International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 3- Issue 10, October 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Character Proximity For RFID Smart Certificate System: A Revolutionary Security Measure To Curb Forgery Menace.

[Full Text]



Eze Chika Victor, Adeniji Oluwashola David



Keywords: Radio Frequency Identification, System Architecture, Character proximity, Certificates Implementation and solution statement.



Abstract: Generating certificates for the graduating students is an area of administration that requires significant amounts of time and effort in a university environment, largely due to the number of students that graduate each year from both the full-time and the part-time studies. Students are expected to complete their clearance manually before receiving graduation certificates; this turns out to be very strenuous as much time and effort are wasted in accomplishing such. However, the certificate itself is the problem. It is of very low standard and quality, little or no integrity, very easy to forge, and not befitting for an institution such as the University of Ibadan. There is need to make use of vast growing radio Frequency Identification (RFID) technology to automate the graduation certificate system, which would not only standardize the format of the data collected by the university, but would also protect and secure the integrity of the university’s graduation certificates, reduces administrative work, and improve graduate’s creditability ratios. The objective of the research is to provide an efficient software that can protect the integrity of graduating certificate by embedding an encoded RFID tag using character proximity on each certificate before it is being issued in order to reduce, if not eradicate, the problem of forgery and fraudulent activities on certificates.



[1] Bachthaler, Reiner (1997) Auswahlkriterien für elektronische Datenspeicher, ident, 3. Cited in Klaus Finkenz (2003) ‘RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification (Second Edition)”. John Wiley & Sons. ISBN: 0470844027.

[2] Ivan Beker (Ed.) (2011) ‘Proceedings of the XV International Scientific Conference on Industrial Systems (IS'11)’. University of Novi Sad. Serbia. ISBN-13: 978-86-7892-341-8.

[3] Klaus Finkenz (2003) ‘RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification (Second Edition)”. John Wiley & Sons. ISBN: 0470844027.

[4] Prachi Jain, Ankit Dasgupta (2012) “An Instauration to Radio Frequency Identification”, in: Proceedings of the International Conference on Advances in Communication and Computing Technologies (ICACACT) 2012. International Journal of Computer Applications® (IJCA)

[5] Sagato Technology Co., Ltd (2010) Radio Frequency Identification Basic 2010 [Online]. Sagato Technology Co., Ltd. Retrieved from: http://www.sagato.co.th/rfid_basic.php [Accessed 12 March 2012].

[6] Wagdy Sawahel (2011) UAE: Smart system to prevent degree fraud 2011 [Online]. University World News: The Global Window on Higher Education. Retrieved from: http://www.universityworldnews.com/article.php?story=20110723170439132 [Accessed 12 March 2012].

[7] Wikipedia (2012) Radio-frequency identification 2012 [Online]. Wikipedia. Retrieved from: http://en.wikipedia.org/wiki/Radio-frequency_identification [Accessed 12 March 2012]