SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1944
Keep It – A system to store certificates and develop a profile
Amal Shaju1, Arun Joseph2, Smitha Joseph3
1,2 B.Tech Student, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology,
Kerala, India
3 Assistant Professor, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology,
Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Keep-It is a certificate wallet which is an
alternative to reduce workload in carrying certificate with
us. We store the certificates of different formats like
medical, professional, birth, driving license, course
certificates etc. The keep it will have separate profile which
is verified and authenticated using norms and conditions of
each individual and have separate area for uploading the
certificates. The certificate uploaded are original copy and it
is secured with a digital signature for security reasons and
later the file cannot be tampered. The profile will generate a
link where the other user can view profile and certificates he
holds in the wallets. As this wallet is a web application it is
easy to swap between pages and can be run on any device,
also the web app can be added to home screen as an
application for later time use. The password of the wallet
can also be stored and user can access the wallet even
offline and changes made will be effected when internet is
available.
1. INTRODUCTION
A Certificate of any type is a document or seal certifying
the authenticity of something, it can be any type of
certificate academic, medical, professional, birth, driving
etc. A Certificate Wallet refers to an electronic device that
allows an individual to store certificates of any type in a
wallet. This includes certificate with a verification id, so if
the certificate uploaded to the wallet is authenticated by
an authority or an organization. The certificate holds a
digital signature which is valid digital signature gives a
recipient reason to believe that the message was created
by a known sender (authentication), that the sender
cannot deny having sent the message. Advanced marks are
most usually utilized as a part of the fields programming
dissemination, budgetary exchanges, contract
administration programming, and in some different
situations where it is important to recognize falsification
or altering or some other interruptions. Advanced marks
utilize topsy-turvy cryptography.
A profile tells individuals that a record of open intrigue is
true. A record might be confirmed on the off chance that it
is resolved to be a record of open intrigue. Normally this
incorporates accounts kept up by clients in music, acting,
mold, government, legislative issues, religion, news
coverage, media, games, business, and other key intrigue
territories. The web application is brisk and responsive
with the end goal that once the page is stacked the
swapping between the pages does not require some other
downloading of information since this done utilizing
precise. The site page can be included as a symbol the
home screen.
A confirmed client approach Certification wallet Analytics.
Presently, anybody can gain admittance to Certification
wallet systematic through the typical channels, however
that includes turning into a promoter. Keeping in mind the
end goal to be qualified to be a publicist, you require to be
in particular areas where Twitter permits publicizing.
Certain nations aren't qualified, for instance. You can see
the list here. Your record additionally should be genuinely
dynamic; you can't join and turn into a publicist inside a
day, or even seven days.
The principle advantage of confirmation, obviously, is the
believe it accompanies. When you're confirmed, the wallet
of this record is who it cases to be." This is imperative
when it's extraordinarily simple to make a record with a
minor error or extra word in the URL, utilize a similar
show name and picture as another substance, and
continue acting like that element. Confirmation isn't an
ideal answer for this issue. All things considered, you must
be confirmed to get that sign of trust, and only one out of
every odd business can be checked. This once in a while
returns to hurt private companies, whose more wise
group of onlookers individuals won't not put stock in due
to their absence of confirmation. Of course, on the other
side, if confirmation worked constantly, frauds wouldn't
be fruitful. Indeed, even checked organizations get fakers
that effectively trick clients, since clients, in general, aren't
extremely canny. They won't not know or they won't not
mind what that blue check stamp means, thus they never
acknowledge they're giving their data to a sham demand
from the client of such records along these lines, you'll
need to evacuate that assurance all together.
Verification is likewise fantastically critical for client
outreach. On the off chance that it is a business kind of
authentication or instructive testament you need to
confirm it by an outsider or an association and include a
computerized signature with encryption procedures to
guarantee the genuineness of the endorsement, you nearly
must be checked. No sagacious client will give an ounce of
individual data to a record that doesn't have a
confirmation check, paying little respect to how
dependable they look. I do need to determine keen clients,
obviously; numerous less wise clients do substantially less
shrewd things consistently.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1945
2. SYSTEM ANALYSIS
In the analysis it is a way toward concentrate a strategy or
business with a specific end goal to distinguish its
objectives and purposes and make frameworks and
methods that will accomplish them in an effective way.
Another view sees framework examination as a critical
thinking procedure that disintegrates a framework into its
segment pieces with the end goal of the concentrate how
well those segment parts work and communicate to
achieve their motivation. Examination and union, as
logical techniques, dependably go as one; they supplement
each other. Each union expands upon the consequences of
a first examination, and each investigation requires a
consequent blend keeping in mind the end goal to confirm
and remedy its outcomes.
2.1 EXISTING SYSTEM
There is just a single frameworks existing at this point. It is
an administration site named DIGILOCKER where u can
simply transfer authentications. The framework needs
security issues and helps us to believe the authentications
since it isn't a checked profile and any individual can
control information in the locker, its only a locker idea of
putting away the declarations can be altered and may not
be unique duplicate. DigiLocker is an "advanced locker"
benefit worked by the Government of India that empowers
Indian natives to store certain official records on the
cloud.
This framework offers just less stockpiling which is 1 GB
of storage room is offered to clients to store recognizable
proof card issued by government offices, instruction
endorsements, PAN cards, driving permit, vehicle
proprietorship records and some different archives.
Clients need to have an Aadhar card to utilize DigiLocker.
For join, the Aadhar card number and the one-time secret
word sent to the Aadhar-related versatile number, should
be entered. For later log-ins, the client can set their own
particular secret word it interface the record to Facebook
or Google logins. The beta variant of the administration
was taken off in February 2015,and propelled by the
Prime Minister on 1 July 2015.
There is just 1 frameworks existing at this point. It is an
administration site named DIGILOCKER where u can
simply transfer endorsements. The framework needs
security issues and helps us to believe the endorsements
since it isn't a confirmed profile and any individual can
control information in the locker, its only a locker idea of
putting away the authentications can be altered and may
not be unique duplicate. DigiLocker is a "computerized
locker" benefit worked by the Government of India that
empowers Indian nationals to store certain official records
on the cloud. This framework offers just less stockpiling
which is 1 GB of storage room is offered to clients to store
distinguishing proof card issued by government offices,
instruction declarations, PAN cards, driving permit,
vehicle possession records and some different archives.
Clients need to have an Aadhar card to utilize DigiLocker
2.2 PROPOSED SYSTEM
A Certificate Wallet alludes to an electronic gadget that
enables a person to store authentications of any sort in a
wallet. This incorporates endorsement with a
confirmation id, so if the declaration transferred to the
wallet is validated by an expert or an association. The
declaration holds a computerized signature which is a
numerical plan for showing the genuineness of advanced
messages or records. An authentic propelled stamp gives a
recipient inspiration to assume that the message was
made by a known sender (confirmation) , that the sender
can't deny having sent the message (non-disavowal), and
that the message was not balanced in movement.
Advanced marks are a standard component of most
(cryptographic convention) suites, and are normally
utilized for programming dispersion, budgetary
exchanges, contract administration programming, and in
different situations where it is imperative to identify
phony or altering.
Wallet essentially is outlined in type of a wallet utilizing
Typescript and Angular into a Web Application with the
goal that it is anything but difficult to utilize and can be
gotten to from any gadget. The wallet idea is basic as that
it can hold any kind of testament of our decision whether
it is of instructive, affirmation course declaration,
restorative, proficient or any looked for can be put away
and saw by the clients like a wallet we convey. The profile
will have a connection created and this connection will be
the URL to the profile and the profile is checked by an
association or by other security and confirmation criteria
the site gives .Though it is a Web Application it has
awesome favorable position of client clicks "Add to home
screen", they will see the application being included the
home screen. Confirmation of the wallet is likewise
extraordinarily vital for client outreach.
On the off chance that it is a business sort of declaration or
instructive endorsement you need to confirm it by an
outsider or an association and include an advanced mark
with encryption systems to guarantee the legitimacy of the
authentication, you nearly must be checked. No astute
client will give an ounce of individual data to a record that
doesn't have a confirmation check, paying little mind to
how dependable they look. I do need to determine canny
clients, obviously; numerous less clever clients do
substantially less insightful things consistently.
3. SYSTEM DESIGN
The wallet KEEP-IT will be advanced pocket to hold
testament in computerized arrange where it can be gotten
to through a URL and this connection will be produced by
the watcher who needs the sort of declarations as
indicated by the class of endorsements. This module
comprise of how authentications are ordered by the kind
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1946
of the declaration and this will be in the organization of
any kind let it be testaments of scholastics, medicinal,
proficient, birth ,driving and so forth. A Certificate Wallet
alludes to an electronic gadget that enables a person to
store testaments of any sort in a wallet. This incorporates
testament with a confirmation id, so if the declaration
transferred to the wallet is validated by a specialist or an
association.
The authentication holds an advanced mark which is
substantial computerized signature gives a beneficiary
motivation to trust that the message was made by a
known sender (authentication), that the sender can't deny
having sent the message and that the message was not
adjusted in travel. Advanced marks are a standard
component of most suites, and are normally utilized for
programming dispersion, money related exchanges,
contract administration programming, and in different
situations where it is vital to recognize fraud or altering.
The Project we are creating has two modules mainly:
1 Profile view and Add certificate
2 Authentication and Digital signature
Fig – 1 : Flowchart of system
3.1 Profile View and Add Certificates
Each profile will have isolate see as per the client it might
be ensured or open profile and individuals with the sort
will have the capacity to see the profile in the way he
needs for ex: on the off chance that it is instructive client
he will have the capacity to see instructive endorsements
through the connection gave to him from the other client,
profile of each client has a connection created and this
connection is the thing that we are utilizing as a diverting
technique to the profile, utilization of this connection is
that we can utilize this connection even in resumes and as
an individual testament wallet interface.
A profile tells individuals that a record of open intrigue is
legitimate. A record might be checked on the off chance
that it is resolved to be a record of open intrigue.
Ordinarily this incorporates accounts kept up by clients in
music, acting, form, government, legislative issues,
religion, news coverage, media, games, business, and other
key intrigue zones. The web application is fast and
responsive with the end goal that once the page is stacked
the swapping between the pages does not require some
other downloading of information.
3.2 Authentication and Digital signature
We require a profile which extremely secure and to be
certain that the authentications transferred are honest to
goodness and unique duplicate of the testament for that
the this record will be secured with an open key
encryption gauges and by an outsider whoever it might be
a foundation or an association and will be confirmed and
this archive will be secured with a computerized signature
and the information can't be altered or reproduced,
utilization of QR code is additionally utilized another
security reason all together for the elective reference and
accessibility of the sort of information.
An authentic propelled stamp gives a recipient inspiration
to assume that the message was made by a known sender
(confirmation) , that the sender can't deny having sent the
message (non-disavowal), and that the message was not
balanced in movement. The profile will produce a
connection where this connection is utilized a connection
to our profile and it is made basic as that the outside client
just need this so they can see the profile and his
endorsements with the state of authentications that is
open unmistakable and the outer client can comprehend
about his profile through the connection. All connects to
different sites must take after certain designing guidelines.
4. CONCLUSION
KEEP IT will always be a companion with all age groups to
carry their certificates digitally and to provide all the
information about the person just through a URL link. The
link generated will redirect the user to view the verified
profile and the certificates he or she holds in keep it
wallet. An additional feature of this wallet is that we can
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1947
save passwords which is not again visible even for the
user and when the user once click this will redirect and
will load the website. A verified profile will show a view
that is needed for the client and easy scroll through the
certificates necessary. It will also later become an
alternative for curriculum vitae and no longer needed to
carry the resume because the profile will be genuine and
the certificates are authenticated using a third party
organization and tamper proof with a digital signature
.The wallet is portable, safe and easy access because it can
be retrieved anywhere just through a link and the benefit
of reducing paper with less hard copies of the certificates,
and lastly it is the most convenient way to carry the
original certificates with you.
REFERENCES
[1] Francesco Buccafurri; Gianluca Caminiti; Gianluca Lax,
“Signing the document content is not enough: A new
attack to digital signature”, ICADIWT, Pages: 520 –
525, 2008 IEEEXplore
[2] V.Nagarajan, “ Secure Data Transmission using
Content Fingerprinting Digital Watermarking
Techniques”, The 30th International Technical
Conference on Circuits/Systems, Computers and
Communications (ITC-CSCC 2015)June 29-July 2 at
Grand Hilton Seoul, Seoul, Korea .
[3] J. Barr; B. Bradley; B.T. Hannigan,"Using digital
watermarks with image signatures to mitigate the
threat of the copyattack”,ICASSP, 2000 IEEE.
[4] F. Leclerc and R. Plamondon, “Automatic signature
verification: The state of the art1989–1993,”
International Journal of Pattern Recognition and
Artificial Intelligence, vol. 8, no. 03, pp. 643–660,
1994.
[5] A. Pansare and S. Bhatia, “Offline signature verification
using neural network,” International Journal of
Scientific & Engineering Research, Volume3, no. 2,
2012

Mais conteúdo relacionado

Mais procurados

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...IRJET Journal
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...IRJET Journal
 
Digital signature certificate provider in delhi
Digital signature certificate provider in delhiDigital signature certificate provider in delhi
Digital signature certificate provider in delhieSign DSC
 
Mind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYCMind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYCSignzy
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology101 Blockchains
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5DigiLocker
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3DigiLocker
 
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking SectorAutomated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sectordbpublications
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4DigiLocker
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And CertificationsBlockchain Council
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...IJECEIAES
 

Mais procurados (20)

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
 
Digital signature certificate provider in delhi
Digital signature certificate provider in delhiDigital signature certificate provider in delhi
Digital signature certificate provider in delhi
 
Mind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYCMind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYC
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Access management
Access managementAccess management
Access management
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
 
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
 
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking SectorAutomated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sector
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
 

Semelhante a IRJET- Keep It – A System to Store Certificates and Develop a Profile

An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Identity Verification
Identity VerificationIdentity Verification
Identity VerificationIDology, Inc
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxDigital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxChristopher Wynder
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINIRJET Journal
 
Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer AuthenticationIRJET Journal
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology MarkPeter Bihr
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Microsoft Tech Community
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryNitin Patidar
 

Semelhante a IRJET- Keep It – A System to Store Certificates and Develop a Profile (20)

An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Identity Verification
Identity VerificationIdentity Verification
Identity Verification
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdoxDigital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdox
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
Application on Know Your Customer Authentication
Application on Know Your Customer AuthenticationApplication on Know Your Customer Authentication
Application on Know Your Customer Authentication
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 
test
testtest
test
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 

Último (20)

System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 

IRJET- Keep It – A System to Store Certificates and Develop a Profile

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1944 Keep It – A system to store certificates and develop a profile Amal Shaju1, Arun Joseph2, Smitha Joseph3 1,2 B.Tech Student, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology, Kerala, India 3 Assistant Professor, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Keep-It is a certificate wallet which is an alternative to reduce workload in carrying certificate with us. We store the certificates of different formats like medical, professional, birth, driving license, course certificates etc. The keep it will have separate profile which is verified and authenticated using norms and conditions of each individual and have separate area for uploading the certificates. The certificate uploaded are original copy and it is secured with a digital signature for security reasons and later the file cannot be tampered. The profile will generate a link where the other user can view profile and certificates he holds in the wallets. As this wallet is a web application it is easy to swap between pages and can be run on any device, also the web app can be added to home screen as an application for later time use. The password of the wallet can also be stored and user can access the wallet even offline and changes made will be effected when internet is available. 1. INTRODUCTION A Certificate of any type is a document or seal certifying the authenticity of something, it can be any type of certificate academic, medical, professional, birth, driving etc. A Certificate Wallet refers to an electronic device that allows an individual to store certificates of any type in a wallet. This includes certificate with a verification id, so if the certificate uploaded to the wallet is authenticated by an authority or an organization. The certificate holds a digital signature which is valid digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that the sender cannot deny having sent the message. Advanced marks are most usually utilized as a part of the fields programming dissemination, budgetary exchanges, contract administration programming, and in some different situations where it is important to recognize falsification or altering or some other interruptions. Advanced marks utilize topsy-turvy cryptography. A profile tells individuals that a record of open intrigue is true. A record might be confirmed on the off chance that it is resolved to be a record of open intrigue. Normally this incorporates accounts kept up by clients in music, acting, mold, government, legislative issues, religion, news coverage, media, games, business, and other key intrigue territories. The web application is brisk and responsive with the end goal that once the page is stacked the swapping between the pages does not require some other downloading of information since this done utilizing precise. The site page can be included as a symbol the home screen. A confirmed client approach Certification wallet Analytics. Presently, anybody can gain admittance to Certification wallet systematic through the typical channels, however that includes turning into a promoter. Keeping in mind the end goal to be qualified to be a publicist, you require to be in particular areas where Twitter permits publicizing. Certain nations aren't qualified, for instance. You can see the list here. Your record additionally should be genuinely dynamic; you can't join and turn into a publicist inside a day, or even seven days. The principle advantage of confirmation, obviously, is the believe it accompanies. When you're confirmed, the wallet of this record is who it cases to be." This is imperative when it's extraordinarily simple to make a record with a minor error or extra word in the URL, utilize a similar show name and picture as another substance, and continue acting like that element. Confirmation isn't an ideal answer for this issue. All things considered, you must be confirmed to get that sign of trust, and only one out of every odd business can be checked. This once in a while returns to hurt private companies, whose more wise group of onlookers individuals won't not put stock in due to their absence of confirmation. Of course, on the other side, if confirmation worked constantly, frauds wouldn't be fruitful. Indeed, even checked organizations get fakers that effectively trick clients, since clients, in general, aren't extremely canny. They won't not know or they won't not mind what that blue check stamp means, thus they never acknowledge they're giving their data to a sham demand from the client of such records along these lines, you'll need to evacuate that assurance all together. Verification is likewise fantastically critical for client outreach. On the off chance that it is a business kind of authentication or instructive testament you need to confirm it by an outsider or an association and include a computerized signature with encryption procedures to guarantee the genuineness of the endorsement, you nearly must be checked. No sagacious client will give an ounce of individual data to a record that doesn't have a confirmation check, paying little respect to how dependable they look. I do need to determine keen clients, obviously; numerous less wise clients do substantially less shrewd things consistently.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1945 2. SYSTEM ANALYSIS In the analysis it is a way toward concentrate a strategy or business with a specific end goal to distinguish its objectives and purposes and make frameworks and methods that will accomplish them in an effective way. Another view sees framework examination as a critical thinking procedure that disintegrates a framework into its segment pieces with the end goal of the concentrate how well those segment parts work and communicate to achieve their motivation. Examination and union, as logical techniques, dependably go as one; they supplement each other. Each union expands upon the consequences of a first examination, and each investigation requires a consequent blend keeping in mind the end goal to confirm and remedy its outcomes. 2.1 EXISTING SYSTEM There is just a single frameworks existing at this point. It is an administration site named DIGILOCKER where u can simply transfer authentications. The framework needs security issues and helps us to believe the authentications since it isn't a checked profile and any individual can control information in the locker, its only a locker idea of putting away the declarations can be altered and may not be unique duplicate. DigiLocker is an "advanced locker" benefit worked by the Government of India that empowers Indian natives to store certain official records on the cloud. This framework offers just less stockpiling which is 1 GB of storage room is offered to clients to store recognizable proof card issued by government offices, instruction endorsements, PAN cards, driving permit, vehicle proprietorship records and some different archives. Clients need to have an Aadhar card to utilize DigiLocker. For join, the Aadhar card number and the one-time secret word sent to the Aadhar-related versatile number, should be entered. For later log-ins, the client can set their own particular secret word it interface the record to Facebook or Google logins. The beta variant of the administration was taken off in February 2015,and propelled by the Prime Minister on 1 July 2015. There is just 1 frameworks existing at this point. It is an administration site named DIGILOCKER where u can simply transfer endorsements. The framework needs security issues and helps us to believe the endorsements since it isn't a confirmed profile and any individual can control information in the locker, its only a locker idea of putting away the authentications can be altered and may not be unique duplicate. DigiLocker is a "computerized locker" benefit worked by the Government of India that empowers Indian nationals to store certain official records on the cloud. This framework offers just less stockpiling which is 1 GB of storage room is offered to clients to store distinguishing proof card issued by government offices, instruction declarations, PAN cards, driving permit, vehicle possession records and some different archives. Clients need to have an Aadhar card to utilize DigiLocker 2.2 PROPOSED SYSTEM A Certificate Wallet alludes to an electronic gadget that enables a person to store authentications of any sort in a wallet. This incorporates endorsement with a confirmation id, so if the declaration transferred to the wallet is validated by an expert or an association. The declaration holds a computerized signature which is a numerical plan for showing the genuineness of advanced messages or records. An authentic propelled stamp gives a recipient inspiration to assume that the message was made by a known sender (confirmation) , that the sender can't deny having sent the message (non-disavowal), and that the message was not balanced in movement. Advanced marks are a standard component of most (cryptographic convention) suites, and are normally utilized for programming dispersion, budgetary exchanges, contract administration programming, and in different situations where it is imperative to identify phony or altering. Wallet essentially is outlined in type of a wallet utilizing Typescript and Angular into a Web Application with the goal that it is anything but difficult to utilize and can be gotten to from any gadget. The wallet idea is basic as that it can hold any kind of testament of our decision whether it is of instructive, affirmation course declaration, restorative, proficient or any looked for can be put away and saw by the clients like a wallet we convey. The profile will have a connection created and this connection will be the URL to the profile and the profile is checked by an association or by other security and confirmation criteria the site gives .Though it is a Web Application it has awesome favorable position of client clicks "Add to home screen", they will see the application being included the home screen. Confirmation of the wallet is likewise extraordinarily vital for client outreach. On the off chance that it is a business sort of declaration or instructive endorsement you need to confirm it by an outsider or an association and include an advanced mark with encryption systems to guarantee the legitimacy of the authentication, you nearly must be checked. No astute client will give an ounce of individual data to a record that doesn't have a confirmation check, paying little mind to how dependable they look. I do need to determine canny clients, obviously; numerous less clever clients do substantially less insightful things consistently. 3. SYSTEM DESIGN The wallet KEEP-IT will be advanced pocket to hold testament in computerized arrange where it can be gotten to through a URL and this connection will be produced by the watcher who needs the sort of declarations as indicated by the class of endorsements. This module comprise of how authentications are ordered by the kind
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1946 of the declaration and this will be in the organization of any kind let it be testaments of scholastics, medicinal, proficient, birth ,driving and so forth. A Certificate Wallet alludes to an electronic gadget that enables a person to store testaments of any sort in a wallet. This incorporates testament with a confirmation id, so if the declaration transferred to the wallet is validated by a specialist or an association. The authentication holds an advanced mark which is substantial computerized signature gives a beneficiary motivation to trust that the message was made by a known sender (authentication), that the sender can't deny having sent the message and that the message was not adjusted in travel. Advanced marks are a standard component of most suites, and are normally utilized for programming dispersion, money related exchanges, contract administration programming, and in different situations where it is vital to recognize fraud or altering. The Project we are creating has two modules mainly: 1 Profile view and Add certificate 2 Authentication and Digital signature Fig – 1 : Flowchart of system 3.1 Profile View and Add Certificates Each profile will have isolate see as per the client it might be ensured or open profile and individuals with the sort will have the capacity to see the profile in the way he needs for ex: on the off chance that it is instructive client he will have the capacity to see instructive endorsements through the connection gave to him from the other client, profile of each client has a connection created and this connection is the thing that we are utilizing as a diverting technique to the profile, utilization of this connection is that we can utilize this connection even in resumes and as an individual testament wallet interface. A profile tells individuals that a record of open intrigue is legitimate. A record might be checked on the off chance that it is resolved to be a record of open intrigue. Ordinarily this incorporates accounts kept up by clients in music, acting, form, government, legislative issues, religion, news coverage, media, games, business, and other key intrigue zones. The web application is fast and responsive with the end goal that once the page is stacked the swapping between the pages does not require some other downloading of information. 3.2 Authentication and Digital signature We require a profile which extremely secure and to be certain that the authentications transferred are honest to goodness and unique duplicate of the testament for that the this record will be secured with an open key encryption gauges and by an outsider whoever it might be a foundation or an association and will be confirmed and this archive will be secured with a computerized signature and the information can't be altered or reproduced, utilization of QR code is additionally utilized another security reason all together for the elective reference and accessibility of the sort of information. An authentic propelled stamp gives a recipient inspiration to assume that the message was made by a known sender (confirmation) , that the sender can't deny having sent the message (non-disavowal), and that the message was not balanced in movement. The profile will produce a connection where this connection is utilized a connection to our profile and it is made basic as that the outside client just need this so they can see the profile and his endorsements with the state of authentications that is open unmistakable and the outer client can comprehend about his profile through the connection. All connects to different sites must take after certain designing guidelines. 4. CONCLUSION KEEP IT will always be a companion with all age groups to carry their certificates digitally and to provide all the information about the person just through a URL link. The link generated will redirect the user to view the verified profile and the certificates he or she holds in keep it wallet. An additional feature of this wallet is that we can
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1947 save passwords which is not again visible even for the user and when the user once click this will redirect and will load the website. A verified profile will show a view that is needed for the client and easy scroll through the certificates necessary. It will also later become an alternative for curriculum vitae and no longer needed to carry the resume because the profile will be genuine and the certificates are authenticated using a third party organization and tamper proof with a digital signature .The wallet is portable, safe and easy access because it can be retrieved anywhere just through a link and the benefit of reducing paper with less hard copies of the certificates, and lastly it is the most convenient way to carry the original certificates with you. REFERENCES [1] Francesco Buccafurri; Gianluca Caminiti; Gianluca Lax, “Signing the document content is not enough: A new attack to digital signature”, ICADIWT, Pages: 520 – 525, 2008 IEEEXplore [2] V.Nagarajan, “ Secure Data Transmission using Content Fingerprinting Digital Watermarking Techniques”, The 30th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2015)June 29-July 2 at Grand Hilton Seoul, Seoul, Korea . [3] J. Barr; B. Bradley; B.T. Hannigan,"Using digital watermarks with image signatures to mitigate the threat of the copyattack”,ICASSP, 2000 IEEE. [4] F. Leclerc and R. Plamondon, “Automatic signature verification: The state of the art1989–1993,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 03, pp. 643–660, 1994. [5] A. Pansare and S. Bhatia, “Offline signature verification using neural network,” International Journal of Scientific & Engineering Research, Volume3, no. 2, 2012