient and you don't have to worry about data leaks.

Secured Vote


Secured Vote is an online non-face-to-face voting technology that enables stable voting and counting with a server structure that automatically expands according to user traffic. As voting is conducted through ifree authentication, it is convenient, and fairness of the voting process is guaranteed.

Secured Vote


Secured Vote is an online non-face-to-face voting technology that enables stable voting and counting with a server structure that automatically expands according to user traffic. As voting is conducted through ifree authentication, it is convenient, and fairness of the voting process is guaranteed.

SECURED VOTE

Fair and secure voting system

Ensures voting fairness with blockchain technology 

Voting information ensures transparency by storing information on the blockchain. 

Stable voting environment 

A stable voting environment by using the auto-scaling function and firewall.

SECURED VOTE
Fair and secure voting system 

Ensures voting fairness with blockchain technology

Voting information ensures transparency by storing information on the blockchain.

Stable voting environment

A stable voting environment by using the auto-scaling function and firewall.

Secured Icon


Secured Icon is a next-generation icon authentication technology that eliminates the risk of password exposure by entering the password through the trendy and fun icon touch rule. 

Secured Icon


Secured Icon is a next-generation icon authentication technology that eliminates the risk of password exposure by entering the password through the trendy and fun icon touch rule. 

SECURED ICON

Worry-free input method even when someone is looking from the side

Prevent social engineering hacking such as phishing and shoulder surfing

As the touched icon and the actual input value differ depending on the rules, the actual password is safe even if the input icon is exposed. 

Scalability applicable to all fields requiring passwords

It is applicable to all fields—Home, IoT, and Security that require a password. 

SECURED ICON
Worry-free input method even when someone is looking from the side

Prevent social engineering hacking such as phishing and shoulder surfing

As the touched icon and the actual input value differ depending on the rules, the actual password is safe even if the input icon is exposed.

Scalability applicable to all fields requiring passwords

It is applicable to all fields—Home, IoT, and Security that require a password.