SMS User Interface Result Checking System
|
|
|
- Eleanor Tucker
- 10 years ago
- Views:
Transcription
1 Issue s in Informing Science and Information Technology Volume 6, 2009 SMS User Interface Result Checking System Emmanuel Rotimi Adagunodo Obafemi Awolowo University, Ile-Ife, Osun State, Nigeria [email protected] Oludele Awodele and Sunday Idowu Babcock University, Ilishan- Remo, Ogun State, Nigeria [email protected]; [email protected] Abstract In this paper, we present a way to bring information to students by leveraging the availability of phones (with SMS capability), especially cell phones. We review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their homes, on the road or while at work. Mobile phone seems to be an asset most individuals posses, and take almost everywhere with them, it is therefore a highly effective means of bringing information to them faster, easily and on the move. An SMS result checking system not only enables students to request for their grades, the system can also deliver the grades to their phones as soon as the grades become available. This means that they can access their grades even in the remotest locations where internet facility might be unavailable, preventing them from accessing the school s website. This study shows the implementation of such system and considers the security issues associated. The system enforces security with the use of secret information (password), and also provides access to new and old grades. Keywords: Short Message Services, SMS, GSM, Result Checking, Mobile Phone, ColdFusion Introduction Computers with the power of the internet have thrived in aiding communication among people. The telephone system, which is the main communication system that was invented several years ago, had undergone a great improvement, so much that today we have fixed wireless phones, mobile phones and the likes. With the rapid development of mobile phones come several services like the Short Messaging Service (SMS), Multimedia Messaging Service (MMS) and others, which are readily available and add to the usefulness of mobile phones. SMS in particular is Material published as part of this publication, either on-line or in print, is copyrighted by the Informing Science Institute. Permission to make digital or paper copy of part or all of these works for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage AND that copies 1) bear this notice in full and 2) give the full citation on the first page. It is permissible to abstract these works so long as credit is given. To copy in all other cases or to republish or to post on a server or to redistribute to lists requires specific permission and payment of a fee. Contact [email protected] to request redistribution permission. widely used in communication, and more recently has been leveraged to provide several services like airline ticketing, banking services, commercial services like share and sell (an added service provided by MTN Nigeria), where subscribers can easily share and/or sell airtime, and several others. SMS is a mobile technology that allows for sending and receiving text or even binary messages to and from a mobile phone.
2 SMS User Interface Result Checking System The relative ease of use of SMS makes it possible for a user to learn how to send SMS easily. Schofield and Kubin (2002) argued that small devices could potentially provide better interface for finding information than through page browsing and other means. More than 160 billion SMS are exchanged each month in European countries (Mavrakis, 2004), and according to Resource Shelf (2006), 48.7 billion SMS messages were sent in the second half of 2005, which is up 50% on the six months before that. Nowadays, with 45 million short messages sent in the U.K. alone every day, a mobile phone that has the easiest interface for voice communication is likely to fail the user satisfaction test if it does not provide a reasonably good SMS interface. (Gorienko & Merrick, 2003) The major advantage of SMS is its cost effectiveness, and availability, as most individuals own phone. In different parts of the world, several service providers offer mobile services which include SMS. Most times the cost attached to sending a SMS is relatively small, and most providers do not charge when receiving SMS. Sometimes, service providers give users certain amount of free SMS per month, which allows customers send and receive unlimited number of SMS messages. It is possible to acquire a special dedicated line that uses a custom rate for messages sent to the number; it is also possible to have a number as toll free, making it free for users to send SMS to the number. All these contribute to what makes SMS a really cost effective means of disseminating information. Till today, especially in the developing countries, there still exists the problem of checking examination results as students still throng notice boards in anxiety. Although most universities, even those in the less developed countries now make examination results available on their websites. The level of internet availability in less developed countries is still low and quite expensive. Even in the developed countries where most homes have internet access, SMS is still a faster and cheaper means of dissemination examination results as well as other information. Pramsane and Sanjaya (2006) stated that universities can provide educational services based on SMS such as grade release, enrollment information, university announcement and internship opportunity. An advantage SMS offers is that students can receive valuable information on the fly without requesting for it. The result checking system not only allows student to request for grades, it provides the result as soon as they as become available. This is done by pushing the result to the students (sending it to their phones), or working on a request sent from a student to produce the result (pulling). There are two methods of SMS widely used in applications; they are the PUSH & PULL. This application can either be used to push or pull messages. A Push SMS application is one whereby a message is been sent from the application to the user. It is a one way message. In other words, it is the mobile application (in this case, the SMS result checking application) that initiates a message. An example could be a school that automatically sends examination results to the students and their parents/sponsors as soon as the grades become available. The users do not request for the grades, do not take any action and are not charged for receiving the SMS. The SMS would be delivered to them in a matter of seconds regardless of where they are, as long as their mobile phone is within their network operator s coverage. A Pull SMS application on the other hand is one whereby a user sends a request and obtains a reply from the application. This is a full duplex scenario. An example is when a student requests for his/her grades for a recently concluded semester. SMS applications can be built as two kinds of services. Independent Service - This involves using solely a mobile phone and the application server (the system running the SMS application). This option offers limited benefit, but it is easy and fast to 102
3 Adagunodo, Awodele. & Idowu setup. It does not require authorization of the service provider or connection to any third party SMS provider. The mobile phone uses a regular SIM card which has a normal phone number, and messages that originate from the phone attracts the standard cost or tariff. Dependent Service This involves having the application server connect to the service providers SMS Center (SMSC). It requires a constant connection to the internet as the application server does not require any physical phone/modem with a SIM card connected to it, rather it connects to a SMSC. When users send their request, it goes to the SMSC, which automatically forwards the message to the application server over the internet. This option provides added benefits, as they service provider can provide a special tariff and a dedicated line for the university. Here, the SMS application usually runs on corporate servers that are connected to the SMS network through specialized connectors and gateways connected to the SMS Center (SMSC) of mobile operators (Mavrakis, 2004). These servers are assigned short numbers instead of the traditional 10 or 11 digits mobile numbers. These numbers, also known as short codes are usually 4 to 6 digits long and are operator specific. Also, a premium fee (a fee other than the fixed rates for SMS) can be charged on these short codes; in other words, users would pay more for sending SMS to short codes. SMS uses the GSM special signalling channel instead of the voice channel and is therefore a very reliable media channel. Mavrakis (2004) identifies two types of SMS which can be classified by the origin of the message: Mobile Originated (MO): SMS-MO is sent from a mobile phone and could be sent either to another mobile phone (such as when a mobile subscriber sends a personal message to another subscriber) or to a computer application that will process the message. Mobile Terminated (MT): SMS-MT is transmitted to a mobile phone. It also could be sent by another mobile phone or generated by a computer application (Adagunodo, Awodele, & Ajayi, 2007). Existing System Overview Most universities now provide examination results on their website and this is a very common practice. When results are made available on the website, students have to login by providing a username or ID and password before they can view their result. This ensures that examination results are protected from unauthorized access. Although websites are readily accessible and provide options like printing and saving, these benefits could easily be inaccessible if a user does not have access to the internet. Also, the student must visit the website to know that the examination results are available. While websites seem to be a very good option in countries where internet is readily available, its impact can be less felt and it can be quite inconvenient and expensive in countries with poor internet access. In such places, students will have to visit cyber cafes where they have to pay to check their grades. Apart from using websites to provide students with their examination results, other means include IVRS (Interactive Voice Response System), and . IVRS Interactive Voice Response System is a self guided result checking system. In this system, a student dials a number and listens to computer generated or recorded voice direction. The voice instructs the student on what action (usually by pressing keys) to take to supply the needed information. The supplied information is then used to generate the student s result, which is spoken to the user. 103
4 SMS User Interface Result Checking System While seems to be another intuitive means of sending results and other information to students, even without them requesting for it. It requires internet connection, and although several mobile phones allow accessing of s on them, it is seldom used by mobile phone users (at least students). allows offers the benefit of mass distribution of information, which is also possible using SMS as Bulk SMS. Evaluation of Similar Systems NTU express SMS NeXS (NTU express SMS) is used at the Nanyang Technological University. To use NeXS the user needs to be an undergraduate student of NTU and needs to register his/her mobile phone on the NeXS Portal. NeXS accepts numbers from three mobile providers (Singtel/Starhub/M1). Once a mobile phone is registered, the student can use the phone to send SMS and access information. However, students can only use the mobile number that was registered. To get exam results via NeXS, users send the keyword NTU RESULT to If the exam results of the current semester are released, NeXS will reply with the reply (Ling, 2005). Strength of NeXS The primary strength of NeXS is that it offers a form of security by ensuring that only the registered mobile phone can request for the result. NeXS also provides other SMS services like examination seating arrangements, subject timetable, library account information, NTU staff directory search and more. Weakness of NeXS The fact that NeXS allows students to register their mobile phone number and limits access to the number is quite a disadvantage than an advantage. This is because it reduces the flexibility of the system and also poses a threat of identifying whether it is the real owner of the phone that is requesting for the result. For example, a student can take another student s phone and request for the student s result. NeXS cannot tell that the request wasn t made from the real owner of the phone. Also, if the register phone is stolen or lost, the student would have to visit the website to register a new phone. NeXS also provides examination result for the recently concluded semester. SMS Result Checking of Board of Secondary Education, Orissa The school makes the HSC exam result available via SMS. The examination result is requested by sending the SMS Code: HSCR RollNo (for regular/regular Correspondence Courses) and HSCX Roll-No (for Ex-regular/Ex-regular Correspondence Courses) to (Desi, 2008). Weakness of the System The system allows request only from BSNL Mobile., and does not provide any form of security. Student can easily request of others result by simply specifying their roll number. MUET SMS Result Checking The checking of MUET Result via SMS is also another example of SMS result checking. This system receives SMS in the format MUET <space> IC Number, sent to The service charges 15 cents for each message sent and 30 cents for each received. 104
5 Adagunodo, Awodele. & Idowu Weakness of the System The system does not offer any form of security. A student with the knowledge of another student s IC number can request for that student s result. It is also expensive on the side of the users. In summary, none of these systems provide any practical form of security and are therefore susceptible to several security issues. Also, they only provide the current examination results and this prevents users from requesting for older results Proposed System The system uses the short messaging service (SMS), which leverages the readily available infrastructure provided by GSM operators to provide a means of cheap and fast communication between the students and the university. Although a few SMS result checking system already implement the use of password, such system was proposed by Pramsane and Sanjaya (2006). This system implements the same form of security, and further provides access to new and old results. It also provides two options of requesting for examination result. The SMS result checking system works using client-server architecture and can be either implemented as a dependent service or independent service. The system described here is deployed as a dependent service; this implies that the server (with the SMS application) has a phone with a standard SIM card connected to it. The SMS server receives SMS messages from the users and processes the message by connecting to the database that holds the details and grades. The SMS server receives all SMS via the GSM terminal connected to the computer, it then connects to the database to authenticate the user and query for the results via the appropriate database connector like Open Database Connectivity (ODBC). To request a result, the user sends his registration number or matriculation number, along with a password (for security and privacy) to the designated number. Students can include specific details like the level (year) and semester for which they want to check their result. They can also request for a full (with the breakdown) or a brief reply (just the GPA). The application queries the database and filters out the user s result appropriately after which it sends the examination result back to the user through the GSM terminal as shown in Figure 1. Figure 1: Functioning of a SMS Result Checking System 105
6 SMS User Interface Result Checking System The flow of the systems starts when a student sends a SMS (in the prescribed format) to the given number. The system then uses the content of the SMS to process the student s request, after which the student s result is sent back to the student via the same number. The features of this system are: It will receive SMS from all kind of phones from all networks. It can function 24 hrs a day, 7 days a week. Users are notified when they make an invalid request. It is relatively easy to customize. It uses password to provide security. It provides more flexibility, by allowing many result checking options. Security and Error Handling Like other means employed by institutions to disseminate examination results and other similar information, which includes website, and IVRS. There exists the possibility of errors and security issues. While most universities make results available on their websites, students have to at least securely login to the website using their ID and a password. Apart from the possibility of a student knowing the ID and password of another student, the possibility of a guess can occur. Although, most websites offer a secure form of authentication like HTTPS, there is really no means of telling that the person that supplied the ID and password on the site is the actual student. Literature has proven that there have been more attacks on the web than SMS. All these implies that the website, though convenient to use, do not offer a totally secured solution for result checking. Similarly, using s or IVRS, there is no means of confirming that the person initiating a phone call on an IVRS system is the real student. And even in cases where the real student is the user of the system, a mistyped username and password would deny a student access to the site, and a student who mistakenly sends wrong information via or an IVRS can obtain the false result which could have consequences. An example of such event occurred in India, when a student having probably sent a wrong detail, got a false result and committed suicide (Textually.org, 2004). While each of these means has its own strength and weakness, it can be arguable said that no one is necessarily better than others. And as a matter of fact, several institutions use all these means together. SMS on its own has several limitations which includes the limited number of characters allowed, and unavailability of features like printing, tables, images etc. It however has almost the same security threat as the other means, and considering the fact that same way a hacker can tap into a text message, the hacker can also hack into a school s website and pull results or at worse manipulate the database, which is more disastrous. This system offers a reasonable level of security which most similar systems do not provide. As discussed earlier, most SMS result checking systems either have student register their mobile phone number or have them send a text containing their identification number with no form of verification. This system uses a password, with a default password assigned initially that they are expected to change on the school s website or by sending a SMS to the school. Specifying a password in the SMS ensures that if a cell phone gets stolen or get into the wrong hands, the student s result cannot be accessed unless the password is specified. This works in a similar way to the website, and 106
7 Adagunodo, Awodele. & Idowu neither of them has a way to prove that the request originates from the real user. Sharing or careless exposure of passwords will breach both systems; therefore education of users is paramount. Error handling is an essential part of good system, as errors are bound to occur especially in situation requiring user input. Users can misspell words, mismatch format or even send the message to a wrong number. A feedback mechanism is therefore essential to inform users of their errors and provide suggestion of what went wrong. This feature is often missing in most SMS result checking system; it is overlooked probably because the cost associated to sending SMS is low or even free. However, to ensure that users find the system friendly, error handling and notification is important. This system checks for possible errors in a received SMS and sends an error notification to the users. Possible errors are a wrong id and password combination, a wrong SMS format etc. Implementation To use this system as an independent SMS service, the university must provide the necessary hardware and software requirement, which primarily are: A mobile phone with modem that supports communication with a computer, and a supported SIM card. A computer system to host the SMS application. A network connection to the database server. A cable or other connection means to connect the phone to the computer. System Verification As an example of the operation of this SMS result checking system, the mode of operation is illustrated using a particular 3 rd year student by the name Bunmi David with matriculation number 05/0777. Bunmi David sends an SMS message with a password in a prescribed format to the designated GSM number. The password is assigned to students, and can be changed by sending an SMS with the old password followed by the desired new password. It is also possible to let students request for a password change on the school s website. The SMS result checking provides primarily two SMS formats. The first format requests for the detailed examination result, while the second format requests for the grade point average (GPA) only. As an advantage of this system over others, it allows students to check for results of past semesters, unlike most systems that only offer the current semester result. In this case, the student can specify which year and semester for which they want to access their grades. It is also possible to accept request for a particular course. The formats are illustrated as follows (See also Figure 2): SMS Format 1 MatricNumber, Password, Level, Semester, all e.g 05/0777, pass, 300, 2, all Semester: 1 represents 1 st semester 2 - represents 2nd semester 107
8 SMS User Interface Result Checking System Figure 2: Illustration request using the first format. Appending all to the message, instructs the server to reply with the full result details of all the courses including the score, grade and also the GPA (Grade Point Average) for the semester. The reply is shown in Figure 3. Figure 3: Illustration of a reply. If the student decides to check the GPA only, the SMS to be sent takes another format. SMS Format 2 MatricNumber, Password, Level, Semester e.g 05/0777, pass, 300, 2 A SMS in this format (Figure 4) instructs the server to reply with the student s GPA only for the semester, without further details of the result. The reply is show in Figure
9 Adagunodo, Awodele. & Idowu Figure 4: Illustration request using the second format. Figure 5: SMS Reply with GPA only To illustrate the password security, and error notification, a message is sent to the server with a wrong password. The system detects such error and notifies the user. For example, if the student sends a SMS with the content 05/0777, password, 300, 2, all INSTEAD OF 04/00777, pass, 300, 2, all The server replies with an error message, as shown in Figure 6. Message validation ensures that the received SMS complies with the specified format and that the matric-number (ID) and password match, if it does not, the student is notified. Advantages of SMS Results Checking The advantages of SMS results are the same with that of any other SMS application. Convenience Users get their results at their own convenience. Accessibility Users can access their results from any location (as long as Figure 6: Reply with incorrect information notification 109
10 SMS User Interface Result Checking System they are within a network service reception area). Portability Results can be received and checked from any GSM phone. All GSM phones support SMS. Saves time SMS is on the fly. It reduces the throughput of result checking as websites are sometimes unavailable due to congestion, or server down time. SMS provides a faster means of sending and receiving such information. Cheaper SMS is generally economical, and it sometimes provided as a free service (at least for certain periods) by the service provider. Most providers also do not charge when users receive SMS. Less human resources required Results are processed automatically Mobility It is obvious that most mobile phone users have their phones with them everywhere they go, most people often leave their computer as home, or work sometimes, but they will always have their phone on them. Limitations of SMS Results Checking The limitations of SMS results are the same with that SMS Applications in general. Unlike paper results which are stamped, it is difficult to certify SMS results. However, mobile operators provide numbers that bear a name of company or institution. This way user can be sure that the message originated from the right source. As a rule, length of a SMS message is 160 characters. This is a limitation in SMS technology. Therefore the messages are abbreviated depending on the availability of the space. The SMS technology (like ) does not guarantee set transmission times or guaranteed delivery of the message, therefore some messages may be delayed, blocked or lost in transmission. The cost of the message might be transferred to the sender (although toll-free lines can be acquired) and this is network dependent. It is also possible to reimburse such cost, and to operate volume based tariffs. Service operators might not have coverage in some areas, and some locations may be prevented with mobile-phone jammers therefore preventing users from getting service signals. Not all students will have a mobile phone. This is negligible considering the amount of mobile phone owners; at least one person in a family will own a phone. Further Work The SMS User Interface Result Checking System can be fully integrated into existing information systems like the school s web system, such that the application leverages existing hardware systems and components like databases etc. The system can also be adapted as means of dissemination short information quickly, and performing activities like evaluation. Additional study is also done to consider how the system can be further secured, and further research work is carried out on SMS and it application. One of such is the use of SMS as a communication tool between computers where a computer network connection is not feasible either with cables or wireless. 110
11 Adagunodo, Awodele. & Idowu Conclusion SMS result checking is an innovative approach to examination result checking and it should be widely accepted by universities in addition to existing means like website, and IVRS. The number of mobile phone users is daily on the increase, and mobile phones complete our clothing today. The fact that fixed wireless phones, land line phones etc all have the capability to send and receive SMS also makes it a viable option. Finally, most parents, guardians or sponsors who are not computer literate and not familiar with the use of the internet, will be probably comfortable with sending and receiving SMS. This way, they can request for the results or receive them directly from the school. Also, adopting the PUSH approach with SMS provides an advantage over because it is immediate. Students would receive the grades almost instantly, unlike s where they wouldn t until they check their s. References Adagunodo, E. R., Awodele, O. & A jayi, O. B. (2007). SMS banking services: A 21st century innovation in banking technology. Issues in Informing Science and Information Technology, 4, Retrieved from Desi, S. (2008). Check Orissa HSC exam results 2008/Board of Secondary Education. Retrieved from Gorienko, L., & Merrick R. (2003). No wire attached: Usability challenges in the connected mobile world. IBM System Journal, 42, Ling, S. H (2005). SMS to get your exam results. Retrieved March 5, 2009 from msresult.html, Mavrakis. D. (2004). The Monaco Telematique mobile SMS whitepaper. Retrieved December 1, 2008 from Pramsane, S., & Sanjaya, R(2006). Mobile education services based on SMS and their arch itecture comparison. Retrieved from Resource Shelf. (2006). Statistics: Use of text messaging (SMS) grows in the United States. Retrieved March 5, 2009 fro m /09/01/statistics-use-of-text-messaging-smsgrows-in-the-united-states/, Schofield, E. & Kubin, G. (2002). On interfaces for mobile information retrieval. Retrieved from Textually.org. (2004, May 25). Wrong SMS leads to suicide. Retrieved on March 5, 2009 from Biographies Prof Emmanuel Rotimi Adagunodo is a professor of computer science at the Obafemi Awolowo University, Ile-Ife, Osun State, Nigeria. He is also the Deputy Director of Distance Learning Center of the same University. He can be contacted at [email protected]. 111
12 SMS User Interface Result Checking System Oludele Awodele Ph.D is presently a lecturer in the department of computer science & mathematics, Babcock University, Ilishan-Remo, Ogun State, Nigeria. His research areas are Software Engineering, Data Communication and Artificial Intelligence. He has published works in several journals of international repute. He can be contacted at [email protected]. Sunday Idowu is a senior lecturer in the department of computer science & mathematics, Babcock University, Ilishan-Remo, Ogun State, Nigeria. He holds a Masters degree in Software Engineering, and he is currently working on his Ph.D in the University of Ibadan, Oyo State, Nigeria. His research areas are Software Engineering, Web Application Development and Security. He has published works in several journals of international repute. He can be contacted at [email protected]. 112
SMS Banking Services: A 21 st Century Innovation in Banking Technology
Issues in Informing Science and Information Technology Volume 4, 2007 SMS Banking Services: A 21 st Century Innovation in Banking Technology Emmanuel Rotimi Adagunodo Obafemi Awolowo University, Ile-Ife,
DEVELOPMENT OF A MULTIFACTOR AUTHENTICATION RESULT CHECKER SYSTEM THROUGH GSM
DEVELOPMENT OF A MULTIFACTOR AUTHENTICATION RESULT CHECKER SYSTEM THROUGH GSM Famutimi Rantiola 1, Emuoyibofarhe Ozichi 2, AkinpuleAbiodun 3, Gambo Ishaya 4,Odeleye Damilola 5 1,2,3,5 Computer Science
2. Bulk SMS Software: Custom Desktop Software application using our API.
What is Bulk SMS? In marketing industry SMS stands for Smart Marketing Services. The charges for SMS on mobile phones is very high especially when sending multiple messages and exorbitant when sending
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Backup Assistant. Product Description. Screenshots. Using the Application
Backup Assistant Product Description Backup Assistant is a wireless service that saves a copy of your phone's address book to a secure web site. If your phone is lost, stolen or damaged, Backup Assistant
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Basics of VoIP Origination
Basics of VoIP Origination Version 1.1 July 26, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved.
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
Survey on Various Initiatives and Challenges of Mobile based Public Services in India
1 Survey on Various Initiatives and Challenges of Mobile based Public Services in India Ranjan Kumar, Manish Kumar, Kapil Kant Kamal, Dr. Zia Saquib, Ms. Kavita Bhatia [email protected], [email protected],
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Exede Voice Desk Reference
Summary This Desk Reference covers: What is Exede Voice? Pricing Customer Commitment Where is Exede Voice Available? How do I sell Exede Voice? How do I Market Exede Voice? What Should My Customer Expect?
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
SPINTEL MOBILE SERVICE DESCRIPTION
SPINTEL MOBILE SERVICE DESCRIPTION 1. THIS MOBILE SERVICE DESCRIPTION a) This Mobile Service Description, together with: i. your Application; ii. the Customer Terms; iii. the Mobile Standard Pricing Table;
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Adi Armoni Tel-Aviv University, Israel. Abstract
Informing Science Data Security Volume 5 No 1, 2002 Data Security Management in Distributed Computer Systems Adi Armoni Tel-Aviv University, Israel [email protected] Abstract This research deals with
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
SMS Notify! API Frequently Asked Questions
Frequently Asked Questions Contents GENERAL QUESTIONS... 2 What is?... 2 Which carriers do you support?... 2 Does the SMS API support two-way communication?... 2 How many messages can I send with?... 3
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
SMS IN BANKING AND CREDIT CARD OPERATIONS: REDUCING COST AND ACHIEVING SUPERIOR CUSTOMER SERVICE
SMS IN BANKING AND CREDIT CARD OPERATIONS: REDUCING COST AND ACHIEVING SUPERIOR CUSTOMER SERVICE 7 September 2009 Prepared and Presented by TALARIAX PTE LTD 76 Playfair Road #08-01 LHK2 Singapore 367996
Lesson 24 Network Fundamentals
Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000
PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Customer Service Center Functional Standard Executive Branch Departments and
X X X X X. Platinum Edition. Unlimited Extensions. Unlimited Auto Attendants. Unlimited Voicemail Boxes. ACD Features
Feature Name Unlimited Extensions Unlimited Auto Attendants Unlimited Voicemail Boxes ACD Features Feature Description With Evo IP-PB you can add an extension at any time, with no limits and no need to
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
Protection Ripple in ERP 802.11 WLANs White Paper
Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO [email protected] Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
Distance Education Policies and Procedures
Distance Education Policies and Procedures These policies and procedures are designed to ensure Clayton State University compliance with Federal Regulations concerning the definition of distance vs. correspondence
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
CanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions:
CanMobile Frequently Asked Questions 1. What is CanMobile? CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions: Balance Enquiry of accounts enabled
Design of a University Portal with Biometric Lecture Attendance Monitoring System
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):847-856 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
Contents. WOW! Phone Reference Guide
WOW! Phone Reference Guide Intro to WOW! Phone P-1 WOW! Phone Features P-1 Call Waiting P-1 Call Forwarding P-1 3-Way Calling P-1 Call Return P-1 Anonymous Call Rejection P-2 Caller ID P-2 Caller ID Block
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users
Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
Law College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
The Customer Portal will allow you to administrate your Arch system via the Internet. From the portal you can:
Powerline Complete Web Portal Guide This complete web portal guide will show you how to utilize the Powerline system to its fullest potential; i.e. how to set up multiple transfers, generate listing or
Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones
Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones www.5pro-software.com General Info about Secure Voice Enterprise solution for mobile conversation security Secures sensitive information
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
User Behaviour Analytics
User Behaviour Analytics How do they know its really you? White Paper Sept 2015 Ezmcom Inc. 4701 Patrick Henry Drive BLDG 7, Santa Clara, CA, 95054, US Executive Summary Authentication has traditionally
Parent Single Sign-On Quick Reference Guide
Parent Single Sign-On Quick Reference Guide Parent Single Sign-On, introduced in PowerSchool 6.2, offers a number of benefits, including access to multiple students with one sign in, a personalized account
Online Banking Agreement & Disclosure
Online Banking Agreement & Disclosure This Agreement provides information about the CITIZENS FIRST Online Banking service and contains the disclosures required by the Electronic Funds Transfer Act, as
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Emergency Alert System using Android Text Message Service ABSTRACT:
Emergency Alert System using Android Text Message Service ABSTRACT: Cellular text messaging services are increasingly being relied upon to disseminate critical information during emergencies. Accordingly,
Agile speech analytics: a simple and effective way to use speech analytics in contact centres
Agile speech analytics: a simple and effective way to use speech analytics in contact centres Whitepaper Contact centres have successfully used speech analytics to help reduce avoidable calls, improve
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Digital Voice Services Residential User Guide
Digital Voice Services Residential User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Customization & Enhancement Guide. Table of Contents. Index Page. Using This Document
Customization & Enhancement Guide Table of Contents Using This Document This document provides information about using, installing and configuring FTP Attachments applications provided by Enzigma. It also
CALL FORWARDING (Activate *72 / Deactivate *73) Call Forwarding is a service that automatically forwards all calls to any number you choose.
St. Joseph Cablevision would like to thank you for making our Digital Phone service part of your home. As a St. Joseph Cablevision customer, you have access to one of the most advanced broadband communications
SMS banking using Cell phone
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 2 June 2013, pp. 463-469 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ SMS
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
A New Standard in Encrypted Email. A discussion on push, pull and transparent delivery
A New Standard in Encrypted Email A discussion on push, pull and transparent delivery By ZixCorp November 2010 2 Email enhances our daily business life. It enables efficient, real-time communication, unites
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
PIONEER TELEPHONE COOPERATIVE, INC. PIONEER LONG DISTANCE, INC. CELLULAR NETWORK PARTNERSHIP D/B/A PIONEER CELLULAR TERMS AND CONDITIONS OF SERVICE
PIONEER TELEPHONE COOPERATIVE, INC. PIONEER LONG DISTANCE, INC. CELLULAR NETWORK PARTNERSHIP D/B/A PIONEER CELLULAR TERMS AND CONDITIONS OF SERVICE Pioneer Telephone Cooperative, Inc., Pioneer Long Distance,
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Call Waiting. Cancel Call Waiting
PhoneFeatures 1 Call Waiting Cancel Call Waiting 2 Three-Way Calling Personal Ringing 3 Speed Calling Call Transfer 4 Call Hold Call Forwarding 5 Call Forwarding Don t Answer Call Forwarding Busy Line
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
BlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
A Guide to Mobile Security For Citizen Journalists
A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile
White Paper Instant Messaging (IM) HIPAA Compliance
White Paper Instant Messaging (IM) HIPAA Compliance - 1 - Statement of Purpose This document is focused on providing health care companies, and all others bound by HIPAA regulations, with an eye opening
Security Alarm Systems
Security Alarm Systems Monitored alarm systems offer clients peace of mind as they activate on intrusion or tampering at the property and ensure any security alarm will have an appropriate response. However,
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
a. StarToken controls the loss due to you losing your Internet banking username and password.
1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Digital Voice Services User Guide
Digital Voice Services User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call Forwarding
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
HPUG_1014. Shaw Home Phone. User Guide
HPUG_1014 Shaw Home Phone. User Guide Hello. Welcome to the wonderful world of Shaw Home Phone. This tiny book tells you every detail you need to know to use all of your new phone features like a superstar.
BUSINESS PHONE USER S MANUAL
Wire your business for success Find great business services inside. BUSINESS PHONE USER S MANUAL INSIDE: - PHONE PLANS - HOW TO ACCESS YOUR FEATURES ONLINE CLICK BUSINESS.CABLEONE.NET TODAY! BUSINESS CARE
BUSINESS VOICEMAIL User Guide
BUSINESS VOICEMAIL User Guide Voicemail BASICS You may interact with your Voicemail Service from any Touch-Tone telephone. You can receive messages 24 hours a day, 7 days a week. You may have a total of
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Aegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY
THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY As the constantly growing demands of businesses and organizations operating in a global economy cause an increased
User Manual. Learning Management System COMSATS Virtual Campus
User Manual Learning Management System COMSATS Virtual Campus Table of Contents Overview... 3 The LMS Home Screen... 4 The Main Menu bar... 4 1. LMS Home:... 4 2. About LMS:... 4 3. Contacts:... 4 4. Login
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
A SCALABLE, COST-EFFECTIVE SOLUTION ENABLING BETTER COMMUNICATIONS
BUSINESS TRUNKS A SCALABLE, COST-EFFECTIVE SOLUTION ENABLING BETTER COMMUNICATIONS Welcome to Comcast Business Trunks. We are pleased that you have selected Comcast as your voice provider, and look forward
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Using Mobiles for On Campus Location Tracking
Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,
EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality
EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation
