Author: acrmnet

Welcome to our archive

In the banking sector, Acrm net has developed for CBI Globe, an engine for recognising invoices brought to discount by companies for all financial institutions. This platform, which includes inferential logic (AI), is able to alert financial institutions, the Internal Revenue Service and the Bank of Italy to risky situations in real time. The system […]

Read More

The solution conceived for Netter has improved and optimized the company’s operational management and contributed to consolidating the relationship of trust of Netter customers. aCrm net has created the CRM based on the needs of the Netter company by providing an associated app for shipyard workers and an app for Netter customers. 3 Entities interconnected […]

Read More

The introduction of tax credit assignment has given rise to several new mechanisms for managing the tax opportunity. Acrm net created for Harley & Dikkinson, a company operating in the fintech sector, a third-party platform for the management of the tax credit in compliance with the regulations in force, for the realisation of integrated offers […]

Read More

Web scraping is a particular crawling technique. A crawler – also called a bot or spider – is a piece of software that has the purpose of collecting all the information necessary to automatically index the pages of a site, analyze hyperlinks and find associations between search terms and classify them. Web scraping is used […]

Read More

My id is a mobile centric technology based on Multi-Factor Biometric Authentication. My-ID creates a Digital Biometric Identity and you can always bring it with yourself in your Biometric Wallet.

Read More

Face Anti Spoofing In the recent times as biometric recognition systems increase their performance, IT Managers have to take in great consideration possible direct attack; potential intruders may gain access to the IT system by directly interacting with the system input device, like a normal user would. Such attempts are referred as spoofing attacks. Our […]

Read More

Biometrics and Cryptography : The biometric Password   Biometrics provide a person with unique characteristics which are always there.  Can they be used as a cryptographic key?   First of all we can define  Conventional cryptography a methodology based on encryption keys, which are just bit strings long enough, usually 128 bit or more.  These […]

Read More