Lee, 2009 - Google Patents
Enhancing national security by strengthening the legal immigration systemLee, 2009
View PDF- Document ID
- 2988413472023464310
- Author
- Lee D
- Publication year
External Links
Snippet
One of the biggest challenges the US contends with is how foreign nationals are using the legal immigration system to embed themselves in the country. While not every person who commits immigration fraud is a terrorist, those who intend to do this country harm will likely …
- 230000002708 enhancing 0 title description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Saito | Symbolism under siege: Japanese American redress and the racing of Arab Americans as terrorists | |
Chesney | The sleeper scenario: Terrorism-support laws and the demands of prevention | |
Camarota | The open door | |
Abel | Law's trials: The performance of legal institutions in the US'War on Terror' | |
Bier | Extreme vetting of immigrants: Estimating terrorism vetting failures | |
Lowe | Policing terrorism: research studies into police counterterrorism investigations | |
Ervin | Open target: Where America is vulnerable to attack | |
Meyer | Honduran-US Relations | |
Shapiro et al. | Encyclopedia of security and emergency management | |
Smith et al. | The patriot act: Issues and controversies | |
Farnam | US immigration laws under the threat of terrorism | |
Michaels | No greater threat: America after September 11 and the rise of a national security state | |
Steinbock | Designating the dangerous: from blacklists to watch lists | |
Low et al. | Migration control in Malaysia: Shifting toward internal enforcement | |
Ginsburg | Securing Human Mobility in the Age of Risk: New Challenges for Travel, Migration, and Borders | |
Yeh et al. | USA PATRIOT Improvement and Reauthorization Act of 2005: A legal analysis | |
Copeland et al. | Intelligence Failure and Mass Casualty Terrorism | |
Keenan | Invasion of privacy: A reference handbook | |
Girod | Advanced criminal investigations and intelligence operations: Tradecraft methods, practices, tactics, and techniques | |
Hobbing | Tracing Terrorists: The EU–Canada Agreement in PNR Matters | |
Olshansky | Democracy detained: Secret unconstitutional practices in the US war on terror | |
Molnár | Travel Documents in use by Terrorists | |
Hastedt | Espionage: a reference handbook | |
National Commission on Terrorist Attacks | 9/11 and terrorist travel: A staff report of the National Commission on Terrorist Attacks Upon the United States | |
Lee | Enhancing national security by strengthening the legal immigration system |