niceHow™

.......
 

 

To solve a problem, the crux of the problem must be identified first.

Only after the crux is identified, effective measures can be taken to truly solve the problem.

 
  * How can niceChat allow all social apps to communicate across platforms?  
  * How can niceEmail eliminate bad e-mails?  
  * How can niceNobody track the real information of an anonymous account holder?  
 

* How can niceNobody monitor anonymous accounts of blacklisted members?

 
* How can nicePaMa prevent password interception?
* How can nicePass eliminate fake accounts?
  * How can SpamAccountKiller detect and kill mass generated fake accounts?  
 

 

How can niceChat™ allow all social apps to communicate across platforms?

What is the crux of communication across platforms?

A generic authentication mechanism allows all social apps to communicate across platforms,

including Skype, Whatsapp, LINE, WeChat, etc.

 
 

Please click the right image for more information with voice description and subtitles.

Version: English_220103A

Format: mp4

Size: 10.6 MB

Length: 4:10

Problem with playing mp4? only sound?

 
 

 

How can niceEmail eliminate bad e-mails?

What is the crux of e-mail problems?

A simple concept solves e-mail problems of decades.

 

 

Please click the right image for more information with voice description and subtitles.

Version: English_230706

Format: mp4

Size: 10.4 MB

Length: 5:11

Problem with playing mp4? only sound?

 
 

 

How can niceNobody track the real information of an anonymous account holder?

Anonymity of account holders is privacy that should be protected.

Then, where does the real information come from?

And how to link anonymous accounts with the source of real information without violating privacy?

The key is to establish a link using asymmetrically encrypted data so that -

the anonymous account administrator only knows how to make connection to the source of real information;

the source of real information does not know the anonymous account ID;

and only the public authority can combine data known by the anonymous account administrator and the source of real information, in accordance with laws and regulations, to obtain the real information about the anonymous account holder.

 

 

 

How can niceNobody monitor anonymous accounts of blacklisted members?

Everyone has the privacy right to own anonymous accounts.

Then, how to identify anonymous accounts owned by blacklisted members?

The key is that all account administrators should use asymmetrically encrypted data to establish links to the sources of account holders' real information.

Then, according to laws and regulations, for a blacklisted member, the public authority can collect the full list of anonymous account administrators who manage anonymous accounts owned by the blacklisted member, from the sources of the blacklisted member's real information.

The public authority can then obtain a full list of the blacklisted members' anonymous accounts from the account administrators based on the asymmetrically encrypted data used to establish links to the sources of real information.

Therefore, the anonymous accounts of the blacklisted member can be closely monitored by the public authority.

 

 

 

 

How can nicePaMa prevent password interception?

nicePaMa™ provides efficient and secure password management, freeing you from the password hassles.

It is different from from the password manager products on the market.

When using a password manager product to logon accounts, the passwords could be intercepted.

nicePaMa™ has a unique mechanism to prevent password from being intercepted.

 

Please click the right image for more information with voice description and subtitles.

Version: English_220908

Format: mp4

Size: 6.8 MB

Length: 3:36

Problem with playing mp4? only sound?

 
 

 

How can nicePass™ eliminate fake accounts?

What is the crux of fake account problems?

A unique mechanism disables the existing fake accounts right away.

No new fake accounts can be created.

 
 

Please click the right image for more information with voice description and subtitles.

Version: English_220615

Format: mp4

Size: 8.7 MB

Length: 4:49

Problem with playing mp4? only sound?

 
 

 

How can SpamAccountKiller detect and kill mass generated fake accounts?

Most likely, mass generated fake accounts are generated by a few computers or even one computer.

The key is to restrict to only one account enabled on one computer.

No matter how many fake accounts are generated, at most only the last one is feasible.

However, IP cannot be used to check mass generated fake accounts on the same device.

There are many ways to hide the IP.

It also should not use the serial number of the computer, which is too easy to be forged; besides, violation of privacy could be an issue.

It is required unique approach to achieve the goal.

 

 

Please click the right image for more information with voice description and subtitles.

Version: English_230707

Format: mp4

Size: 10.8 MB

Length: 5:17

Problem with playing mp4? only sound?

 
copyright© 2022-2023 by niceRaker®, Inc.  

230707