[go: up one dir, main page]

Flavia et al., 2020 - Google Patents

Digital legacy

Flavia et al., 2020

View PDF
Document ID
770181740191582201
Author
Flavia A
Suditu T
Publication year
Publication venue
Analele Stiintifice Ale Universitatii Alexandru Ioan Cuza Din Iasi Stiinte Juridice

External Links

Snippet

Throughout this article we envisioned a brief analysis of the" digital legacy" concept, reflecting the specific case law and its impact on comparative legislation. The fact that we live in a digitized world means that we face challenges unbeknownst to inheritance law. First …
Continue reading at pub.law.uaic.ro (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00154Reading or verifying signatures; Writer recognition

Similar Documents

Publication Publication Date Title
Fairfield Virtual property
McCarthy Digital assets and intestacy
Watkins Digital properties and death: What will your heirs have access to after you die
Haworth Laying your online self to rest: evaluating the Uniform Fiduciary Access to Digital Assets Act
Cundiff Reasonable measures to protect trade secrets in a digital environment
Hahn et al. The benefits and costs of online privacy legislation
Sheridan Inheriting digital assets: does the revised uniform fiduciary access to digital assets act fall short?
Vučković et al. Does the Right to Use Digital Content Affect Our Digital Inheritance?
Fiero et al. New global developments in data protection and privacy regulations: comparative analysis of European Union, United States, and Russian legislation
Cofone The dynamic effect of information privacy law
P Martin et al. Cloud computing and electronic discovery
He The mechanism for intellectual property protection under Chinese e-commerce law: more powerful than necessary
Stuenkel Personal information and artificial intelligence: Website scraping and the California Consumer Privacy Act
McGillivray A right too far? Requiring cloud service providers to deliver adequate data security to consumers
Gladstone The US privacy balance and the European privacy directive: reflections on the United States privacy policy
Nekit Legal aspects of the use of social media accounts: current state and perspectives
Flavia et al. Digital legacy
Ticău-Suditu Digital legacy
Pardau et al. The ethical implications of cloud computing for lawyers
Blaszczyk Blockchain and private law
Clear Falling into the gap: The European Union's Data Protection Act and its impact on US law and commerce
Cyphert et al. Blockchain Safe Harbor? Applying the Lessons Learned from Early Internet Regulation
Yuille The Biometric Bitcoin: Blockchain Solutions to Consumer Privacy
Ziwa The effectiveness of legal framework on personal data protection in e-commerce in Kenya
Malahleka The right to data portability: A ghost in the protection of personal information