바로팜

10K+
Downloads
Content rating
Everyone
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

“The strategy of the BaroPAM solution is to strengthen the security of information assets and minimize user inconvenience!”

The BaroPAM solution is a zero trust security model and is based on the Pluggable Authentication Module (PAM) method that anyone can easily apply to various operating systems and applications that require secondary authentication (additional authentication) to strengthen the security of information assets. It is a solution that supports multi-layer security level authentication optimized for security.

The BaroPAM solution is a zero-trust security model. It is a 3-step authentication solution using module authentication biometrics that does not require a separate authentication server. It is highly secure, simple, requires no management, has no problems, and can be easily applied by anyone immediately. It is a low-cost, highly efficient solution that does not require the introduction of additional servers or DBs when introducing the solution.

Passwords are never safe, and now you need to replace your password or perform secondary authentication (additional authentication) every time you access the server.

▣ BaroPAM Features

▶Supports secondary authentication using a module authentication method that does not require a separate authentication server
▶Guaranteed service with fast authentication speed (average authentication time within 0.01 seconds)
▶Provides simple convenience by using smartphones, etc. as an authentication key generation medium
▶Provides app lock on/off function to prevent authentication information from being exposed when the smartphone is lost
▶iOS provides a function that allows self-authentication
▶Authentication possible even in frequently occurring communication failures or secure areas
▶Biometric authentication (fingerprint recognition, face recognition) function provided when running the BaroPAM app
▶Even if the authentication information is forged or altered during the authentication process, bypass authentication is not possible.
▶Starting from a simple (loose) configuration, it can evolve into a more complex (robust) security system.
▶Provides BaroPAM app source obfuscation and screen capture prevention functions
▶Individual grant of one-time authentication key and generation cycle for each information asset/account
▶Emergency one-time authentication key provided when smartphone is not available
▶Use of the globally recognized 512Bit standard Hash function (HMac-SHA512 / Internet security standard IETF RFC 6238)
▶Supports Time-Sync and dynamic HMac Key methods recommended by the Financial Supervisory Service
▶Dynamic security such as one-time/volatile that changes every time or is used once and then discarded
▶ Authentication bypass (bypass techniques, fatigue attacks, etc.) and MFA fatigue attacks are impossible.
▶Login is not possible even if account information is stolen by abusing the automatic login function.
▶Applicable to all fields that require secondary authentication, such as various information assets (PAM/SQL/HTTP authentication is also supported during RADIUS authentication of information assets)
▶Provides the ability to set the number of authentication limits and time limit (e.g., 3 times in 30 seconds)
▶Provides a function to prevent man-in-the-middle attacks
▶Provides ACL function for accounts that can be allowed/excluded from secondary authentication
▶Provides free customization and linked development with various applications (API linkage such as Java, C, C++, etc.)

“If you don’t do anything, you’ll get halfway” is an old saying, and it doesn’t apply in the cloud era. With a new era comes a new protective device. Systems and infrastructure are constantly being replaced with new ones, but it is time for each of us to examine ourselves as to why we are holding on to the old ones.

The conclusion is not whether “secondary authentication was introduced,” but rather “what kind of secondary authentication was introduced,” including technology and security.

“Trust nothing” = “Trust no one” = “Keep verifying”

The future trend of information security will be to strengthen security and minimize user inconvenience. Passwords that do not need to be remembered! BaroPAM will be with you.

Consultation inquiry mc529@nurit.co.kr
Updated on
Feb 10, 2025

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection

What’s new

메뉴화면 기능 개선.

App support

Phone number
+821027714076
About the developer
이종일
mc529@hanmail.net
South Korea
undefined