Certificate digitalization for information security in verification
DOI:
https://doi.org/10.52453/aic.v1iOctober.460Keywords:
extreme programming, e-certificate, qr code, system development life cycleAbstract
The rapid advancement of technology has made information access more convenient, but this ease is often misused for fraudulent purposes, such as manipulating TOEFL certificates, graduation certificates, and other important documents. These forgeries are challenging to detect, raising doubts about the validity and authenticity of such documents. To address this issue, this paper aims to ensure the authenticity and validity of certificates by developing an e-certificate system integrated with a QR Code-based verification mechanism. This approach minimizes the risk of forgery and strengthens trust in document verification processes. The system is built using the System Development Life Cycle (SDLC) approach with the Extreme Programming methodology. This includes stages of planning, where a detailed activity plan is created; design, where the Physical Data Model (PDM) and user interfaces are developed; and implementation, where the designs are transformed into a functional program. These stages are iterated continuously to ensure the system meets user needs. The proposed system features an admin module for managing activities, creating certificates, and handling user data. Participants, on the other hand, can validate certificates by scanning QR Codes and downloading their verified certificates. By integrating these functionalities, the e-certificate system offers a reliable solution to verify document authenticity and protect the integrity of the information contained within. This innovation is expected to significantly reduce forgery incidents and enhance the security of important documents in various applications.
References
Artha, K. A. R., Zain, S. N., Alkautsar, A. A., & Widianto, M. H. (2022). Implementation of Smart Contracts for E-Certificate as Non-Fungible Token using Solana Network. 2022 IEEE 7th International Conference on Information Technology and Digital Applications (ICITDA), 1–6. https://doi.org/10.1109/ICITDA55840.2022.9971423
Dennis, A., Wixom, B., & Roth, R. (2012). System Analysis and Design, Fifth Edition. John Wiley & Sons. https://books.google.co.id/books?id=zCRQzQEACAAJ
Imbar, R. V, Sutedja, B. R., & Christianti, M. (2021). Smart Attendance Recording System using RFID and e-Certificate using QR Code-based Digital Signature. 2021 International Conference on ICT for Smart Society (ICISS), 1–5. https://doi.org/10.1109/ICISS53185.2021.9533199
Indah, F., Sidabutar, A., & Annisa, N. (2022). Jurnal Bidang Penelitian Informatika Peran Cyber Security Terhadap Keamanan Data Penduduk Negara Indonesia (Studi Kasus: Hacker Bjorka). Jurnal Bidang Penelitian Informatika, 1(1), 1–8. https://ejournal.kreatifcemerlang.id/index.php/jbpi
Kesuma, A. A. N. D. H., Budiartha, I. N. P., & Wesna, P. A. S. (2021). Perlindungan Hukum Terhadap Keamanan Data Pribadi Konsumen Teknologi Finansial dalam Transaksi Elektronik. Jurnal Preferensi Hukum, 2(2), 411–416. https://doi.org/10.22225/jph.2.2.3350.411-416
MONDAL, S., PANJA, A., & KARFORMA, S. (2023). An Efficient E-Certificate Management System in E-Learning Using Blockchain. Science and Culture, 89(March-April), 120–124. https://doi.org/10.36094/sc.v89.2023.an_efficient_e-certificate_management_system.mondal.120
Nguyen, V.-L., Lin, P.-C., Cheng, B.-C., Hwang, R.-H., & Lin, Y.-D. (2021). Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges. IEEE Communications Surveys & Tutorials, 23(4), 2384–2428. https://doi.org/10.1109/COMST.2021.3108618
Pawar, M. K., Patil, P., Sawhney, R., Gumathanavar, P., Hegde, S., & Maremmagol, K. (2022). Performance Analysis of E-Certificate Generation and Verification using Blockchain and IPFS. 2022 International Conference on Inventive Computation Technologies (ICICT), 345–350. https://doi.org/10.1109/ICICT54344.2022.9850830
Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299–1323. https://doi.org/10.1007/s11747-022-00845-y
Verma, A., & Sharma, B. (2022). Dynamic E-Certificate Designing with Automatic Mailing System using Python and SQLite3. Journal of Applied Information Science, 10(2), 26–30. https://ssrn.com/abstract=4249245
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Proceedings ASTRAtech International Conference

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.