Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

DEVELOPMENT OF

CERTIFICATE VERIFICATION
SYSTEM USING
BACKTRACKING ALGORITHM

DESIGNED BY

IBRAHIM OLANREWAJU AHMED


HND/19/COM/FT/474
Introduction
Certificate Verification System (CVS) provides prompt, primary-source
confirmation of the educational certification status of higher institution. The
organization that evaluates and accredits institution certificate has determined
that direct verification is a way of ascertain the authenticity and certification
status for primary-source verification fororganizationsto confirm the completion
of the certificate programme (Borde, 2015).Institutions submit student eligibility
information online for the purpose of verification; CVS requests can be made
online by goingto the institution certificate verification portal by supplying the
certificate No which will fetch the information about the certificate if genuine.
STATEMENT OF THE PROBLEM

Fake certificates are been used in many


organizations to acquire job this days when the
owner of the certificate knows there is no way the
firm can verify the certificate, and sometimes when
there is a way to confirm the certificate, it is
somehow stressful and cost expensive for the
organization to embark on the authenticity.
AIMS AND OBJECTIVES
The main aim of this project work is to develop a good web
interface for certificate verification to make information available
on the status of such certificates and endorsements to other parties
and companies that request for the certificates produced by an
institution.There are several objectives that identified in this
system. These objectives are listed below:
 Able to track fake resumes and certificates.
 To make certificate request easier and faster.
 To reduce cost of transportation when organization want to
embark on the certificate verification.
 To make student information available for authenticity.
 To eradicate fake certificate used by the pre-students and post-
students.
LITERATURE REVIEW
AUTHOR

ukwu &
YEAR TITLE
Nwach 2015 Designing An
Automatic Web-
AIMS
The aim of this study
is to design an online
METHODOLOGY
The system can be
implemented as a
LIMITATION
to reduce the level or
certificate forgery and to
Igbajar Based Certificate certificate standalone site ease the stress and also
Verification verification system (recommended) or can save the time of
System For based on the also be embedded in an certificate verification
Institutions (Case verification process already existing which is done manually
Study: Michael adopted by the institution official today
Okpara University university to verify website
Of Agriculture, her results.
Umudike)
2019 A Generic Improved work The system uses a The university, the
Patrick Certificate processes, ease of NoSQL database graduate and the
Verification use and (MongoDB) for verifier are the three
System for maintenance by the certificate storage and parties involved in the
Nigerian University for the Hypertext proposed solution to
Universities Verification Process Preprocessor (PHP) accomplish accurate
for the front-end certificate verification.
design.
Ewen & 2015 Software f. It builds on existing A software certificate It maintains the links
Bernd Certification and software assurance, management system between different system
Software validation, and (SCMS) provides a artifacts (e.g., design
Certificate verification range of certification documents, engineering
Management techniques but services data sets, or programs)
Systems. introduces the notion and different varieties of
of explicit software certificates, checks the
certificates, validity of certificates
RESEARCHMETHODOLOGY
The proposed system is developed in Web Application which
makes use of the following HTML, CSS, JAVASCRIPT and
PHP as the programming language due to its user
friendliness and it’s the most popular web script that is easy
to embed with mark-up language while MYSQL is used as
the back end (Database). Methodology refers to the practices
and techniques in research used to gather, process, and
manipulate information that can then be used to test ideas
and theories about social life. Types of methodologies
include interview, library, textbooks and internet research.
The types of method employed in this system are Direct
Observation, and Internet.
RESULTS AND DISCUSSION
Output design is a design developed to meets the system design requirements of the
end user, and presents the information clearly to determine how the information is
to be displaced for immediate need

Describes the output design of the Home Page


RESULTS AND DISCUSSION CON’T
Describes the output design of all certificates issued

Add Module
RESULTS AND DISCUSSION CON’T

Describes the output design of certificate issued by Kwara State Polytechnic by


supplying the certificate no
CONCLUSION AND RECOMMENDATION
CONCLUSION
Certificate verification system is not peculiar to institution alone but to
other branches of life. These has led to the development of user web
application, finding solution to the problems that individual or people can
faced during software development, moreover many organizations need
this web application to validate any certificate that comes there way.
RECOMMENDATION
Training should be organized for the usage of the new system. This is
very essential, especially if the user do not have electronic data processing
experience.
The training must be supervised by the system designer / programmer and
presentation of the new system must be carried out.
External diskette should be avoided in avoidance of suspicious virus
infections.
REFERENCES
 Borde D. de, “Two-Factor Authentication,” (2010). Available at
http://www.insight.co.uk/files/whitepapers/ Two factor %20
authentication %20(White%20paper).pdf.
 BrainardJ.“Fourth-Factor Authentication: Somebody You Know,” ACM
CCS, 168-78. 2010.
 Clarke, N. L., & Furnell, S. M. ,2012. “Authentication of users on
institutes – A survey of attitudes and practices.” Computers &
Security, 24(7), 519-527.
 Jae-Jung Kim and Seng-Phil Hong, 2011.“A Method of Risk Assessment
for Multi- Factor Authentication.”Journal of Information
Processing Systems, Vol.7, No.1, March.
 Kevin Streff, Justin Haar, 2013. “An Examination of Information
Security in institution Architectures” Proceedings of Conference on
Information Systems Applied Research, v1, Page 1.
 Lange D.B. and M. Oshima,2009. “Programming and Deploying Mobile
Agents with Aglets” Addison-Wesley, USA, ISBN:020132582.
THANK YOU FOR
WATCHING MY
PRESENTATION

SLIDE

You might also like