Enhanced physical document management using NFC with verification for security and privacy
This study focuses on implementation of physical document management for an organization using Near-Field Communication (NFC) since it provides faster detection on tracking items based on location. Current physical document management operates using bar-codes. However, barcodes are able to be duplic...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science and Information Organization
2019
|
Online Access: | http://eprints.utem.edu.my/id/eprint/24448/2/PAPER_22-ENHANCED_PHYSICAL_DOCUMENT_MANAGEMENT.PDF http://eprints.utem.edu.my/id/eprint/24448/ https://thesai.org/Downloads/Volume10No3/Paper_22-Enhanced_Physical_Document_Management.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This study focuses on implementation of physical document management for an organization using Near-Field Communication (NFC) since it provides faster detection on tracking items based on location. Current physical document management operates using bar-codes. However, barcodes are able to be duplicated, which make it not secure that lead to forgery and unauthorized modification. Therefore, the purpose of the proposed physical document management system is to produce a better administration control in an organization through the use of verification mechanism. Nonetheless, the current NFC based system is lack of verification process. Thus, an enhancement in physical document management with verification process is proposed and self-developed system is built using C#, SQLite, Visual Studio, NFC tag and NFC reader (ACR122U-A9). Moreover, the new system required employee to log in to the system by scanning ID tag and followed by the physical document File tag, which both tags scanned at the NFC reader. Then, information of the physical file coordinator and the status of the location of the physical document file is displayed. The significant of this study is to protect confidential document and improve administrative control through dual verification; and produce a database to monitor the real-time data detection. |
---|