Flavia et al., 2020 - Google Patents
Digital legacyFlavia et al., 2020
View PDF- Document ID
- 770181740191582201
- Author
- Flavia A
- Suditu T
- Publication year
- Publication venue
- Analele Stiintifice Ale Universitatii Alexandru Ioan Cuza Din Iasi Stiinte Juridice
External Links
Snippet
Throughout this article we envisioned a brief analysis of the" digital legacy" concept, reflecting the specific case law and its impact on comparative legislation. The fact that we live in a digitized world means that we face challenges unbeknownst to inheritance law. First …
- 230000000052 comparative effect 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00154—Reading or verifying signatures; Writer recognition
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Fairfield | Virtual property | |
| McCarthy | Digital assets and intestacy | |
| Watkins | Digital properties and death: What will your heirs have access to after you die | |
| Haworth | Laying your online self to rest: evaluating the Uniform Fiduciary Access to Digital Assets Act | |
| Cundiff | Reasonable measures to protect trade secrets in a digital environment | |
| Hahn et al. | The benefits and costs of online privacy legislation | |
| Sheridan | Inheriting digital assets: does the revised uniform fiduciary access to digital assets act fall short? | |
| Vučković et al. | Does the Right to Use Digital Content Affect Our Digital Inheritance? | |
| Fiero et al. | New global developments in data protection and privacy regulations: comparative analysis of European Union, United States, and Russian legislation | |
| Cofone | The dynamic effect of information privacy law | |
| P Martin et al. | Cloud computing and electronic discovery | |
| He | The mechanism for intellectual property protection under Chinese e-commerce law: more powerful than necessary | |
| Stuenkel | Personal information and artificial intelligence: Website scraping and the California Consumer Privacy Act | |
| McGillivray | A right too far? Requiring cloud service providers to deliver adequate data security to consumers | |
| Gladstone | The US privacy balance and the European privacy directive: reflections on the United States privacy policy | |
| Nekit | Legal aspects of the use of social media accounts: current state and perspectives | |
| Flavia et al. | Digital legacy | |
| Ticău-Suditu | Digital legacy | |
| Pardau et al. | The ethical implications of cloud computing for lawyers | |
| Blaszczyk | Blockchain and private law | |
| Clear | Falling into the gap: The European Union's Data Protection Act and its impact on US law and commerce | |
| Cyphert et al. | Blockchain Safe Harbor? Applying the Lessons Learned from Early Internet Regulation | |
| Yuille | The Biometric Bitcoin: Blockchain Solutions to Consumer Privacy | |
| Ziwa | The effectiveness of legal framework on personal data protection in e-commerce in Kenya | |
| Malahleka | The right to data portability: A ghost in the protection of personal information |