You are on page 1of 4

1.0 Certificate validation is complex.

If certificate handling is to be
widely deployed in a variety of applications and environments, the
amount of processing an application needs to perform before it can
accept a certificate needs to be reduced. There are a variety of
applications that can make use of public key certificates, but these
applications are burdened with the overhead of constructing and
validating the certification paths. SCVP reduces this overhead for
two classes of certificate-using applications.

The first class of applications wants just two things: confirmation


that the public key belongs to the identity named in the certificate
and confirmation that the public key can be used for the intended
purpose. Such clients can completely delegate certification path
construction and validation to the SCVP server. This is often
referred to as delegated path validation (DPV).

2.0 Web-based training is training done through a web-based or online


environment. Web-based training is often referred to as virtual training
or distance learning and uses cloud-based computing tools for access,
administration, delivery and analytics. Web-based training can be done live
or at a time and place that is most convenient to the learner.

3.0 Nowadays a letter can easily be falsified and used for things that are not appropriate. Budi
Luhur University has a work unit that serves student requests for certificate of active students
and certificate of graduation. Students need that certificate for apply a job or get a scholarship.
To prevent the falsification of letters, a system using PHP programming language and MariaDB
database was used to verify the letters. The certificate released by this system will be equipped
with a QR Code containing the URL with parameters that have been encrypted with the
cryptographic method AES-192. If accessed, this URL will display the data number, name, letter
number and date of the letter. The recipient letter can verify the authenticity of the letter by
comparing the data in the letter with the data in the system. If the two data are the same, the
letter is the original. Based on test results, this system can be used to guarantee the authenticity
of a letter.

4. Blockchain is a jointly distributed and decentralized ledger, in which nodes are aiming to record
transaction history with very different networks. This technology is quite practical if used in the field
of higher education to carry out digital certification, record keeping, etc. From several papers
published on this, no single paper covering educational projects based on the blockchain can find it.
So there are the latest opportunities for higher education trends. Projects in the field of higher
education that are blockchain-based are aimed at solving problems that occur in educators today.
On that basis, we conclude that there is a need for a systematic literature review. Therefore, based
on the education project, this study will review the artistic gap between the two. This paper will focus
on the protocol used in this project and explore several blockchain-based higher education projects
that will be the aim of this paper. As well as analyzing the blockchain features currently in use today
and the services that will be offered by existing educational projects, to improve the implementation
of technology in the field of education by using the blockchain feature.

5. Public key infrastructures (PKIs) are of crucial importance for the life of online services relying on
certificate-based authentication, like e-commerce, e-government, online banking, as well as e-mail,
social networking, cloud services and many others. One of the main points of failure (POFs) of
modern PKIs concerns reliability and security of certificate revocation lists (CRLs), that must be
available and authentic any time a certificate is used. Classically, the CRL for a set of certificates is
maintained by the same (and sole) certification authority (CA) that issued the certificates, and this
introduces a single POF in the system. We address this issue by proposing a solution in which
multiple CAs share a public, decentralized and robust ledger where CRLs are collected. For this
purpose, we consider the model of public ledgers based on blockchains, introduced for the use in
cryptocurrencies, that is becoming a widespread solution for many online applications with stringent
security and reliability requirements. 

6.o A Certificate verification system is a system designed to digitize the process of adding
certificates and verifying the certificate records considering the problems faced by doing this
manually. The system was studied and relevant officials were interviewed to acquire the required
data. This designed system allows for easy retrieval of information that is accurate for effective and
efficient allocations. It has easy maintenance of information as well as time saving and reduction in
operation. The front end of the system was designed using HTML and CSS, while the backend was
developed using PHP. The output is an interactive, menu-driven and user-friendly system which
provides timely and accurate information about certificates. The certificate operations are recorded
and stored in the computer and retrieved at will. The system also ensures security as users must log
in before and after any certificate is added or printed.

7.0 Verification is the process of checking the accuracy of the information given by clients seeking
services from a Social Enterprise organization. According to Wikipedia Certification refers to the
confirmation of certain characteristics of an object, person, or organization. This confirmation is often,
but not always, proHow to cite this paper: Emele, I.C., Oguoma, S.I., Uka, K.K. and Nwaoha, E.C. (2020)
An Enhanced Web Base Certificate Verification System. Open Access Library Journal, 7: e6342.
https://doi.org/10.4236/oalib.1106342 Received: April 21, 2020 Accepted: July 27, 2020 Published: July
30, 2020 Copyright © 2020 by author(s) and Open Access Library Inc. This work is licensed under the
Creative Commons Attribution International License (CC BY 4.0).
http://creativecommons.org/licenses/by/4.0/ Open Access I. C. Emele et al. DOI: 10.4236/oalib.1106342
2 Open Access Library Journal vided by some form of external review, education, assessment, or audit.
Accreditation is a specific organization’s process of certification. The Internet has been one of the most
frequently used means of exchanging information among people [1]. The rapid increase in the volume of
scientific literature has led to researchers constantly fighting information overload in their pursuit of
knowledge. Furthermore, everyone should be able to browse the same websites and have the
opportunity for equal user experience on the Internet. In other words, the Internet should be usable by
everyone

8.0 In the recent years, the vulnerabilities of conventional public key


infrastructure are exposed by the real-world attacks, such as the certificate
authority’s single-point-of-failure or clients’ private information leakage. Aimed
at the first issue, one type of approach is that multiple entities are introduced
to assist the certificate operations, including registration, update, and
revocation. However, it is inefficient in computation. Another type is to make
the certificate information publicly visible by bringing in the log servers.
Nevertheless, the data synchronization among log servers may lead to
network latency. Based on the second approach, the blockchain-based public
key infrastructure schemes are proposed. Through these type of schemes, all
the certificate operations are stored in the blockchain for public audit.
However, the issue of revoked certificates’ status storage is worth paying
attention, especially in the setting with massive certificates. In addition, the
target web server that a client wants to access is exposed in the process of
certificate status validation

9.0 E-recruitment has driven the today employer to employ web based recruitment systems in the
hiring processes. The E-recruitment constitute web based frameworks that provide structures for key
personnel processes, (Cullen, 2001). The methods have been employed in a wider scale with several
companies forming a business or a living in this area and also helping the companies in hiring the
‘right’ staff based on information submitted. The terms online recruitment, internet recruitment and
e-recruitment will be used interchangeably in the same context. The term recruitment will refer to all
situations where academic papers are presented for hire and/or consideration be they for political
nominations or even school enrolments.

10.0 graduatuion certificates issued by universities and other educational institutions are one of the most important
documents for a graduate. It is a proof of graduate’s qualifications and can be used to advance forward in one’s career and
life. However, due to advances in software, printing and photocopying technologies, forgery of those certificates is made
easy and as good as the original, making them difficult to detect. Several universities and educational institutions as well as
businesses started to dedicate resources for verifying certificates however that is usually a tedious and quite costly process
and there isn't a clear model that can be adopted by those institutions that could minimize cost and speed up the process.
There are many techniques proposed for paper based document verification and this paper analyzes and expatiate the issues
on those techniques. Most of the verification techniques require change in the process of certificate generation either by
changing template, changing paper, changing printers, adding hardware or even adding extra information. This change may
mean that the university or verifier needs the proper knowledge to execute and run the proposed technique

You might also like