Title | ||
---|---|---|
Algorithms for the determination of document authentication time and the recommendation of document modification |
Abstract | ||
---|---|---|
In the traditional document authentication environment, the required document authentication time is determined by document applicants on the basis of the historic log, and the variation of document authentication time due to document contents is almost ignored. In addition to the authentication time estimation, once a document is rejected by an authenticator after authentication, the applicant might sometimes fail to exactly recognize the major rejection reasons and modification guides. Focusing on the above issues related to document authentication, this research proposes algorithms, namely the determination of document authentication time and the recommendation of document paragraph modification, to determine the document authentication information to support electronic document authentication. In addition to the proposed algorithms, a web-based document authentication information management system is developed and used to demonstrate feasibility of the proposed algorithms applied in CMP patent document authentication. Whether in providing authentication information to users or in reusing the information generated from the authentication processes, the document authentication information management system developed in this study can enhance the performance of the traditional approaches for document authentication. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1016/j.eswa.2008.06.134 | Expert Syst. Appl. |
Keywords | Field | DocType |
document authentication,authentication information,document paragraph modification,workflow management,document applicant,cmp patent document authentication,authentication time estimation,document authentication information management,knowledge management,authentication process,document authentication time,document modification,document authentication information,information management system | Lightweight Extensible Authentication Protocol,Challenge-Handshake Authentication Protocol,Well-formed document,Information retrieval,Computer science,Challenge–response authentication,Algorithm,Data Authentication Algorithm,Authentication protocol,Multi-factor authentication,Email authentication | Journal |
Volume | Issue | ISSN |
36 | 3 | Expert Systems With Applications |
Citations | PageRank | References |
0 | 0.34 | 5 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jiang-Liang Hou | 1 | 137 | 18.41 |
Chih-Hao Huang | 2 | 182 | 25.75 |