MQ ICT SOLUTIONS electronic authentication and authentication system complies with Government regulations, making it easier for individuals and organizations to participate in online activities. The system provides a centralized administration and authentication platform, connecting with other applications, ensuring high security and safe data management. This platform enables data connection and reuse, increasing flexibility and protecting information according to regulatory standards.
Architectural models
The system uses client – server architecture for development and deployment. In addition, for CCCD verification services provided by C06 or needing to integrate with 3rd party services, the system will consider these services as microservices and call APIs for use.
Users using the system’s services will use authentication services through mobile applications or web applications developed by MQS.
For other applications that want to integrate authentication services, developers can call through APIs or SDKs.
Authentication process
1
Citizen identification card
2
Read and validate card information
3
Take a photo of your face and authenticate
4
Authentication successful
Customers use chip-embedded citizen identification cards to carry out procedures at transaction counters, kiosks or online (via mobile applications)
Information in the chip that is allowed to be read in the citizen identification card will be read through software connected to the citizen identification reader or through a mobile application. This information will be sent to the RAR center’s authentication system to authenticate documents.
If the information on the paperwork confirms the procedure, the user will take a photo of his or her face (via the camera at the check-in location or the camera of the mobile device). This photo will be used to match the face with the photo in the citizen identification card of the person doing the procedure to ensure identification of the owner. If the match is successful, the authentication process is completed.
System model
Feature
Manage users and vendors
Account management
Vendor management
Decentralization and decentralization
Sign in, sign out and authenticate your account
Access management and APIs
Manage access rights
API management
API gateway
Identity management and verification services
Helps identify and authenticate users quickly, accurately and securely, ensuring access to the right person and for the right purpose.
Other functions
Logging
Statistic
System management
Electronic Know Your Customer (eKYC)
Overview
In the 4.0 technology era, eKYC is considered one of the services applied by banks to attract customers. Accordingly, eKYC is also a solution to shorten verification time, save time and costs, and improve bank operational efficiency.
Super fast processing speed
Optimized advanced SDK
3-step security
Statistics and transaction monitoring
System model
Feature
Identify and extract document information
Identify and extract (OCR) most valid identification documents according to current Vietnamese law such as:
Old/new ID card
Citizen identification card, citizen identification card with chip
Military ID card
Passport (Vietnam, foreign)
Driver’s license (old, new)
Read information thanks to NFC technology
Read the chip card of the new CCCD through NFC proximity technology
The information is read completely and accurately, minimizing the risk of document falsification compared to authenticating documents by image.
Detection of documents that do not meet requirements
Guaranteed to detect most cases of ineligible documents Register information
Detect documents that are blurred, damaged, corners cut, erased, etc.
Detection of documents with portrait photos or expired documents
Detect fake documents (in case the input images are photocopied, scanned ID cards, etc.
Check the logic of information on documents to detect abnormalities
Verify the identity of the document owner
Immediately detect cases of portrait falsification to warn promptly
Only confirm customer photos taken themselves in real time
Able to authenticate the person’s vitality and reject fake faces (printed photos, photos displayed on electronic devices, 2D/3D masks, and face is not human
Detects faces that do not meet the minimum requirements, faces that are obscured, or have closed eyes
Face authentication via video and voice
Detect cases of intentional face impersonation, especially cases of using fake faces (photos, videos taken from devices, masks…) through video calls, face verification videos and authentication random number sequence by voice.
Check and cross-validate the data
Building an identity database helps businesses check and cross-validate data, maximize the ability to detect fraud and ensure user safety.
Validate chip-mounted CCCD with RAR-C06
Detect 100% of cases of falsified chip identification card information because the data on the chip card is verified with the RAR-C06 population and citizen identification database of the Ministry of Public Security.
3-level integrated security prevents information leakage and theft
Integrated versions are built on the most advanced three-level security model, minimizing high-tech phishing tricks to break in and steal information.
Provide error monitoring tools, promptly react to unusual incidents
Provide the integrator with a powerful tool to statistically and monitor errors over a selected time frame, helping to quickly detect abnormalities and take timely measures to prevent and handle them.