Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
When utilizing our provisioning application to set up a device, it is configured with maximum security measures in place. The Kiosk Browser takes on the role of "device owner," which allows it elevated permissions compared to a typical installation. This enables the default launcher to be set automatically without needing any user action. Additionally, access to the status bar at the top of the screen is restricted through official methods rather than using workarounds. To initiate the provisioning process, the target device must be either brand new or have undergone a factory reset. This setup ensures that Kiosk Browser cannot be removed without performing a factory reset. Moreover, it prevents applications not present in the app drawer from launching, although apps initiated through JavaScript remain unaffected. Ultimately, these measures create a controlled and secure environment for the Kiosk Browser.
Description
Accurately differentiating between authentic users and potential threats requires the real-time identification of unique devices and the analysis of global historical data. However, device characteristics may evolve over time, which can lead to misidentifying the same device as a different entity. It is essential to gather ample data while ensuring user privacy is upheld, particularly in light of rigorous data protection laws. As new devices and operating systems are frequently introduced, remaining current and flexible is crucial for effective identification. Additionally, linking multiple device profiles to a single user necessitates a robust capability for cross-device tracking to maintain accuracy. There is also the challenge of manipulating user-agent information sent by browsers or applications to replicate legitimate device behavior. Maintaining a distinct device ID can be complicated when it faces tampering, modifications, or hijacking attempts. Moreover, distinguishing each device becomes increasingly difficult in challenging scenarios, such as factory resets, altered device locations, the detection of group control tools, script-based manipulations, and app reinstalls. Continuous innovation in detection techniques will be essential to address these evolving challenges effectively.
API Access
Has API
API Access
Has API
Integrations
Android
Apple iOS
HTML
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ProCo IT
Country
United Kingdom
Website
help.android-kiosk.com/en/article/kb-provisioning-devices-1kgrrg5/
Vendor Details
Company Name
TrustDecision
Founded
2018
Country
Singapore
Website
trustdecision.com/solutions/device-fingerprint
Product Features
Kiosk
Activity Reservations
Digital Signature
License Management
Onsite Printing
Remote Access
Secure Browsing
Ticket / Order Fulfillment
Touch Screen
Usage Reporting
Virtual Keyboard
Wireless Internet Access