Enviar pesquisa
Carregar
IRJET- Keep It – A System to Store Certificates and Develop a Profile
•
0 gostou
•
20 visualizações
IRJET Journal
Seguir
https://www.irjet.net/archives/V5/i3/IRJET-V5I3453.pdf
Leia menos
Leia mais
Engenharia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
IJNSA Journal
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
Digital signature certificate in chennai
Digital signature certificate in chennai
Sharpdigitalsignature
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
Codemotion
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
eMudhra dsc
Digital signature price in chennai
Digital signature price in chennai
Sharpdigitalsignature
Digital signature in chennai
Digital signature in chennai
Sharpdigitalsignature
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
Recomendados
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
IJNSA Journal
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
Pankaj Rane
Digital signature certificate in chennai
Digital signature certificate in chennai
Sharpdigitalsignature
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
Codemotion
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
eMudhra dsc
Digital signature price in chennai
Digital signature price in chennai
Sharpdigitalsignature
Digital signature in chennai
Digital signature in chennai
Sharpdigitalsignature
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET Journal
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
Digital signature certificate
Digital signature certificate
Ashvini Soni
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET Journal
Digital signature certificate provider in delhi
Digital signature certificate provider in delhi
eSign DSC
Mind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYC
Signzy
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
101 Blockchains
Digital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
Shubham Sharma
Access management
Access management
Venkatesh Jambulingam
eSign Brochure1.5
eSign Brochure1.5
DigiLocker
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
DigiLocker
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sector
dbpublications
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
Synacts
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
DigiLocker
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
SC Leung
10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications
Blockchain Council
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
IJECEIAES
An Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
Avirot Mitamura
Mais conteúdo relacionado
Mais procurados
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET Journal
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
Digital signature certificate
Digital signature certificate
Ashvini Soni
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET Journal
Digital signature certificate provider in delhi
Digital signature certificate provider in delhi
eSign DSC
Mind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYC
Signzy
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
101 Blockchains
Digital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
Shubham Sharma
Access management
Access management
Venkatesh Jambulingam
eSign Brochure1.5
eSign Brochure1.5
DigiLocker
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
DigiLocker
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sector
dbpublications
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
Synacts
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
DigiLocker
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
SC Leung
10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications
Blockchain Council
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
IJECEIAES
Mais procurados
(20)
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
IRJET - A Survey of Issues in Health Insurance System and Solution through Bl...
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
Digital signature certificate
Digital signature certificate
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
IRJET- Estimation of a Good Fit with Blockchain and Identity and Access Manag...
Digital signature certificate provider in delhi
Digital signature certificate provider in delhi
Mind- Boggling Features & Benefits of Video KYC
Mind- Boggling Features & Benefits of Video KYC
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
Digital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
Access management
Access management
eSign Brochure1.5
eSign Brochure1.5
Technical Specifications DLTS ver 2.3
Technical Specifications DLTS ver 2.3
Automated E-Pin Generator in Banking Sector
Automated E-Pin Generator in Banking Sector
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
10 Best Professional Blockchain Courses And Certifications
10 Best Professional Blockchain Courses And Certifications
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
Semelhante a IRJET- Keep It – A System to Store Certificates and Develop a Profile
An Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
Avirot Mitamura
Identity Verification
Identity Verification
IDology, Inc
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
IRJET- Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Caroline Johnson
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdox
Christopher Wynder
Digital signature price in chennai
Digital signature price in chennai
Sharpdigitalsignature
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
IRJET Journal
Automating trust with new technologies
Automating trust with new technologies
Strategy&, a member of the PwC network
Application on Know Your Customer Authentication
Application on Know Your Customer Authentication
IRJET Journal
The Trustable Technology Mark
The Trustable Technology Mark
Peter Bihr
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
Peter Bihr
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...
Microsoft Tech Community
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
Peter Bihr
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
Extended Content Solutions
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
test
test
pixeldemo
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
Nitin Patidar
Semelhante a IRJET- Keep It – A System to Store Certificates and Develop a Profile
(20)
An Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
Identity Verification
Identity Verification
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Digital signatures whitepaper_thinkdox
Digital signatures whitepaper_thinkdox
Digital signature price in chennai
Digital signature price in chennai
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
Automating trust with new technologies
Automating trust with new technologies
Application on Know Your Customer Authentication
Application on Know Your Customer Authentication
The Trustable Technology Mark
The Trustable Technology Mark
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
Working with external identities: Learn how to enable partners, suppliers and...
Working with external identities: Learn how to enable partners, suppliers and...
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
test
test
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
Mais de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mais de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
BootNeck1
OOP concepts -in-Python programming language
OOP concepts -in-Python programming language
SmritiSharma901052
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Sumanth A
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
AkritiPradhan2
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
Sneha Padhiar
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
Drew Moseley
multiple access in wireless communication
multiple access in wireless communication
panditadesh123
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
prachaibot
Virtual memory management in Operating System
Virtual memory management in Operating System
Rashmi Bhat
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
alene1
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
Researcher Researcher
Main Memory Management in Operating System
Main Memory Management in Operating System
Rashmi Bhat
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
sandhya757531
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
isabel213075
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
CaalaaAbdulkerim
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
BalamuruganV28
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
Romil Mishra
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
sahilsajad201
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Manish Kumar
Último
(20)
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
OOP concepts -in-Python programming language
OOP concepts -in-Python programming language
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
multiple access in wireless communication
multiple access in wireless communication
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
Virtual memory management in Operating System
Virtual memory management in Operating System
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
Main Memory Management in Operating System
Main Memory Management in Operating System
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
Research Methodology for Engineering pdf
Research Methodology for Engineering pdf
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
IRJET- Keep It – A System to Store Certificates and Develop a Profile
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1944 Keep It – A system to store certificates and develop a profile Amal Shaju1, Arun Joseph2, Smitha Joseph3 1,2 B.Tech Student, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology, Kerala, India 3 Assistant Professor, Dept. of Computer Science Engineering, Sahrdaya College of Engineering & Technology, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Keep-It is a certificate wallet which is an alternative to reduce workload in carrying certificate with us. We store the certificates of different formats like medical, professional, birth, driving license, course certificates etc. The keep it will have separate profile which is verified and authenticated using norms and conditions of each individual and have separate area for uploading the certificates. The certificate uploaded are original copy and it is secured with a digital signature for security reasons and later the file cannot be tampered. The profile will generate a link where the other user can view profile and certificates he holds in the wallets. As this wallet is a web application it is easy to swap between pages and can be run on any device, also the web app can be added to home screen as an application for later time use. The password of the wallet can also be stored and user can access the wallet even offline and changes made will be effected when internet is available. 1. INTRODUCTION A Certificate of any type is a document or seal certifying the authenticity of something, it can be any type of certificate academic, medical, professional, birth, driving etc. A Certificate Wallet refers to an electronic device that allows an individual to store certificates of any type in a wallet. This includes certificate with a verification id, so if the certificate uploaded to the wallet is authenticated by an authority or an organization. The certificate holds a digital signature which is valid digital signature gives a recipient reason to believe that the message was created by a known sender (authentication), that the sender cannot deny having sent the message. Advanced marks are most usually utilized as a part of the fields programming dissemination, budgetary exchanges, contract administration programming, and in some different situations where it is important to recognize falsification or altering or some other interruptions. Advanced marks utilize topsy-turvy cryptography. A profile tells individuals that a record of open intrigue is true. A record might be confirmed on the off chance that it is resolved to be a record of open intrigue. Normally this incorporates accounts kept up by clients in music, acting, mold, government, legislative issues, religion, news coverage, media, games, business, and other key intrigue territories. The web application is brisk and responsive with the end goal that once the page is stacked the swapping between the pages does not require some other downloading of information since this done utilizing precise. The site page can be included as a symbol the home screen. A confirmed client approach Certification wallet Analytics. Presently, anybody can gain admittance to Certification wallet systematic through the typical channels, however that includes turning into a promoter. Keeping in mind the end goal to be qualified to be a publicist, you require to be in particular areas where Twitter permits publicizing. Certain nations aren't qualified, for instance. You can see the list here. Your record additionally should be genuinely dynamic; you can't join and turn into a publicist inside a day, or even seven days. The principle advantage of confirmation, obviously, is the believe it accompanies. When you're confirmed, the wallet of this record is who it cases to be." This is imperative when it's extraordinarily simple to make a record with a minor error or extra word in the URL, utilize a similar show name and picture as another substance, and continue acting like that element. Confirmation isn't an ideal answer for this issue. All things considered, you must be confirmed to get that sign of trust, and only one out of every odd business can be checked. This once in a while returns to hurt private companies, whose more wise group of onlookers individuals won't not put stock in due to their absence of confirmation. Of course, on the other side, if confirmation worked constantly, frauds wouldn't be fruitful. Indeed, even checked organizations get fakers that effectively trick clients, since clients, in general, aren't extremely canny. They won't not know or they won't not mind what that blue check stamp means, thus they never acknowledge they're giving their data to a sham demand from the client of such records along these lines, you'll need to evacuate that assurance all together. Verification is likewise fantastically critical for client outreach. On the off chance that it is a business kind of authentication or instructive testament you need to confirm it by an outsider or an association and include a computerized signature with encryption procedures to guarantee the genuineness of the endorsement, you nearly must be checked. No sagacious client will give an ounce of individual data to a record that doesn't have a confirmation check, paying little respect to how dependable they look. I do need to determine keen clients, obviously; numerous less wise clients do substantially less shrewd things consistently.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1945 2. SYSTEM ANALYSIS In the analysis it is a way toward concentrate a strategy or business with a specific end goal to distinguish its objectives and purposes and make frameworks and methods that will accomplish them in an effective way. Another view sees framework examination as a critical thinking procedure that disintegrates a framework into its segment pieces with the end goal of the concentrate how well those segment parts work and communicate to achieve their motivation. Examination and union, as logical techniques, dependably go as one; they supplement each other. Each union expands upon the consequences of a first examination, and each investigation requires a consequent blend keeping in mind the end goal to confirm and remedy its outcomes. 2.1 EXISTING SYSTEM There is just a single frameworks existing at this point. It is an administration site named DIGILOCKER where u can simply transfer authentications. The framework needs security issues and helps us to believe the authentications since it isn't a checked profile and any individual can control information in the locker, its only a locker idea of putting away the declarations can be altered and may not be unique duplicate. DigiLocker is an "advanced locker" benefit worked by the Government of India that empowers Indian natives to store certain official records on the cloud. This framework offers just less stockpiling which is 1 GB of storage room is offered to clients to store recognizable proof card issued by government offices, instruction endorsements, PAN cards, driving permit, vehicle proprietorship records and some different archives. Clients need to have an Aadhar card to utilize DigiLocker. For join, the Aadhar card number and the one-time secret word sent to the Aadhar-related versatile number, should be entered. For later log-ins, the client can set their own particular secret word it interface the record to Facebook or Google logins. The beta variant of the administration was taken off in February 2015,and propelled by the Prime Minister on 1 July 2015. There is just 1 frameworks existing at this point. It is an administration site named DIGILOCKER where u can simply transfer endorsements. The framework needs security issues and helps us to believe the endorsements since it isn't a confirmed profile and any individual can control information in the locker, its only a locker idea of putting away the authentications can be altered and may not be unique duplicate. DigiLocker is a "computerized locker" benefit worked by the Government of India that empowers Indian nationals to store certain official records on the cloud. This framework offers just less stockpiling which is 1 GB of storage room is offered to clients to store distinguishing proof card issued by government offices, instruction declarations, PAN cards, driving permit, vehicle possession records and some different archives. Clients need to have an Aadhar card to utilize DigiLocker 2.2 PROPOSED SYSTEM A Certificate Wallet alludes to an electronic gadget that enables a person to store authentications of any sort in a wallet. This incorporates endorsement with a confirmation id, so if the declaration transferred to the wallet is validated by an expert or an association. The declaration holds a computerized signature which is a numerical plan for showing the genuineness of advanced messages or records. An authentic propelled stamp gives a recipient inspiration to assume that the message was made by a known sender (confirmation) , that the sender can't deny having sent the message (non-disavowal), and that the message was not balanced in movement. Advanced marks are a standard component of most (cryptographic convention) suites, and are normally utilized for programming dispersion, budgetary exchanges, contract administration programming, and in different situations where it is imperative to identify phony or altering. Wallet essentially is outlined in type of a wallet utilizing Typescript and Angular into a Web Application with the goal that it is anything but difficult to utilize and can be gotten to from any gadget. The wallet idea is basic as that it can hold any kind of testament of our decision whether it is of instructive, affirmation course declaration, restorative, proficient or any looked for can be put away and saw by the clients like a wallet we convey. The profile will have a connection created and this connection will be the URL to the profile and the profile is checked by an association or by other security and confirmation criteria the site gives .Though it is a Web Application it has awesome favorable position of client clicks "Add to home screen", they will see the application being included the home screen. Confirmation of the wallet is likewise extraordinarily vital for client outreach. On the off chance that it is a business sort of declaration or instructive endorsement you need to confirm it by an outsider or an association and include an advanced mark with encryption systems to guarantee the legitimacy of the authentication, you nearly must be checked. No astute client will give an ounce of individual data to a record that doesn't have a confirmation check, paying little mind to how dependable they look. I do need to determine canny clients, obviously; numerous less clever clients do substantially less insightful things consistently. 3. SYSTEM DESIGN The wallet KEEP-IT will be advanced pocket to hold testament in computerized arrange where it can be gotten to through a URL and this connection will be produced by the watcher who needs the sort of declarations as indicated by the class of endorsements. This module comprise of how authentications are ordered by the kind
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1946 of the declaration and this will be in the organization of any kind let it be testaments of scholastics, medicinal, proficient, birth ,driving and so forth. A Certificate Wallet alludes to an electronic gadget that enables a person to store testaments of any sort in a wallet. This incorporates testament with a confirmation id, so if the declaration transferred to the wallet is validated by a specialist or an association. The authentication holds an advanced mark which is substantial computerized signature gives a beneficiary motivation to trust that the message was made by a known sender (authentication), that the sender can't deny having sent the message and that the message was not adjusted in travel. Advanced marks are a standard component of most suites, and are normally utilized for programming dispersion, money related exchanges, contract administration programming, and in different situations where it is vital to recognize fraud or altering. The Project we are creating has two modules mainly: 1 Profile view and Add certificate 2 Authentication and Digital signature Fig – 1 : Flowchart of system 3.1 Profile View and Add Certificates Each profile will have isolate see as per the client it might be ensured or open profile and individuals with the sort will have the capacity to see the profile in the way he needs for ex: on the off chance that it is instructive client he will have the capacity to see instructive endorsements through the connection gave to him from the other client, profile of each client has a connection created and this connection is the thing that we are utilizing as a diverting technique to the profile, utilization of this connection is that we can utilize this connection even in resumes and as an individual testament wallet interface. A profile tells individuals that a record of open intrigue is legitimate. A record might be checked on the off chance that it is resolved to be a record of open intrigue. Ordinarily this incorporates accounts kept up by clients in music, acting, form, government, legislative issues, religion, news coverage, media, games, business, and other key intrigue zones. The web application is fast and responsive with the end goal that once the page is stacked the swapping between the pages does not require some other downloading of information. 3.2 Authentication and Digital signature We require a profile which extremely secure and to be certain that the authentications transferred are honest to goodness and unique duplicate of the testament for that the this record will be secured with an open key encryption gauges and by an outsider whoever it might be a foundation or an association and will be confirmed and this archive will be secured with a computerized signature and the information can't be altered or reproduced, utilization of QR code is additionally utilized another security reason all together for the elective reference and accessibility of the sort of information. An authentic propelled stamp gives a recipient inspiration to assume that the message was made by a known sender (confirmation) , that the sender can't deny having sent the message (non-disavowal), and that the message was not balanced in movement. The profile will produce a connection where this connection is utilized a connection to our profile and it is made basic as that the outside client just need this so they can see the profile and his endorsements with the state of authentications that is open unmistakable and the outer client can comprehend about his profile through the connection. All connects to different sites must take after certain designing guidelines. 4. CONCLUSION KEEP IT will always be a companion with all age groups to carry their certificates digitally and to provide all the information about the person just through a URL link. The link generated will redirect the user to view the verified profile and the certificates he or she holds in keep it wallet. An additional feature of this wallet is that we can
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1947 save passwords which is not again visible even for the user and when the user once click this will redirect and will load the website. A verified profile will show a view that is needed for the client and easy scroll through the certificates necessary. It will also later become an alternative for curriculum vitae and no longer needed to carry the resume because the profile will be genuine and the certificates are authenticated using a third party organization and tamper proof with a digital signature .The wallet is portable, safe and easy access because it can be retrieved anywhere just through a link and the benefit of reducing paper with less hard copies of the certificates, and lastly it is the most convenient way to carry the original certificates with you. REFERENCES [1] Francesco Buccafurri; Gianluca Caminiti; Gianluca Lax, “Signing the document content is not enough: A new attack to digital signature”, ICADIWT, Pages: 520 – 525, 2008 IEEEXplore [2] V.Nagarajan, “ Secure Data Transmission using Content Fingerprinting Digital Watermarking Techniques”, The 30th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2015)June 29-July 2 at Grand Hilton Seoul, Seoul, Korea . [3] J. Barr; B. Bradley; B.T. Hannigan,"Using digital watermarks with image signatures to mitigate the threat of the copyattack”,ICASSP, 2000 IEEE. [4] F. Leclerc and R. Plamondon, “Automatic signature verification: The state of the art1989–1993,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 8, no. 03, pp. 643–660, 1994. [5] A. Pansare and S. Bhatia, “Offline signature verification using neural network,” International Journal of Scientific & Engineering Research, Volume3, no. 2, 2012
Baixar agora