Ries, 2010 - Google Patents
B-Verify: transforming E-Verify into a biometric employment verification systemRies, 2010
View PDF- Document ID
- 10162178858881771364
- Author
- Ries L
- Publication year
- Publication venue
- Alb. Gov't L. Rev.
External Links
Snippet
The United States has experienced illegal immigration as a problem of national attention since the 1970s. Congress has tried to combat the problem through major, but periodic, legislation for nearly as long. In the early 1980s, experts identified employment as the main …
- 230000001131 transforming 0 title description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/00158—Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Solove et al. | A model regime of privacy protection | |
Kalhan | Immigration policing and federalism through the lens of technology, surveillance, and privacy | |
Sobel | The Demeaning of Identity and Personhood in National Indentification Systems | |
Levitt | Election deform: The pursuit of unwarranted electoral regulation | |
Komuves | We've Got Your Number: An Overview of Legislation and Decisions to Control the Use of Social Security Numbers as Personal Identifiers | |
Casarez | Furthering the accountability principle in privatized federal corrections: the need for access to private prison records | |
Langseth et al. | National integrity systems | |
Yeboah‐Assiamah et al. | The calculus of corruption: a paradox of ‘strong’corruption amidst ‘strong’systems and institutions in developing administrative systems | |
Regan | Privacy, government information, and technology | |
Beermann | Administrative-law-like Obligations on Private [ized] Entities | |
Sutton | Controlling corruption through collective means: Advocating the Inter-American convention against corruption | |
Wasem | Brief history of comprehensive immigration reform efforts in the 109th and 110th congresses to inform policy discussions in the 113th congress | |
Ries | B-Verify: transforming E-Verify into a biometric employment verification system | |
Barnard | Securities Law Enforcement Remedies Act of 1989: Disenfranchising Shareholders in Order to Protect Them | |
Meissner et al. | The Next Generation of E-Verify: Getting Employment Verification Right | |
Wilneff | “So” what? Why the Supreme Court’s narrow interpretation of the computer fraud and abuse act in Van Buren v. United States has drastic effects | |
Patten | E-verify during a period of economic recovery and high unemployment | |
Jacobs | E-Verify continues to be employers’ best tool to verify employees’ work authorization | |
McCall | Computer crime statutes: Are they bridging the gap between law and technology | |
Shaw et al. | Preventing corporate embezzlement | |
Jefferson | What's in a Name: A Comparative Analysis of the United States Real ID Act and the United Kingdom's National Identity Scheme | |
Solove et al. | A model regime of privacy protection (Version 2.0) | |
Dube | An Exploration of the Use of Fingerprints Identification Systems on Latent Prints of First-Time Offenders in South Africa | |
Froomkin | The Uneasy Case for National ID Cards | |
Swire et al. | The ID Divide: Addressing the Challenges of Identification and Authentication in American Society |