Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Electronic Identification (eID)
Electronic Know Your Customer (eKYC)

Electronic Identification (eID)

Overview

MQ ICT SOLUTIONS electronic authentication and authentication system complies with Government regulations, making it easier for individuals and organizations to participate in online activities. The system provides a centralized administration and authentication platform, connecting with other applications, ensuring high security and safe data management. This platform enables data connection and reuse, increasing flexibility and protecting information according to regulatory standards.

Architectural models

The system uses client – server architecture for development and deployment. In addition, for CCCD verification services provided by C06 or needing to integrate with 3rd party services, the system will consider these services as microservices and call APIs for use.

Users using the system’s services will use authentication services through mobile applications or web applications developed by MQS.

For other applications that want to integrate authentication services, developers can call through APIs or SDKs.

Authentication process

Customers use chip-embedded citizen identification cards to carry out procedures at transaction counters, kiosks or online (via mobile applications)

Information in the chip that is allowed to be read in the citizen identification card will be read through software connected to the citizen identification reader or through a mobile application. This information will be sent to the RAR center’s authentication system to authenticate documents.

If the information on the paperwork confirms the procedure, the user will take a photo of his or her face (via the camera at the check-in location or the camera of the mobile device). This photo will be used to match the face with the photo in the citizen identification card of the person doing the procedure to ensure identification of the owner. If the match is successful, the authentication process is completed.

System model

Feature

Manage users and vendors
  • Account management
  • Vendor management
  • Decentralization and decentralization
  • Sign in, sign out and authenticate your account
  • Access management and APIs
  • Manage access rights
  • API management
  • API gateway
  • Identity management and verification services
    Helps identify and authenticate users quickly, accurately and securely, ensuring access to the right person and for the right purpose.
    Other functions
  • Logging
  • Statistic
  • System management
  • Electronic Know Your Customer (eKYC)

    Overview

    In the 4.0 technology era, eKYC is considered one of the services applied by banks to attract customers. Accordingly, eKYC is also a solution to shorten verification time, save time and costs, and improve bank operational efficiency.

    • Super fast processing speed
    • Optimized advanced SDK
    • 3-step security
    • Statistics and transaction monitoring

    System model

    Feature

    Identify and extract document information

    Identify and extract (OCR) most valid identification documents according to current Vietnamese law such as:

    • Old/new ID card
    • Citizen identification card, citizen identification card with chip
    • Military ID card
    • Passport (Vietnam, foreign)
    • Driver’s license (old, new)
    Read information thanks to NFC technology
    • Read the chip card of the new CCCD through NFC proximity technology
    • The information is read completely and accurately, minimizing the risk of document falsification compared to authenticating documents by image.
    Detection of documents that do not meet requirements

    Guaranteed to detect most cases of ineligible documents
    Register information

    • Detect documents that are blurred, damaged, corners cut, erased, etc.
    • Detection of documents with portrait photos or expired documents
    • Detect fake documents (in case the input images are photocopied, scanned ID cards, etc.
    • Check the logic of information on documents to detect abnormalities
    Verify the identity of the document owner

    Immediately detect cases of portrait falsification to warn promptly

    • Only confirm customer photos taken themselves in real time

    • Able to authenticate the person’s vitality and reject fake faces (printed photos, photos displayed on electronic devices, 2D/3D masks, and
      face is not human

    • Detects faces that do not meet the minimum requirements, faces that are obscured, or have closed eyes

    Face authentication via video and voice

    Detect cases of intentional face impersonation, especially cases of using fake faces (photos, videos taken from devices, masks…) through video calls, face verification videos and authentication random number sequence by voice.

    Check and cross-validate the data

    Building an identity database helps businesses check and cross-validate data, maximize the ability to detect fraud and ensure user safety.

    Validate chip-mounted CCCD with RAR-C06

    Detect 100% of cases of falsified chip identification card information because the data on the chip card is verified with the RAR-C06 population and citizen identification database of the Ministry of Public Security.

    3-level integrated security prevents information leakage and theft

    Integrated versions are built on the most advanced three-level security model, minimizing high-tech phishing tricks to break in and steal information.

    Provide error monitoring tools, promptly react to unusual incidents

    Provide the integrator with a powerful tool to statistically and monitor errors over a selected time frame, helping to quickly detect abnormalities and take timely measures to prevent and handle them.