E-name card application for Android phones 1
We are living in an era of neck-breaking technological innovation. Life under Covid-19 pandemic has granted us even more opportunities to re-examine and redefine traditional communication technologies, exacerbated by the human need for new services. Remote work is the norm and social distancing is m...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/158198 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | We are living in an era of neck-breaking technological innovation. Life under Covid-19 pandemic has granted us even more opportunities to re-examine and redefine traditional communication technologies, exacerbated by the human need for new services. Remote work is the norm and social distancing is mandatory in the pandemic to keep each other safe. E-name cards bridge the gap between the online business interactions. They allow instant sending, receiving, and exchanging of contact information remotely, in place of paper name cards.
There are plenty of applications in the market for creating digital name cards. Some common features of these applications include converting physical name cards into digital name cards by scanning, and sharing the name cards virtually and conveniently with everyone. Some of these applications allow users to sign in anonymously, where there is no safety net to prevent users with bad intentions to falsify their information. Email verification is utilised in some of these applications when new users create an account to prevent fake emails. Yet, we are not able to ascertain the claimed positions of users in the company solely via email verification.
This report documents the design and implementation of the e-name card application, About The Card which is capable of preventing identity fraud by utilising public key cryptography, on top of other basic functions such as converting paper name card to e-name card and sharing name cards via QR code or link. Users will sign their email addresses using their individual private key when submitting for verification. If the paired public key can decrypt the signed document, the user is tagged as verified. Receivers of name cards can be rest assured that the name card information is trustworthy and prevent them from getting scams. |
---|