TOUCH ACCESS PORTALS
MATRICS 2LOWEST COSTHIGHEST SECURITYSCALABILITY
Creating Secure Intelligent Systems using Near Field Communication (NFC) Touch Access Portals (TAPs) with Random Number IDs (RNIDs) all within their Cloud. Matrics2, Inc., owns the patent rights to uniquely identify everything in the world with a Random Number IDs (RNIDs)
Matrics2 tracks every Class”0” RNID NFC tag it has ever manufactured, read or authenticated with its Matrics2 cloud database.
Matrics2 is the Gate Keeper and the Keeper of all RNID Keys
Your One Stop Security Solution
- Matrics2’s technology is focused on the IoT communications, security and it’s privacy
- Matrics2’s software can communicate with any provider's software platform
- Matrics2’s authentication process works within the cloud or in a private network
- Matrics2 offers a centralized device authentication and management key system just like NSA
- Only requires a single TAP on a RNID
- Eliminates passwords
- Can be used as a role based security access control system
One Time Pad Encryption
TAPs can be either “active / passive” electronic devices with key-secured communication with the Matrics2 Secure Data Base (SDB), which serves as a Secure Portal (SP) to the SDB, referred to as a TAPs. TAPs can be key-secured NFC Smart Phones, or a key-secured internet connected TAPs associated with an ATM, gas pump, cash register, card reader, or any device that provides financial transactional services. Learn more
With the linking of every sensor, tag, gadget, machine, object(s) or person to any digital network(s) using Matrics2’s Random Number IDs and secure database.
By connecting these products, it is a massive opportunity. When you embed tags and sensors into your products, they transform your business.
Give your NFC tags Superpowers with the lowest cost, highest volume assembly and with the Security of NSA
One Time Pad encryption is the only proven unbreakable encryption methodology. Matrics2’s One-Time Pad Symmetric Key encryption is the only completely unbreakable cipher methodology. It has been used for decades in military electronic cipher systems, encrypting personal sensitive data, high capacity secure storage media, continuous key protection as well as offers outstanding message security without sacrificing convenience and overhead.