Professional Documents
Culture Documents
1.0 INTRODUCTION
This section recovers all the section processes of this chapter like background of
the study, statement of the problem, research objectives scope of the study,
research significance and research questions.
1.1 BACKGROUND
student verification system is software which is helpful for students as well as the
university authorities. In the current system all the activities are done manually. It
is very time consuming and costly. Our student verification system deals with the
various activities related to the students.
In this project an admin can manage the faculty and take decision about the
students like deletion of any student admin is authorized to create the token for the
registration of the faculty as same as a faculty is authorized for creating token for
the registration of a student.
In many institutions this is very difficult to maintain student data. Due to this
reason this is very difficult to check information about any student.
Solution
Due to many reasons, we want to create a system which can handled student
information so that these difficulties can be decrease. So, we can call this
system student verification system.
1.3 Objectives
LITERATURE REVIEW
2.0 INTRODUCTION
For example, if the relying party has the capability to perform certification path
validation, but lacks a reliable or efficient method of constructing a valid
certification path, DPD might be an acceptable option. Moreover, if the relying
party is using the services of SCVP server(s) that is outside its Enterprise and that
it does not trust, DPD is extremely useful. On the other hand, if the relying party
has complete trust in the SCVP Server, the work of certification path construction
and validation can be delegated to the authoritative and trusted SCVP Server. Since
validation is performed by the server, operating in DPV mode ensures that policies
are consistently enforced throughout the organization. For the remainder of this
document, it is assumed that SCVP is used in the DPV mode unless explicitly
stated otherwise. (Myers, M., A., Galperin, S.,June 1999.)
The client MAY allow the server to use a cached SCVP response. When doing so,
the client MAY use the produced at item to express requirements on the freshness
of the cached response. The produced At item tells the earliest date and time at
which an acceptable cached response could have been produced. The produced at
item represents the date and time in UTC, using the GeneralizedTime type. The
value in the producedAt item is independent of the validation time (Ankney, R.,
Malpani, June 1999)
2.2 To store details of quality information
information quality is a measure of the condition of data based on factors such as
accuracy, completeness, consistency, reliability and whether it's up to date.
Measuring data quality levels can help researcher to identify data errors that need
to be resolved and assess whether the data in their IT systems is fit to serve its
intended purpose. Bad details can have significant identification consequences for
companies. Poor-quality data is often pegged as the source of operational
inaccurate analytics and ill-conceived strategies. Good Data accuracy is a key
attribute of high-quality data. To avoid incomplete identification problems in
operational systems and faulty results in analytics applications, the data that's used
must be correct. Inaccurate data needs to be identified, documented and fixed to
ensure that executives, data analysts and other end users are working with good
information
2.3 To make them available as an integrated system
Many computer assisted intervention (CAI) systems are created by integrating a
number of different devices, such as imaging, robotics, visualization, and haptics,
to solve a clinical problem. It is therefore important to consider the processes,
tools, and best practices in the area of system integration.
In very broad terms, system integration is the process of connecting different sub-
systems (components) into a single larger system that functions as one. With
regards to software solutions, system integration is typically defined as the process
of linking together various IT systems, services and/or software to enable all of
them to work functionally together
The main reason for organizations to use system integration is their need to
improve productivity and quality of their operations. The goal is to get the
organizations various IT systems to “talk to each other” through the integration, to
speed up information flows and reduce operational costs for the organization. But
system integration is not used only to connect an organization’s internal systems,
but also third parties that the organization operates with.
2.3.1 Integrating web-based training into an annual training plan
Over the years there have been a great need of easy and fasted means of verify
result/certificate to reduce the level or certificate forgery and to ease the stress and
also save the time of certificate verification which is done manually today, an
employer or anybody concern will have to come or send delegate to school to
verify a particular certificate, some employer never did and this has resulted on
accepting a forge certificate. The system can be implemented as a standalone site
(recommended) or can also be embedded in an already existing institution official
website. The aim of this study is to design an online certificate verification system
based on the verification process adopted by the university to verify her results
(Howard, n.d.)
2.4.1 Cryptography Implementation and QR Code for Verification of the
Authenticity
“In general, cryptography is the science and art of encryption that aims to maintain
the security and confidentiality of data. Cryptography also does not mean only
providing information security, but cryptography is more about the techniques
(Bhaudhayana and Widiartha, 2015).
Advanced Encryption Standard (AES) is a cryptographic algorithm that can be
used to secure data. The AES algorithm is a symmetric block ciphertext that can
encrypt (encipher) and decrypt (decipher) information. Encryption changes data
that can no longer be read called ciphertext, on the other hand decryption is
changing the ciphertext data into its original form known as plaintext. The AES
algorithm uses 128,192- and 256-bit cryptographic keys to encrypt and decrypt
data in 128-bit blocks. Previous research entitled Development of Certificate
Authentication Method Using QR Code Images made an application for letter
security. This study adds a QR Code to the certificate to make it easier to detect the
authenticity of certificate ownership information via mobile devices. From this
research, it can be concluded that the QR Code can be used quickly to verify the
certificate of a graduate of Stik bank UNISBANK University quickly and
accurately. However, the authors suggest that it is necessary to think about internet
security to encrypt diploma data (Ardhianto et all, 2016).
Another research on QR Code that has been conducted is entitled Development of
QR Code Generator Application and QR Code Reader from Image-Shaped Data.
This application is successful in making QR Code with image data, but it is
considered not feasible to be implemented in the real world because of its large
size and difficult to read (Nugraha and Munir, 2011).
The research entitled Certificate Verification System Using Qr code at the Central
Event Information creates a certificate security system with a QR Code.
Certificates that are printed through this system are added with a QR Code for
security. QR Code can be scanned using QR Code Reader on smartphone. If the
QR Code is successfully scanned, it will be redirected to a verification page which
will provide detailed information regarding certificate ownership, type of activity,
and activity time. Students can also view certificates in digital form which can be
scanned and verified so that if there is damage to the certificate it has been printed,
the student still has the digital certificate document (Febriyanto et all, 2019).
5. Security: Neither the node nor anyone else except the sender and the
receiver can access the data sent across the blockchain.
Bloom (Jesse Leimgruber, A.M., John Backus,, 2018.), a blockchain project for
credit scoring and identity management that uses Ethereum and IPFS. it is an all-
encompassing protocol it that it allows for each traditional and digital currency
holders to serve as lenders to users who are unable to obtain a bank account or
credit score. users will create an id contract (BloomID) to be attested by friends,
family and corporation. The BloomIQ system then reports and tracks debt
obligations, ensuing in a BloomScore as a metric of client’s credit worthiness.
The bloom protocol creates a globally portable and inclusive credit profile,
reducing the need for classic banking infrastructure and opaque, proprietary credit
score
Is a platform that protects and also shares student records using a blockchain base
on this platform is a new educational platform raised by the IBM ministry. Sony's
global education and Sony corporation announced that they will form a system on
August 10, 217, which specifically blockchain technology will be applied in the
education system. Sony will begin establishing its service offering in 2018, to
bring 150000 from all over the world by being eager to help to begin the global
mathematical challenges (M. B. Hoy, 2017).
Conclusion of the literature review
In conclusion, fake news are false stories in order create propaganda or influence
the public on a political or sociological issue with the assistance of social media,
internet, and established news sources. Fake news serves various purposes to
society such as influencing and persuade people through the means of fake
material and damaging a person, event, idea, concept, or people in general. As
shown, the three main causes are; the social media and internet impact, the rise of
unreliable news sources and fall of authoritative news outlets, and lastly the
anonymity behind the creation of fake news and misinformation advertisements.
REFERENCES
https://whatis.techtarget.com/definition/certification
SCVP
DOI=http://www.ietf.org/rfc/rfc5055.txt
Cryptography
Pramusinto, W., Trya Sartana, B., Mulyati, S., & Amini, S. (2021). Implementation
of AES-192 Cryptography and QR Code to Verify The Authenticity of Budi Luhur
University Student Certificate. JURNAL PENDIDIKAN TEKNOLOGI
KEJURUAN, 3(4), 209–215. https://doi.org/10.24036/jptk.v3i4.14823
Ardhianto E., Handoko, W.T, and Wahyudi, W.N., 2016. Pengembangan Metode
Otentikasi Keaslian Ijasah Dengan Memanfaatkan Gambar Qr Code. Jurnal
Teknologi Informasi Dinamik., vol. 20, no. 2, p. 106-114.
Nugraha, M.P., and Munir, R., 2011. Pengembangan Aplikasi QR Code Generator
dan QR Code Reader dari Data Berbentuk Image. Konferensi. Naional.
Informatika. – KNIF 2011, Bandung, 23 November 2011.
Blcokchain