appwisp
  • App explorer
  • SDKs insights
  • API
  • Contact
  • About
  • API
  • Github
© 2025 appwisp.com

truePACS

com.pams.truesa

Total installs
36(36)
Rating
unknown
Released
March 17, 2025
Last updated
January 1, 1970
Category
Productivity
Developer
iCrypto, Inc.
Developer details

Name
iCrypto, Inc.
E-mail
[email protected]
Website
unknown
Country
United States
Address
unknown
Android SDKs

  • No items.
truePACS Header - AppWisp.com

Screenshots

truePACS Screenshot 1 - AppWisp.com
truePACS Screenshot 2 - AppWisp.com
truePACS Screenshot 3 - AppWisp.com
truePACS Screenshot 4 - AppWisp.com

Description

The application implements National Security mandates from government and quasi-government standards bodies to secure Critical Infrastructure. Specifically, the application layers biometric verification for users entering secure facilities using physical credentials such as magnetic stripe cards and NFC tags. In addition, the application provides for collection of high accuracy geocoordinates in the background for users as they traverse through secure facilities in order to track and trace in case of theft, vandalism, and terrorism. The location collection is done for additional purposes of occupancy determination of building and zones in case of emergencies such as fire, terrorism, flooding, etc.
The application operates continuously in the background, with permission from user, as long as they are in a critical zone identified by the enterprise.
The location data is sent as bundled encrypted packets to servers, which then store it in encrypted form on databases secured with policy control and biometric access. Although the raw location data is available to a select few command-level personnel, the main purpose is to alert and alarm in case of suspicious activity.
An additional important purpose is to be able to communicate with users in case of site emergency. This requires user to have the application in the background at all times as long as they are on site.
Users can opt out of the service by closing the application. However, this will trigger an alert to armed site security. Our customers are operating critical nationwide services - telecommunications, power, water, etc - and would consider the application an important resource in securing their infrastructure.
On a last note, the application stops storing location data when the user is not on site.
This is not a traditional consumer application but rather is to be considered a core security service for employees, contractors, and visitors to buildings and facilities that house expensive and critical infrastructure. They are made aware of the application purpose not only within the app but also in corporate communications and employee training sessions.