[go: up one dir, main page]

Ahmed, 2022 - Google Patents

Centralized Students' Authentication for Higher Education Systems in Nigeria

Ahmed, 2022

View PDF
Document ID
4531124648258562530
Author
Ahmed M
Publication year
Publication venue
International Journal of Innovative Computing

External Links

Snippet

Increase in the adoption of ICT for service provision renders higher educational institutions in Nigeria vulnerable to numerous security challenges. The information security threats addressed in this paper encompasses identity theft and identification frauds. The high …
Continue reading at ijic.utm.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00103Access-control involving the use of a pass with central registration and control, e.g. for swimming pools or hotel-rooms, generally in combination with a pass-dispensing system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C11/00Arrangements, systems, or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means

Similar Documents

Publication Publication Date Title
Vacca Biometric technologies and verification systems
Xin et al. Smart home multi-factor authentication using face recognition and one-time password on smartphone
Justina Fingerprint-based authentication system for time and attendance management
Scott et al. An assessment of biometric identities as a standard for e-government services
Levy et al. Initial development of a learners’ ratified acceptance of multibiometrics intentions model (RAMIM)
Ahmed Centralized Students’ Authentication for Higher Education Systems in Nigeria
Ullah et al. Usability of profile based student authentication and traffic light system in online examinations
Kleist Building technologically based online trust: Can the biometrics industry deliver the online trust silver bullet?
Bilgihan et al. Research note: biometric technology applications and trends in hotels
Althobaiti et al. Usable security of authentication process: New approach and practical assessment
Goldstein et al. Large-scale biometrics deployment in Europe: Identifying challenges and threats
Gupta Biometrics: Enhancing security in organizations
Al Rasyid et al. Adopting Fingerprint as an Authentication Factor on E-Ticketing Mechanism
Sunusi Developing an access control system for students’ identification in higher institutions of learning using biometric technique
Ahmed RESOURCES’IDENTIFICATION IN EDUCATION SYSTEMS
Prabhakar et al. Biometrics in the commercial sector
Iqbal et al. Biometrics Technology: Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare
Anusiuba et al. Hybrid Authentication Techniques for Workers Identification and Tracking
Desmond Farouk (2020). Multimodal Biometric Authentication For a Computer-Based Test (CBT) Application. IRJCS:: International Research Journal of Computer Science, Volume VII, Issue VII, 179-196
Sharma et al. ATM Management System
Frye et al. The body as a password: considerations, uses, and concerns of biometric technologies
Adeosun et al. Real Time E-Biotechnology Voting System; Using Secret Splitting
Osayomore et al. EVALUATION OF ELECTRONIC BASED VOTING SYSTEM AND DESIGN OF BLOCK-CHAIN-BASED ELECTRONIC VOTING SYSTEM ENHANCED WITH FINGERPRINT AND FACIAL RECOGNITION TECHNOLOGIES TO ADDRESS IMPERSONATION
Bowyer Biometrics Research
Pooe Factors impacting the adoption of biometric authentication in the local banking sector