SOLUTION DOCUMENTS.

Slides:



Advertisements
Similar presentations
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Advertisements

preventing counterfeit …
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
1 DNA-based Tracking Technology. 2 Product Protection Overt (visible) or Covert (invisible) security marking options. –DNA MultiMatrix™ Hologram –Barcodes.
CHAPTER ONE YOUR NJ DRIVER LICENSE.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Advanced Secure Technologies Secure Document Technologies.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Describe direct data entry and associated devices, e. g
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Information Systems Design and Development Security Precautions Computing Science.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
Block Chain 101 May 2017.
Protecting Your Assets By Preventing Identity Theft
Introduction to Blockchain
The Revolutionary Benefits Of Blockchain
Muddmoon AC for Advanced Systems مضمون ايه سي للنظم المتطورة © 2016
English for Advance Learners I
Raihana Ferdous, Vallipuram Muthukkumarasamy
Agenda Item 3: Report of the New Technologies Working Group
Databases.
Smarter, safer Pharmaceuticals
RFID enabled Solutions
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Radio Frequency Identification (RFID)
Electronic Payment Systems
Bitcoin - a distributed virtual currency system
Authentication.
EMV® 3-D Secure - High Level Overview
Making Blockchain Real for Business
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Blockchain Adrian Zaragoza.
BLOCKCHAIN SUPPLY CHAIN DISRUPTIONS.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Implementation Of Blockchain In Healthcare Provision (Healthcare Industry Analysis)-Ken Research.
Importance of a Person’s Birth Record For Employment.
This presentation will begin shortly.
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Databases.
SOLUTION FOOD (Track and Trace)
SOLUTION LAND TITLES.
Breaking through with Blockchain
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Databases.
BLOCKCHAIN BASICS & LEGAL ISSUES
SOLUTION PHARMACEUTICALS
HOW BLOCK CHAIN COULD SHAPE THE FUTURE OF WEB DESIGN Many governments in the world have come up with laws of protecting data. This is meant to ensure the.
VeriCon Quality Certification Scheme
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Distributed Ledger Technology (DLT) and Blockchain
SOLUTION ID CARDS AND DRIVER’S LICENSES
SOLUTION Supply Chain.
Modernization of. Currency. Evolution Of Currency: Bartering System: Grains and cattle are popular in Barters. Firstly recorded in Egypt. Coinage: Metals.
TYRE MANAGEMENT SOLUTION
Blockchains and Smart Contracts for the Internet of Things
Commercial Data Processing
The OTENTIK trust network
Agenda Item 3: Report of the New Technologies Working Group
COMPUTER SCIENCE SEMINAR. INTRODUCTION WHAT IS BlOCKCHAIN?? A digital ledger in which transaction made are chronologically recorded without inclusion.
Client Process Pack.
Presentation transcript:

SOLUTION DOCUMENTS

” WHO WE ARE: A world without counterfeit and fraud. OUR AIM IS… ” A world without counterfeit and fraud. WHO WE ARE: VeriDoc Global is a patent protected Quick Response (QR) Code verification solution using public-key cryptography and Blockchain Technology, providing antifraud / hack proof document verification. www.veridocglobal.com VeriDoc Global Solution: Documents

TAX CERTIFICATES & BUSINESS REGISTRATION VeriDoc Global solves problems across multiple industries with the implementation of smart contracts. PASSPORTS IDENTIFICATION & BIRTH CERTIFICATES TAX CERTIFICATES & BUSINESS REGISTRATION FOOD & PRODUCTS (TRACK & TRACE) PHARMACEUTICALS (SERIALIZATION) PRECIOUS METALS & LUXURY GOODS LEGAL CONTRACTS, BANK STATEMENTS LAND TITLES & MORTGAGE DOCS SUPPLY CHAINS ORIGINAL EQUIPMENT MANUFACTURER CERTIFICATES & TRANSCRIPTS COLLECTIBLES, TOYS & ARTWORK www.veridocglobal.com VeriDoc Global Solution: Documents

6 12 120+ WE ARE WORLDWIDE COUNTRIES TEAM MEMBERS SOLUTIONS BRISBANE | NEW YORK CITY | HYDERABAD | SINGAPORE | DAR ES SALAAM | SWATAR COUNTRIES 120+ TEAM MEMBERS 12 SOLUTIONS www.veridocglobal.com VeriDoc Global Solution: Documents

VeriDoc Global has developed a solution that involves embedding a QR code on a document with a unique digital hash value inside the QR code. ICON-21.png www.veridocglobal.com VeriDoc Global Solution: Documents

The Problem: The Solution: VeriDoc Global has developed a solution that involves embedding a QR code on a document with a unique digital hash inside the QR code. There are many documents that we take for granted every day that are subject to document fraud. Graduation certificates, mortgage documents, legal documents, employment contracts, medical certificates and insurance contracts are just some examples of documents caught up in fraudulent activity around the world each year. There is currently no way of quickly verifying the document. CASE STUDY. Fake educational qualifications for example have been linked to deaths when people have been put at risk under the care of unqualified doctors and surgeons. Insurance claims have previously been turned down as the client is unable to verify whether or not their insurance policy has been changed over time. The hash holds a string of information that is then placed on the blockchain network for security, verification and most importantly, end user validation. www.veridocglobal.com VeriDoc Global Solution: Documents

OF VERIDOC GLOBAL’S DOCUMENT SECURITY SOLUTION KEY FEATURES OF VERIDOC GLOBAL’S DOCUMENT SECURITY SOLUTION FOREFRONT OF SECURITY REDUCTION IN COSTS INCREASED SAFETY Data is immutable on blockchain and can’t be breached via an attack on a single server or database. Governments and businesses save time and money lost each year due to document fraud. Employers can now verify that employees have the qualifications needed to fulfil their work duties and responsibilities. Asset 67@300x-8.png www.veridocglobal.com VeriDoc Global Solution: Documents

VERIDOC GLOBAL SOLUTION Fake documents are usually copies of genuine documents or illegally modified genuine documents made by unauthorised persons. There is currently no way of quickly verifying if the document you are looking at is a true and correct document. With tools such as Photoshop and Canva readily available, editing a document has never been easier. VeriDoc Global has developed a solution that involves embedding a QR code on a document with a unique digital hash inside the QR code. The hash holds a string of information that is then placed on the blockchain network for security, verification and most important end user validation. Our solution allows you to verify that the document you are looking at is the true and correct document. www.veridocglobal.com VeriDoc Global Solution: Documents

HOW DOES IT WORK? ORIGINAL FAKE QR READING APP Using any QR reading app, hold your device over the QR code of document and it will scan it. The app will show you the true and correct document so that you can compare to see if the document is an original or a fake. www.veridocglobal.com VeriDoc Global Solution: Documents

HOW DOES THE HASH VALUE WORK? The system looks at the hash value inside the QR code. Then checks the hash value on the blockchain. The system displays information and identifiers that are linked to the hash value. www.veridocglobal.com VeriDoc Global Solution: Documents

How does the QR Code work? QR codes are a type of matrix barcode or two-dimensional barcode. A standard QR code can hold up to 3Kb of data, compared to a standard barcode which holds less than 100 characters. VeriDoc Global uses a unique digital hash value that is stored on the QR code. When a QR code reader is used to scan the QR code, the system looks at the unique hash value and then checks that value on the blockchain. The system verifies that the hash value exists on the blockchain and then displays the information that is linked to the hash value. This significantly improves supply chain management because blockchain technology prevents the data and the QR code from ever being changed or removed. www.veridocglobal.com VeriDoc Global Solution: Documents

What if someone copies the QR code? THE VERIDOC GLOBAL PROTOCOL DETERS COUNTERFEITERS FROM COPYING A QR CODE AND ALSO PREVENTS THEM FROM USING THEIR OWN QR CODES. What if someone copies the QR code? Success factors: Each document has a unique hash value and can’t be verified in two places at once. If the data collected reports this occurrence, the QR code can be blocked or put into quarantine. The VeriDoc Global QR code reader allows the document producer to have 100% control over the QR codes that are verifiable. Counterfeiters who try to replicate the process with their own QR codes will not be able to get past the security checks that take place using the VeriDoc Global app. www.veridocglobal.com VeriDoc Global Solution: Documents

What About RFID Chips ? There is no doubt that RFID technology has many benefits, however RFID also has its vulnerabilities. Some of the reasons why RFID technology is so vulnerable are: RFID chips use “contactless technology” which means that data is transferred over the airwaves. There is plenty of evidence that shows that RFID tags can and have been hacked. RFID tags can be read without your knowledge. Unlike magnetic strips and QR codes which need to be swiped or scanned, anyone with an RFID tag reader can read your RFID tag without you knowing. RFID tags can be read from greater distances. Most RFID systems are designed so that the distance between the tag and the reader are kept to a minimum, however a high gain antenna can be used to read tags from greater distances, which leads to privacy issues www.veridocglobal.com VeriDoc Global Solution: Documents

Document Producer and Verification Flow www.veridocglobal.com VeriDoc Global Solution: Documents

DOCUMENT CREATOR FLOW www.veridocglobal.com CREATE A DOCUMENT Issuer creates a document. GENERATE QR CODE VeriDoc Global generates a unique QR code and places the QR code inside of the document. DOCUMENT CREATOR FLOW GENERATE PDF IN CLIENT’S SECURED SERVER VeriDoc Global generates a PDF from the new document and stores this on the client’s secured server. GENERATE UNIQUE HASH VALUE ON BLOCKCHAIN VeriDoc Global generates a unique hash value for the document and places this on the blockchain. POPULATE THE DATABASE VeriDoc Global populates a database with the unique hash value, blockchain transaction record and URL of the PDF (to preview the document original). www.veridocglobal.com VeriDoc Global Solution: Documents

DOCUMENT READER FLOW www.veridocglobal.com QR CODE READER Document is scanned using a QR code reader. PREVIEW ORIGINAL DOCUMENT User is redirected to a secure VeriDoc Global webpage that displays the unique hash value, blockchain transaction record and preview of the document original. DOCUMENT READER FLOW VISUAL INSPECTION User validates the authenticity of the document by visual inspection. VALIDATE HASH VALUE ON BLOCKCHAIN User may validate the unique hash value on the blockchain and verify that the hash values are identical. INFORMATION UPDATE The QR code can be updated with additional information showing amendments to the original document (optional). www.veridocglobal.com VeriDoc Global Solution: Documents

THE FUTURE OF Document Security www.veridocglobal.com VeriDoc Global QR Code Reader App Available Now