Ahmed, 2022 - Google Patents
Centralized Students' Authentication for Higher Education Systems in NigeriaAhmed, 2022
View PDF- Document ID
- 4531124648258562530
- Author
- Ahmed M
- Publication year
- Publication venue
- International Journal of Innovative Computing
External Links
Snippet
Increase in the adoption of ICT for service provision renders higher educational institutions in Nigeria vulnerable to numerous security challenges. The information security threats addressed in this paper encompasses identity theft and identification frauds. The high …
- 238000005516 engineering process 0 abstract description 27
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00103—Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C11/00—Arrangements, systems, or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Vacca | Biometric technologies and verification systems | |
| Xin et al. | Smart home multi-factor authentication using face recognition and one-time password on smartphone | |
| Justina | Fingerprint-based authentication system for time and attendance management | |
| Scott et al. | An assessment of biometric identities as a standard for e-government services | |
| Levy et al. | Initial development of a learners’ ratified acceptance of multibiometrics intentions model (RAMIM) | |
| Ahmed | Centralized Students’ Authentication for Higher Education Systems in Nigeria | |
| Ullah et al. | Usability of profile based student authentication and traffic light system in online examinations | |
| Kleist | Building technologically based online trust: Can the biometrics industry deliver the online trust silver bullet? | |
| Bilgihan et al. | Research note: biometric technology applications and trends in hotels | |
| Althobaiti et al. | Usable security of authentication process: New approach and practical assessment | |
| Goldstein et al. | Large-scale biometrics deployment in Europe: Identifying challenges and threats | |
| Gupta | Biometrics: Enhancing security in organizations | |
| Al Rasyid et al. | Adopting Fingerprint as an Authentication Factor on E-Ticketing Mechanism | |
| Sunusi | Developing an access control system for students’ identification in higher institutions of learning using biometric technique | |
| Ahmed | RESOURCES’IDENTIFICATION IN EDUCATION SYSTEMS | |
| Prabhakar et al. | Biometrics in the commercial sector | |
| Iqbal et al. | Biometrics Technology: Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare | |
| Anusiuba et al. | Hybrid Authentication Techniques for Workers Identification and Tracking | |
| Desmond | Farouk (2020). Multimodal Biometric Authentication For a Computer-Based Test (CBT) Application. IRJCS:: International Research Journal of Computer Science, Volume VII, Issue VII, 179-196 | |
| Sharma et al. | ATM Management System | |
| Frye et al. | The body as a password: considerations, uses, and concerns of biometric technologies | |
| Adeosun et al. | Real Time E-Biotechnology Voting System; Using Secret Splitting | |
| Osayomore et al. | EVALUATION OF ELECTRONIC BASED VOTING SYSTEM AND DESIGN OF BLOCK-CHAIN-BASED ELECTRONIC VOTING SYSTEM ENHANCED WITH FINGERPRINT AND FACIAL RECOGNITION TECHNOLOGIES TO ADDRESS IMPERSONATION | |
| Bowyer | Biometrics Research | |
| Pooe | Factors impacting the adoption of biometric authentication in the local banking sector |