Document authentication method and system
A document authentication, document technology
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In order to facilitate the understanding of the present application, the present application will be described in more detail below in conjunction with the accompanying drawings and specific implementation methods.
[0047] The method developed by the application makes it possible to generate and store various types of documents to be certified or submitted to judicial or law enforcement agencies, including the information necessary to provide these documents when they are officially requested by judicial or law enforcement agencies. In addition, this method enables the registration and confirmation of the fact of fulfillment of various transactions or the exchange of information between interested parties to indicate the date of publication and the electronic communication channel used to identify the user.
[0048] In addition, the method developed by the application enables participation in the electronic exchange of digital data transmitted by clients of the proposed...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
