USC-BRANDED CERTIFICATION is a specific certificate-awarding
service, treated as know-how, to result in issuing the Digital
Proxy-Certificate that is to be –
A) Provided to its Holder in confirmation of -
(1)
Professional
skills/knowledge as an authorized reference on the same footing as “Letter of
Recommendation/Credential”;
(2)
Specific
Credentials Possessing Rights (e.g. IP Assets ownership and authorship, proxy-company representative
authorization);
B) Attributed to specifically designed web-based (electronic)
document in confirmation of -
(1)
Validated
Proxy-Crypto-Assets
and/or Digital Brand
Proxy-Assets assignment;
(2)
Authorized
Parties’ Signing;
(3)
Originality
of Content;
(4)
Other
Special Credentials assigned.
Levelled Up Security behind a Digital Proxy-Certificate
Keeping full control of digital credentials
securitization process
Categorized
as “a hybrid of
electronic and digital credentials”, Digital Proxy-Certificate is a specific code-based image configured with generating unique random
code of a certain pattern and cryptographically designed to authenticate
its “Holder” and “Issuer” by means of originality-determining settings for decoding procedures dedicated to authorization, verification and
validation.
Providing specific functionality and security features
and corresponding to a specific level of trust, Digital
Proxy-Certificate might be validated upon request
made by a third-party against its unauthorized usage and duplication.
The
Digital
Proxy-Certificate is attributed with a unique cryptographic
number that is a generated “characterset” used as a Public
Key of a given length consisting of the selected
characters (e.g. digits, lowercase/uppercase
alphabet).
The Private Key, defined as “a strong-password-looking cryptographic derivation” from a Public Key, is a “characterset” consisting (in addition to digits,
lowercase/uppercase
alphabet) of the selected characters such as:
-Brackets,
-Punctuation,
- Special and Extra characters.
The Private Key suffixed and prefixed with “Screen-Look-a-like” characters (e.g. I, l, 1, |,
O, 0) is used to level up the security of variable Private Key application (algorithmically
detecting “similarity-confusion characters”).
The variable Private Key might be outputted directly
to –
1. “check-in” screen;
2. downloadable USC-extension file (Unification Source Code: *.usc);
3. “login” screen.
The usage of Private Key to log in to the document-processing server allows authenticated editing of Document
(e.g. contract or agreement) upon agreed Parties (e.g. adding Amendments,
Appendixes, etc.).
USC-file, besides
of containing a Private Key, includes specific source-code (note: detailing the
application of usc-file is behind the scope of this publication).
The simplest coded-content
pattern of usc-file may look like this:
)8V)CC3[k6Hj 7EIQ-72IU-2YNV-3L4Y 346-FRW-387
*3.-]N}/(>ia 2E62-E3SR-33FI-XHV3 236-EFZ-852
!]8YKj$-%J6: 6ETI-UIL2-9WAX-XHYO 764-VQW-495
c5RQ!pCt}c-% NHLE-L6MI-4GE4-ETEV 739-JEE-895
u+J%E^9!hx?p XNSS-HSJW-3NGU-8XTJ 422-JKW-359
Y!-rq;7GxjTW XNSS-HSJW-3NGU-8XTJ 859-KUH-562
N_42*e!m$3Fe SXFP-CHYK-ONI6-S89U 744-NRY-264
iXLCfiMY.EDc QK6A-JI6S-7ETR-0A6C 450-KTB-309
*3.-]N}/(>ia 2E62-E3SR-33FI-XHV3 236-EFZ-852
!]8YKj$-%J6: 6ETI-UIL2-9WAX-XHYO 764-VQW-495
c5RQ!pCt}c-% NHLE-L6MI-4GE4-ETEV 739-JEE-895
u+J%E^9!hx?p XNSS-HSJW-3NGU-8XTJ 422-JKW-359
Y!-rq;7GxjTW XNSS-HSJW-3NGU-8XTJ 859-KUH-562
N_42*e!m$3Fe SXFP-CHYK-ONI6-S89U 744-NRY-264
iXLCfiMY.EDc QK6A-JI6S-7ETR-0A6C 450-KTB-309
Digital Proxy-Certificate assignment service is provided in accordance with the internal
regulation for all notified “Uni-Sync-Corp” branded certificate-awarding and registering
schemes supported on a voluntary basis. Please, note that both “Private Key” and “Public Key” notions, as commonly understood in a public domain, are used in a different way in context of "Digital Proxy-Certificate".
No comments:
Post a Comment