[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2010018587A1 - Verification of document and it's conveying information for the reliable authentification - Google Patents

Verification of document and it's conveying information for the reliable authentification Download PDF

Info

Publication number
WO2010018587A1
WO2010018587A1 PCT/IN2008/000500 IN2008000500W WO2010018587A1 WO 2010018587 A1 WO2010018587 A1 WO 2010018587A1 IN 2008000500 W IN2008000500 W IN 2008000500W WO 2010018587 A1 WO2010018587 A1 WO 2010018587A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
signal
authenticating
government
documents
Prior art date
Application number
PCT/IN2008/000500
Other languages
French (fr)
Inventor
Mohandas Damodar Alle
Original Assignee
Mohandas Damodar Alle
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mohandas Damodar Alle filed Critical Mohandas Damodar Alle
Priority to PCT/IN2008/000500 priority Critical patent/WO2010018587A1/en
Publication of WO2010018587A1 publication Critical patent/WO2010018587A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Definitions

  • the present invention generally relates to a reliable document verification system and, in particular, relates to a reliable document verification system using a public key cryptosystem.
  • This service provides the users to store their certificates and upload their documents with the help of attorneys to get the copy is certified before uploading on their account to make sure to prevent fraudulent.
  • the present invention provides a particularly verified document system.
  • the users store their certificates and upload their documents with the help of attorneys to get the copy is certified before uploading on their account to make sure to prevent fraudulent.
  • This process works as, all stored Intellectual Properties (certificates / documents / plans / agreements/deeds) are TRUE and ORIGINAL based on terms and conditions of individual government body of each country. This process involves tie-up with governments to get certified these TRUECOPIES with Originality of its concept. This will help Governments to reduce fraudulent, in any sector/process of government/semi- government/public/private/corporate/indivfdual in all manners and easier way to get process done and verified smoother and faster with secure way.
  • This Invention particularly relates to document verification system.
  • specific types of documents are issued on behalf of one or more specific person(s) or object(s) it may be necessary to verify the association of such document with the person(s) or object(s) to deter the unauthorized use of such document on behalf of a person(s) or object(s) not associated with the document.
  • the fastest and easiest way to verify an association is by visual verification of validated information concerning the authorized person(s) and/or object(s) and the actual person(s) and/or object(s) for which use of the document is sought.
  • An individual whose responsibility it may be to verify the authorized use of a document on behalf of specific person(s) or object(s) can easily confirm such authorized use if he or she has immediate availability to such verified information concerning the person(s) or object(s) associated with the document.
  • he present Invention provides the users to store their certificates and upload their documents with the help of attorneys to get the copy is certified before uploading on their account to make sure to prevent fraudulent.
  • This process works as, all stored Intellectual Properties (certificates / documents / plans / agreements/deeds) are TRUE and ORIGINAL based on terms and conditions of individual government body of each country. This process involves tie-up with governments to get certified these TRUECOPIES with Originality of its concept. This will help Governments to reduce fraudulent, in any sector/process of government/semi-government/public/private/corporate/individual in all manners and easier way to get process done and verified smoother and faster with secure way.
  • IP Intellectual Property
  • This Certificate will be having one unique certificate number which is for security reason.
  • IP & Finger Print will be stored on one server, which is fully protected and under 24/7 monitoring machine to provide security.
  • Each user unique certificate number will be stored referring their documents to cross verify and match with other process's codes in this process cycle.
  • Step-1 &2 Once Step-1 &2 are cleared, then both the unique certificate numbers clubbed and based on some algorithm adding to it one secret code will be generated and shared with govence/s for record.
  • step 1 to 3 document/s values will be updated in user database and those document/s values will be updated in Chip Integrated Card.
  • OR user can visit authorized official body office/government, if they miss updates on document/s issuing time.
  • Patent Holder will be proving to the authorizing body under his agreement, with terms & conditions.
  • Patent Holder will give some funds to government, this can be monthly/quarterly/yearly basis to clear a settled amount at a given and agreed terms & conditions. Payment based on user/s, and onetime payment only for each user/s. When Government Official verify the certified documents, for each user/s some funds which is decided by Patent Holder will be given as goodwill, Patent Holder is having full rights to change this at anytime, this payment is one time only.
  • Patent Holder holds the rights to change this Terms & Conditions at any point of time. WHAT ABOUT UPDATES FEES:
  • TRUECOPIES will have one web portal for online access.
  • Finger Prints validation for users / authorized / legal / government /document (s) issuing officials finger prints are stored for process record to maintain a track of the process involvement, to prevent internal fraudulent and protection.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This Invention provides to get verified and very reliable authentication certified by private and government officials by taking finger prints and approves the document/s for further steps to get move ahead to final step for chip integrated card delivery, this is a unique and non-match able method to prevent from copying existing IP. All the steps involve in private and government officials verification and certification involved secure and safer ways of encryption and decryption with super secret code to match prevent from fraudulent in the process, finally all stored IP will get secret codes of each IP, which is stored in user database, user data will be stored on one chip integrated card for user use, this card will help in simple term, for entire world to make faster and safer document verification whenever required.

Description

VERIFICATION OF DOCUMENT AND IT'S CONVEYING INFORMATION FOR THE RELIABLE AUTHENTICATION
FIELD OF INVENTION:
The present invention generally relates to a reliable document verification system and, in particular, relates to a reliable document verification system using a public key cryptosystem. this service provides the users to store their certificates and upload their documents with the help of attorneys to get the copy is certified before uploading on their account to make sure to prevent fraudulent.
OBJECT OF THE INVENTION:
The present invention provides a particularly verified document system. Wherein The users store their certificates and upload their documents with the help of attorneys to get the copy is certified before uploading on their account to make sure to prevent fraudulent. This process works as, all stored Intellectual Properties (certificates / documents / plans / agreements/deeds) are TRUE and ORIGINAL based on terms and conditions of individual government body of each country. This process involves tie-up with governments to get certified these TRUECOPIES with Originality of its concept. This will help Governments to reduce fraudulent, in any sector/process of government/semi- government/public/private/corporate/indivfdual in all manners and easier way to get process done and verified smoother and faster with secure way.
This process will be considered with individual country law to maintain their privacy and confidentiality. BACKGROUND OF THE INVENTION:
This Invention particularly relates to document verification system. When specific types of documents are issued on behalf of one or more specific person(s) or object(s) it may be necessary to verify the association of such document with the person(s) or object(s) to deter the unauthorized use of such document on behalf of a person(s) or object(s) not associated with the document. The fastest and easiest way to verify an association is by visual verification of validated information concerning the authorized person(s) and/or object(s) and the actual person(s) and/or object(s) for which use of the document is sought. An individual whose responsibility it may be to verify the authorized use of a document on behalf of specific person(s) or object(s) can easily confirm such authorized use if he or she has immediate availability to such verified information concerning the person(s) or object(s) associated with the document.
BRIEF DESCRIPTION OF THE INVENTION:
he present Invention provides the users to store their certificates and upload their documents with the help of attorneys to get the copy is certified before uploading on their account to make sure to prevent fraudulent. This process works as, all stored Intellectual Properties (certificates / documents / plans / agreements/deeds) are TRUE and ORIGINAL based on terms and conditions of individual government body of each country. This process involves tie-up with governments to get certified these TRUECOPIES with Originality of its concept. This will help Governments to reduce fraudulent, in any sector/process of government/semi-government/public/private/corporate/individual in all manners and easier way to get process done and verified smoother and faster with secure way.
This process will be considered with individual country law to maintain their privacy and confidentiality.
TURE COPIES PROCESS:-
STEP-1:
User certificates/documents/agreements/deeds, all of user Intellectual Property (IP) will be verified in front of Lawyer/Attomey/who is having authority to certify while scanning the documents. Legal Official gives one certificate saying all the documents are certified in his presence, and takes user Finger Prints.
This Certificate will be having one unique certificate number which is for security reason.
And scanned IP & Finger Print will be stored on one server, which is fully protected and under 24/7 monitoring machine to provide security. Each user unique certificate number will be stored referring their documents to cross verify and match with other process's codes in this process cycle.
STEP-2:
From the Government one of official will verify all the documents which are certified in Step-1.
Here in this step also, government official gives one certificate saying he personally verified all the documents and legal officials' certificate. Government official issued certificate having one unique number with prefix of the legal official's issued certificate, and also check Finger Prints again.
Unique certificate number of this step will be affix to the step-1 unique number. STEP-3:
Once Step-1 &2 are cleared, then both the unique certificate numbers clubbed and based on some algorithm adding to it one secret code will be generated and shared with govemment/s for record.
Here government will verify each document, with respective issuing body. After successful verification each document get one value and these values are stored in Chip Integrated Card and will be delivered to the user.
These will be stored in encrypted format, so this card can't be editable by anyone without decryption code. This decryption code will be with user only. And these details with one Chip Integrated Card will be delivered to user with very important registered mailing method. While delivering here again user's Finger Prints will be verified, after successful verification documents will be given to user, if user fails in any reason. Decryption code gets deactivated immediately. If there is a problem with Finger Prints Reader, then it will be delivered in presence of government verification office, which is verified in the Step-2. While giving these documents in official's office, Finger Prints will be taken at this point of time and once the user gets positive reply the decryption code gets active, and Chip Integrated Card will be delivered to the user.
HOW UPDATES DONE:
For any document/s updates again step 1 to 3 will be involved and in step 3 document/s values will be updated in user database and those document/s values will be updated in Chip Integrated Card.
AUTOMATION PROCESS:
In each department one Intelligent Device which reads user's Chip Integrated Card while issuing any new document/s, and these values will be updated and store in user database and user will get updated their cards immediately. By the document/s issuing body they will be having that authority, and this authority will be given by Patent Holder.
OR user can visit authorized official body office/government, if they miss updates on document/s issuing time.
HOW GOVERNMENT WILL BE GETTING THE INTELLIGENT DEVICES TO READ AND UPDATE THE USER DATA:
Patent Holder will be proving to the authorizing body under his agreement, with terms & conditions.
HOW GOVERNMENT WILL GET BENEFITED:
For Government Verification Patent Holder will give some funds to government, this can be monthly/quarterly/yearly basis to clear a settled amount at a given and agreed terms & conditions. Payment based on user/s, and onetime payment only for each user/s. When Government Official verify the certified documents, for each user/s some funds which is decided by Patent Holder will be given as goodwill, Patent Holder is having full rights to change this at anytime, this payment is one time only.
Patent Holder holds the rights to change this Terms & Conditions at any point of time. WHAT ABOUT UPDATES FEES:
This will be decided by Patent Holder and each time documents get updated which is not involved automation process then additional fees will be collected.
ANNUAL CHARGES:
This will be decided by Patent Holder.
WHAT NATION GETS BENEFITED BY DOING THIS?
1. Protecting fraudulent in document forgery.
2. Faster verification of documents.
3. Faster Process in all governments/semi-government / public / corporate / forms / individuals.
4. Security for original documents.
5. Connecting all at one hub.
HOW USER CAN GET ACCESS OF DOCUMENTS:
TRUECOPIES will have one web portal for online access.
WHO'S FINGER PRINTS WILL BE MAINTAIN FOR RECORDS:
Finger Prints validation, for users / authorized / legal / government /document (s) issuing officials finger prints are stored for process record to maintain a track of the process involvement, to prevent internal fraudulent and protection.
WHAT TYPE OF FEATURES WEB PORTAL HAS:-
1. User admin section where user can share documents online / apply for jobs in government / public / private / corporate / forms / individual sectors.
2. User can track applications.
3. Maintaining accounts for his users to give access to his documents online.
4. All documents opened are tracked by IP, TIME, DATE, number of times document viewed his users which they share to view documents.
5. All documents will be shared in encrypted manner and accessed by secure mode.
6. Applying and sharing will be done only via online or via Chip Integrated Card. This will again protect super fraudulent.
7. Users can take a back up of their documents for personal use.
8. Making all the process easy and faster with secure and safer mode for entire nation. And entire world with having different country with different government policies.

Claims

I CLAIM:Claim-1. A method of producing and authenticating a secure document Comprising the steps of: a) scanning said (certified by private and government officials by taking finger prints and approves) document to produce a first signal representative of an image of said at least a portion of said document; b) encrypting a second signal, comprising a representation of said image, said second signal being derived at least in part from said first signal; c) incorporating a coded representation of said encrypted second signal with said document; d) reading said coded representation of said second signal from said document; e) decoding said second signal; f) decrypting said decoded second signal; g) inputting said decrypted second signal to a display to display said representation of said image; h) comparing said document to said displayed image to authenticate said document.- 10 - Claim-2. A system for authenticating a plurality of documents, said system comprises: a) An authenticating source, said authenticating source including means for providing a first public key encryption key to a third party;b) Means, associated with said source, for providing an authentication message to said third party in the form of coefficient of a polynomial, said authentication message being encrypted by a second public key encryption key and including the decryption key for said first public key encryption key; means, associated with said third party, for generating variables and values to said polynomial and applying different ones of said variables and value to each of said plurality of documents; means, associated with an authenticating service, for recovering saidc) Authentication message from a plurality of different ones of said variables and values; and means, associated with said source, for providing the decryption key corresponding to said second public key encryption key to said authenticating service such that said authentication message can be decrypted._ H - Claim-3. The process of authenticating a secure document, where in shown on Fig: 1 , the comprising steps of:
1. Finger Prints Capturing by Legal/Government Officials.
2. Documents Scanning of Authorized Official updates on to the server, here official finger prints will be stored for verification and cross checking purpose. To protect fraud.
3. Legal Official Certification.
4. Government Official Verification certificate, including finger print checking.
5. Secret Code Development with includes Finger Prints value in it.
6. Chip Integrated Card (CIC) Development with encrypted values in it and decryption value in encrypted way.
7. Intellectual Devices to read CIC.
8. Secure Mailing System for CIC delivery.
9. Finger Prints validation, for users / authorized / legal / government /document (s) issuing officials finger prints are stored for process record to maintain a track of the process involvement, to prevent internal fraudulent and protection.
- 12 -
PCT/IN2008/000500 2008-08-11 2008-08-11 Verification of document and it's conveying information for the reliable authentification WO2010018587A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IN2008/000500 WO2010018587A1 (en) 2008-08-11 2008-08-11 Verification of document and it's conveying information for the reliable authentification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IN2008/000500 WO2010018587A1 (en) 2008-08-11 2008-08-11 Verification of document and it's conveying information for the reliable authentification

Publications (1)

Publication Number Publication Date
WO2010018587A1 true WO2010018587A1 (en) 2010-02-18

Family

ID=41668764

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2008/000500 WO2010018587A1 (en) 2008-08-11 2008-08-11 Verification of document and it's conveying information for the reliable authentification

Country Status (1)

Country Link
WO (1) WO2010018587A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003295A1 (en) * 2002-06-20 2004-01-01 David Elderfield Biometric document authentication system
US7330974B1 (en) * 1999-05-25 2008-02-12 Silverbrook Research Pty Ltd Method and system for delivery of a secure document
US20080037776A1 (en) * 2005-07-25 2008-02-14 Koichiro Akiyama Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus
US20080141033A1 (en) * 1995-02-13 2008-06-12 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080141033A1 (en) * 1995-02-13 2008-06-12 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US7330974B1 (en) * 1999-05-25 2008-02-12 Silverbrook Research Pty Ltd Method and system for delivery of a secure document
US20040003295A1 (en) * 2002-06-20 2004-01-01 David Elderfield Biometric document authentication system
US20080037776A1 (en) * 2005-07-25 2008-02-14 Koichiro Akiyama Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Similar Documents

Publication Publication Date Title
US20230104288A1 (en) Methods and systems for a digital trust architecture
ES2875391T3 (en) Issuance of virtual documents on a blockchain
ES2352743T3 (en) ELECTRONIC METHOD FOR STORAGE AND RECOVERING ORIGINAL AUTHENTICATED DOCUMENTS.
KR100822596B1 (en) Recording medium having electronic document management program recorded, electronic document management system and electronic document management method
CN109791660B (en) Data protection system and method
US20150356523A1 (en) Decentralized identity verification systems and methods
US20030014638A1 (en) System and method using information based indicia for securing and authenticating transactions
JP2008033789A (en) Identification/attribute authentication system and identification/attribute authentication method
CN1529856A (en) Internet third-pard authentication using electronic ticket
JPH10504150A (en) A method for securely using digital signatures in commercial cryptosystems
US20200274714A1 (en) System for, method of, and server computer system for implementing transformation of an original entity into a verifiably authenticable entity in a heterogeneous communications network environment
US7505945B2 (en) Electronic negotiable documents
KR20110113205A (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
KR101968079B1 (en) Electronic certificate management system and method thereof
EP0808535A1 (en) Electronic negotiable documents
Blythe Croatia’s computer laws: promotion of growth in E-commerce via greater cyber-security
CN110192194B (en) System and method for authenticating security certificates
CN114896616B (en) Policy processing method and system based on block chain
Kuechler et al. Digital signatures: A business view
WO2010018587A1 (en) Verification of document and it's conveying information for the reliable authentification
JP2005284327A (en) Receipt issuing system
KR100698517B1 (en) Electronic Passport based on PKI Digital Signature Certificate
JP2003066836A (en) Electronic signature method
MXPA04006873A (en) Method of sending and validating documents.
Capehart et al. Wired, Wonderful West Virginia-Electronic Signatures in the Mountain State

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08876735

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08876735

Country of ref document: EP

Kind code of ref document: A1