The process of authenticating Citizen ID Cards

Explore VMGeKYC's Citizen ID Card Authentication service, where we guarantee to deliver the Fastest, Most Accurate, and Safest identity verification experience for you!

Access NFC information.

Access NFC information.

Utilize MRZ and NFC to access the secure area of the chip-embedded Citizen ID Card.

Icon Check MRZ CODE SCANNING: Utilize OCR mechanism to read the MRZ code to generate the PACE KEY (ID+DOB+DOE), which can be used to unlock NFC chip information.
Icon Check SCAN NFC CHIP: Utilize the NFC of the Mobile/ Card Reader to read the information within the card with PACE KEY, data is classified into Data Groups (DG) according to ICAO 9303 standard..
Reading information data by  NFC technology

Check card data integrity.

Detect and verify if chip card information has been altered or counterfeited. ICAO 9303 standard procedure - security mechanism within the chip to prevent duplication.

Icon Check Chip Authentication is a standard to evaluate whether the card reading mechanism is secure or not.
Icon Check Active Authentication is the verification step to determine if the card has been copied or not.
Icon Check Passive Authentication is the crucial verification step to determine if the information within the chip has been altered.
Detecting unsatisfactory documents

Data extraction

Accurately extract full data from both fields DG2 and DG13.

Icon Check DG2 – Face Image.
Icon Check DG13* - Optional Detailed Information.
Authenticate the documentowner's portrait

Verify the digital signature of the card.

Verify the digital signature against the National Population Database - Ministry of Public Security. The result will be returned to the operating unit.

Xác thực khuôn mặt qua video và giọng nói

Verify authentication information.

Detect 100% of counterfeit chip-embedded citizen ID card cases by verifying the data on the chip card with the National Population Database and the RAR-C06 citizen ID card database of the Ministry of Public Security.

Absolute security to prevent leakage and theft of information.

Absolute security to prevent leakage and theft of information.

The system is built upon the most advanced security model, minimizing sophisticated techniques of high-tech forgery to infiltrate and steal information.