Ogban et al., 2015 - Google Patents
Implementation of a biometric authentication layer for a public cloud FU Ogban and IS NtiOgban et al., 2015
View PDF- Document ID
- 11490697906196236692
- Author
- Ogban F
- Nti I
- Publication year
External Links
Snippet
Biometric authentication method is a scheme that can be incorporated into traditional method of securing public cloud. Securing the cloud is an important task and critical aspect as it faces numerous security issues and challenges. Compromise of user's account has …
- 238000005516 engineering process 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10277591B2 (en) | Protection and verification of user authentication credentials against server compromise | |
US10268809B2 (en) | Multi-factor user authentication framework using asymmetric key | |
Anakath et al. | Privacy preserving multi factor authentication using trust management | |
KR101556069B1 (en) | Out-of-band remote authentication | |
CN106537403B (en) | System for accessing data from multiple devices | |
US9286455B2 (en) | Real identity authentication | |
Al Tayeb et al. | The impact of cloud computing technologies in e-learning | |
JP2017517823A (en) | Techniques for operating services with machine-generated authentication tokens | |
Singh et al. | A secure multi-tier authentication scheme in cloud computing environment | |
Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
Farooq | A Review on cloud computing security using authentication techniques. | |
Alshar'e et al. | A user protection model for the trusted computing environment | |
Bicakci et al. | Towards zero trust: The design and implementation of a secure end-point device for remote working | |
Chauhan et al. | Secure data in cloud computing using face detection and fingerprint | |
Ogban et al. | Implementation of a biometric authentication layer for a public cloud FU Ogban and IS Nti | |
Edwards et al. | FFDA: A novel four-factor distributed authentication mechanism | |
Balaram | Cloud computing authentication techniques: A survey | |
Raji et al. | Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking | |
Dhamija et al. | SSQS and OTP based user authentication mechanism in cloud computing | |
Chakrawarti et al. | The architechtural framework for public cloud security | |
Pravinbhai | Implementation of multi-tier authentication technique for single-sign on access of cloud services | |
Pabon | Prevent Cyberattacks in Commercial Aircrafts Using a Biometric Provenance Access Control Framework | |
Chhetiza et al. | A Survey of Security Issues and Authentication Mechanism in Cloud Environment with Focus on Multifactor Authentication | |
Karmakar et al. | An examination of Cloud Network Security Issues and Potential Solutions | |
Nyamwaro | Application for enhancing confidentiality and availability for sensitive user data using AES algorithm in smartphone devices |