Bang et al., 2023 - Google Patents
Design of personal data protection decentralized model using blockchain and IPFSBang et al., 2023
View PDF- Document ID
- 10564235259027701893
- Author
- Bang J
- Choi M
- Publication year
- Publication venue
- 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS)
External Links
Snippet
Recently, as the fields that utilize personal information have diversified, digital Identification and security solutions are being provided along with the development of the digital ecosystem. However, the problem of personal information being exposed due to the use of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11777726B2 (en) | Methods and systems for recovering data using dynamic passwords | |
| US11818265B2 (en) | Methods and systems for creating and recovering accounts using dynamic passwords | |
| EP3799642B1 (en) | Data authorization based on decentralized identifiers | |
| CN112508578B (en) | Resource transfer request verification and sending method and device based on block chain | |
| CN111527489A (en) | Data authorization based on decentralized identity | |
| US20200007316A1 (en) | Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity | |
| US20240112177A1 (en) | Systems and methods for identity verification to authorize transactions in decentralized networks | |
| CN113542288A (en) | Service authorization method, device, equipment and system | |
| EP3883204B1 (en) | System and method for secure generation, exchange and management of a user identity data using a blockchain | |
| Garg | Decentralized transaction mechanism based on smart contracts | |
| Garg | Distributed ecosystem for identity management | |
| Bang et al. | Design of personal data protection decentralized model using blockchain and IPFS | |
| Garg | Blockchain based identity solutions | |
| Shakila et al. | Design and analysis of digital certificate verification and validation using blockchain-based technology | |
| US20250139611A1 (en) | System and Methods for Implementing Blockchain Based Zero Knowledge Protocol | |
| Sin et al. | Digital identity management system using blockchain technology | |
| CN117557360A (en) | Digital creditor certificate generation method and device, computer equipment and storage medium | |
| Hardjono et al. | Core identities for future transaction systems | |
| Banes et al. | Authentication methods with a high degree of security in accessing Moodle e-learning platform | |
| Pärni | On self-sovereign identity: Verifiable credentials and presentations with OpenID connect | |
| Zhan | Decentralized Authentication and Authorization Built on Self-Sovereign Identity for Organizations | |
| Saadatmandi | Enhanced attribute retrieval and provisioning through the eIDAS digital identity infrastructure | |
| Othman et al. | The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol | |
| Cheng | Blockchain-Based Identification and Access Control Framework-A Case Study of Open Banking Ecosystem | |
| KR20240014317A (en) | The ownership proof system of personal signature through NFT issuance about personal signature data |