[go: up one dir, main page]

Bang et al., 2023 - Google Patents

Design of personal data protection decentralized model using blockchain and IPFS

Bang et al., 2023

View PDF
Document ID
10564235259027701893
Author
Bang J
Choi M
Publication year
Publication venue
2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS)

External Links

Snippet

Recently, as the fields that utilize personal information have diversified, digital Identification and security solutions are being provided along with the development of the digital ecosystem. However, the problem of personal information being exposed due to the use of …
Continue reading at www.ieice.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings

Similar Documents

Publication Publication Date Title
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US11818265B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
EP3799642B1 (en) Data authorization based on decentralized identifiers
CN112508578B (en) Resource transfer request verification and sending method and device based on block chain
CN111527489A (en) Data authorization based on decentralized identity
US20200007316A1 (en) Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity
US20240112177A1 (en) Systems and methods for identity verification to authorize transactions in decentralized networks
CN113542288A (en) Service authorization method, device, equipment and system
EP3883204B1 (en) System and method for secure generation, exchange and management of a user identity data using a blockchain
Garg Decentralized transaction mechanism based on smart contracts
Garg Distributed ecosystem for identity management
Bang et al. Design of personal data protection decentralized model using blockchain and IPFS
Garg Blockchain based identity solutions
Shakila et al. Design and analysis of digital certificate verification and validation using blockchain-based technology
US20250139611A1 (en) System and Methods for Implementing Blockchain Based Zero Knowledge Protocol
Sin et al. Digital identity management system using blockchain technology
CN117557360A (en) Digital creditor certificate generation method and device, computer equipment and storage medium
Hardjono et al. Core identities for future transaction systems
Banes et al. Authentication methods with a high degree of security in accessing Moodle e-learning platform
Pärni On self-sovereign identity: Verifiable credentials and presentations with OpenID connect
Zhan Decentralized Authentication and Authorization Built on Self-Sovereign Identity for Organizations
Saadatmandi Enhanced attribute retrieval and provisioning through the eIDAS digital identity infrastructure
Othman et al. The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol
Cheng Blockchain-Based Identification and Access Control Framework-A Case Study of Open Banking Ecosystem
KR20240014317A (en) The ownership proof system of personal signature through NFT issuance about personal signature data