Method and system for monitoring of certificate information security

An information security and supervision system technology, applied in the field of credential information security supervision methods and systems, can solve problems such as easy copying, forgery or misappropriation, easy misappropriation, insecurity, etc., and achieve enhanced anti-counterfeiting effect, good anti-counterfeiting effect, and improved safety effect

Active Publication Date: 2013-09-18
广东云诺科技有限公司
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows users to monitor their credit card holdings remotely without physically touching any part they may want to carry around. It also includes an algorithm called VSECID (Vishnuetric Identity Verifier) that checks if there was another person who had previously been carrying away from your bank account before signing up for payment. By analyzing both user identification and fingerprint feature values, the securely manages the risk associated with storing sensitive personal details like social media accounts. Overall, this technology improves efficiency, safety, and protection against counterfeits while maintaining privacy rights over time.

Problems solved by technology

The technical problem addressed by this patented solution relating to preventing forgery and illegal access on credit card documents is that existing methods may result in these issues. Additionally, there exist cyber threats where individuals could copy or tamper with sensitive data like identification numbers (ID) cards or pass them through without permission from authorized users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring of certificate information security
  • Method and system for monitoring of certificate information security
  • Method and system for monitoring of certificate information security

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0099] In combination with the above embodiment of the credential information security supervision system, a specific embodiment of the credential information security supervision method of the present invention is as follows:

[0100] The credential information security supervision method includes a data collection step, a registration step, a certificate making step, a verification step and an authority authentication step, and after the certificate making step, an inquiry step is also included, and the data collection step includes:

[0101] S01. Collect the identity information and biometric information of the certificate obligee.

[0102] S02. After the identity information, biometric information and collection verification parameters are extracted and processed using a hash algorithm, the first private key is used to encrypt to generate a first digital signature value, and the collection verification parameters, identity information, biometric information and The first d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for monitoring of certificate information security. The method comprises the steps of acquiring a first label on a certificate, and acquiring a first information code; processing the first information code for reduction, and acquiring a location parameter, an accreditation verification parameter and a third digital signature value; verifying the legitimacy of the location parameter, the accreditation verification parameter and the third digital signature value; verifying whether information of the certificate is valid; acquiring biological features of a certificate holder, and matching and verifying the biological features of the certificate holder and biological features of a legal certificate holder stored in a certificate information database. By adopting the method, the authenticity of the certificate and the certificate holder can be verified by acquiring the first label of the certificate and the biological features of the certificate holder or query can be performed by acquiring a second label via an intelligent mobile terminal. Query and verification of certificate information can be performed, unified regulatory control can be realized, the anti-counterfeit effect is good, the security is high, and the method and the system can be widely applied in the field of certificate regulation.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 广东云诺科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products