[go: up one dir, main page]

Ries, 2010 - Google Patents

B-Verify: transforming E-Verify into a biometric employment verification system

Ries, 2010

View PDF
Document ID
10162178858881771364
Author
Ries L
Publication year
Publication venue
Alb. Gov't L. Rev.

External Links

Snippet

The United States has experienced illegal immigration as a problem of national attention since the 1970s. Congress has tried to combat the problem through major, but periodic, legislation for nearly as long. In the early 1980s, experts identified employment as the main …
Continue reading at www.albanygovernmentlawreview.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Solove et al. A model regime of privacy protection
Kalhan Immigration policing and federalism through the lens of technology, surveillance, and privacy
Sobel The Demeaning of Identity and Personhood in National Indentification Systems
Levitt Election deform: The pursuit of unwarranted electoral regulation
Komuves We've Got Your Number: An Overview of Legislation and Decisions to Control the Use of Social Security Numbers as Personal Identifiers
Casarez Furthering the accountability principle in privatized federal corrections: the need for access to private prison records
Langseth et al. National integrity systems
Yeboah‐Assiamah et al. The calculus of corruption: a paradox of ‘strong’corruption amidst ‘strong’systems and institutions in developing administrative systems
Regan Privacy, government information, and technology
Beermann Administrative-law-like Obligations on Private [ized] Entities
Sutton Controlling corruption through collective means: Advocating the Inter-American convention against corruption
Wasem Brief history of comprehensive immigration reform efforts in the 109th and 110th congresses to inform policy discussions in the 113th congress
Ries B-Verify: transforming E-Verify into a biometric employment verification system
Barnard Securities Law Enforcement Remedies Act of 1989: Disenfranchising Shareholders in Order to Protect Them
Meissner et al. The Next Generation of E-Verify: Getting Employment Verification Right
Wilneff “So” what? Why the Supreme Court’s narrow interpretation of the computer fraud and abuse act in Van Buren v. United States has drastic effects
Patten E-verify during a period of economic recovery and high unemployment
Jacobs E-Verify continues to be employers’ best tool to verify employees’ work authorization
McCall Computer crime statutes: Are they bridging the gap between law and technology
Shaw et al. Preventing corporate embezzlement
Jefferson What's in a Name: A Comparative Analysis of the United States Real ID Act and the United Kingdom's National Identity Scheme
Solove et al. A model regime of privacy protection (Version 2.0)
Dube An Exploration of the Use of Fingerprints Identification Systems on Latent Prints of First-Time Offenders in South Africa
Froomkin The Uneasy Case for National ID Cards
Swire et al. The ID Divide: Addressing the Challenges of Identification and Authentication in American Society