Abstract: Disclosed is a method which comprises receiving a user input which includes a password component and a non-password component that is defined by a user, the non-password component is arranged relative to the password component in a random manner determined by the user; verifying a presence of a pre-assigned password within the user input, wherein the pre-assigned password is associated with the user and stored in a first database; and based on the verified presence of the pre-assigned password within the received user input, identifying the non-password component. This way, even if a third party has full view of the user input entry, the visitor would be unable to discover the password and additional information individually.
Abstract: The present disclosure provides a more accurate and secure for verification of presence which comprises: reading an identifier which is associated with a location from a NFC tag fixedly coupled to a location by a NFC-enabled device; verifying the received identifier against an identifier database to verify the location corresponding to the received identifier; generating a query based on the verified location to solicit a user input entered by a user in charge of the location; receiving the user input by the NFC-enabled device; recording a check-in time according to the time of reading the identifier; and recording a check-out time according to the time of receiving the user input.
Abstract: The present disclosure provides a more accurate and secure for verification of presence which comprises: reading an identifier which is associated with a location from a NFC tag fixedly coupled to a location by a NFC-enabled device; verifying the received identifier against an identifier database to verify the location corresponding to the received identifier; generating a query based on the verified location to solicit a user input entered by a user in charge of the location; receiving the user input by the NFC-enabled device; recording a check-in time according to the time of reading the identifier; and recording a check-out time according to the time of receiving the user input.
Abstract: Disclosed is a method which comprises receiving a user input which includes a password component and a non-password component that is defined by a user, the non-password component is arranged relative to the password component in a random manner determined by the user; verifying a presence of a pre-assigned password within the user input, wherein the pre-assigned password is associated with the user and stored in a first database; and based on the verified presence of the pre-assigned password within the received user input, identifying the non-password component. This way, even if a third party has full view of the user input entry, the visitor would be unable to discover the password and additional information individually.