Forem

Antonio Jose Socorro Marin profile picture

Antonio Jose Socorro Marin

Antonio José Socorro Marín is a systems engineer with extensive experience in digital identity and information security. Throughout his career, he has participated in international projects focused on

Joined Joined on 
Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad
Cover image for Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Comments
4 min read

Want to connect with Antonio Jose Socorro Marin?

Create an account to connect with Antonio Jose Socorro Marin. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Module 3 — Derived Digital Identities and Interoperability
Cover image for Module 3 — Derived Digital Identities and Interoperability

Module 3 — Derived Digital Identities and Interoperability

Comments
4 min read
Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025
Cover image for Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025

Module 2 — Derived Identities and Secure Export Author: Antonio José Socorro Marín Fecha: 28 de septiembre de 2025

1
Comments
11 min read
Module 2 — Derived Identities and Secure Export
Cover image for Module 2 — Derived Identities and Secure Export

Module 2 — Derived Identities and Secure Export

1
Comments
4 min read
decoy-hunter — Contrarrestando la Decepción "All Ports Are Open"

decoy-hunter — Contrarrestando la Decepción "All Ports Are Open"

2
Comments
5 min read
decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

decoy-hunter — Countering the "All Ports Are Open" Deception Author: Antonio José Socorro Marín Date: September 28, 2025

1
Comments
5 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)
Cover image for Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography
Cover image for Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography

Derived Identity and System Personalization: A Vision Toward the Physical-Digital Link Through Robust Cryptography

2
Comments
4 min read
Identidad Derivada y Personalización de Sistemas: Una visión hacia el enlace físico-digital con criptografía robusta
Cover image for Identidad Derivada y Personalización de Sistemas: Una visión hacia el enlace físico-digital con criptografía robusta

Identidad Derivada y Personalización de Sistemas: Una visión hacia el enlace físico-digital con criptografía robusta

Comments
4 min read
Identity as a Unique Fingerprint: DNA, Human Uniqueness, and the Design of Secure Systems

Identity as a Unique Fingerprint: DNA, Human Uniqueness, and the Design of Secure Systems

Comments
3 min read
La Identidad como Huella Única: ADN, Unicidad Humana y el Diseño de Sistemas Seguros
Cover image for La Identidad como Huella Única: ADN, Unicidad Humana y el Diseño de Sistemas Seguros

La Identidad como Huella Única: ADN, Unicidad Humana y el Diseño de Sistemas Seguros

Comments
4 min read
From Vision to Execution: A System-of-Systems Approach for Smart Cards and RFID
Cover image for From Vision to Execution: A System-of-Systems Approach for Smart Cards and RFID

From Vision to Execution: A System-of-Systems Approach for Smart Cards and RFID

Comments
3 min read
De la visión a la ejecución Un sistema-de-sistemas para Smart Cards y RFID
Cover image for De la visión a la ejecución Un sistema-de-sistemas para Smart Cards y RFID

De la visión a la ejecución Un sistema-de-sistemas para Smart Cards y RFID

Comments
3 min read
Simbiosis, interoperabilidad y desarrollo propio en sistemas de Smart Cards y RFID
Cover image for Simbiosis, interoperabilidad y desarrollo propio en sistemas de Smart Cards y RFID

Simbiosis, interoperabilidad y desarrollo propio en sistemas de Smart Cards y RFID

Comments
3 min read
Diseñando un Sistema Completo de Smart Cards y RFID: Primeros Pasos y Componentes Clave
Cover image for Diseñando un Sistema Completo de Smart Cards y RFID: Primeros Pasos y Componentes Clave

Diseñando un Sistema Completo de Smart Cards y RFID: Primeros Pasos y Componentes Clave

Comments
4 min read
Designing a Complete Smart Card and RFID System: First Steps and Core Components
Cover image for Designing a Complete Smart Card and RFID System: First Steps and Core Components

Designing a Complete Smart Card and RFID System: First Steps and Core Components

Comments
3 min read
Symbiosis, Interoperability, and Proprietary Development in Smart Card and RFID Systems
Cover image for Symbiosis, Interoperability, and Proprietary Development in Smart Card and RFID Systems

Symbiosis, Interoperability, and Proprietary Development in Smart Card and RFID Systems

Comments
2 min read
loading...