[go: up one dir, main page]

Lee, 2009 - Google Patents

Enhancing national security by strengthening the legal immigration system

Lee, 2009

View PDF
Document ID
2988413472023464310
Author
Lee D
Publication year

External Links

Snippet

One of the biggest challenges the US contends with is how foreign nationals are using the legal immigration system to embed themselves in the country. While not every person who commits immigration fraud is a terrorist, those who intend to do this country harm will likely …
Continue reading at calhoun.nps.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Similar Documents

Publication Publication Date Title
Saito Symbolism under siege: Japanese American redress and the racing of Arab Americans as terrorists
Chesney The sleeper scenario: Terrorism-support laws and the demands of prevention
Camarota The open door
Abel Law's trials: The performance of legal institutions in the US'War on Terror'
Bier Extreme vetting of immigrants: Estimating terrorism vetting failures
Lowe Policing terrorism: research studies into police counterterrorism investigations
Ervin Open target: Where America is vulnerable to attack
Meyer Honduran-US Relations
Shapiro et al. Encyclopedia of security and emergency management
Smith et al. The patriot act: Issues and controversies
Farnam US immigration laws under the threat of terrorism
Michaels No greater threat: America after September 11 and the rise of a national security state
Steinbock Designating the dangerous: from blacklists to watch lists
Low et al. Migration control in Malaysia: Shifting toward internal enforcement
Ginsburg Securing Human Mobility in the Age of Risk: New Challenges for Travel, Migration, and Borders
Yeh et al. USA PATRIOT Improvement and Reauthorization Act of 2005: A legal analysis
Copeland et al. Intelligence Failure and Mass Casualty Terrorism
Keenan Invasion of privacy: A reference handbook
Girod Advanced criminal investigations and intelligence operations: Tradecraft methods, practices, tactics, and techniques
Hobbing Tracing Terrorists: The EU–Canada Agreement in PNR Matters
Olshansky Democracy detained: Secret unconstitutional practices in the US war on terror
Molnár Travel Documents in use by Terrorists
Hastedt Espionage: a reference handbook
National Commission on Terrorist Attacks 9/11 and terrorist travel: A staff report of the National Commission on Terrorist Attacks Upon the United States
Lee Enhancing national security by strengthening the legal immigration system