Principles (continue)

Previous Page (Principles)  |  Highlights  |  Home  |   Comparisons

The process works using ordinary public information (e.g., the user's name, his or her telephone number or e-mail address, a file name, transaction name, date, time, etc.) and secret information specific to a company, an agency or organization.

Highlights   |  Home Comparisons  Next Page (Principles Continue)

info@fpbaudin.com