[go: up one dir, main page]

Hamid et al., 2023 - Google Patents

A secured clinic booking system with multi factor authentication

Hamid et al., 2023

View PDF
Document ID
12054135596837090243
Author
Hamid I
et al.
Publication year
Publication venue
Applied Information Technology And Computer Science

External Links

Snippet

Online Booking system is a software platform where user do not use phone tag and emails to book their sessions. Phone tag is a scenario where two parties contacted each other by using telephone calls or messages. Dr. Hannani Clinic's existing system implements the …
Continue reading at publisher.uthm.edu.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Suleski et al. A review of multi-factor authentication in the Internet of Healthcare Things
US12174935B2 (en) Method and system for interoperable identity and interoperable credentials
US9967261B2 (en) Method and system for secure authentication
Otta et al. A systematic survey of multi-factor authentication for cloud infrastructure
Weidman et al. I like it, but i hate it: Employee perceptions towards an institutional transition to byod second-factor authentication
US20180295120A1 (en) Session-limited, manually-entered user authentication information
WO2016205813A1 (en) System and method for biometric-based authentication of a user for a secure event carried out via a portable electronic device
US8856954B1 (en) Authenticating using organization based information
Esther Omolara et al. HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
Forget et al. Choose your own authentication
CN106416336A (en) Identification and/or authentication systems and methods
CN115735206A (en) Systems and methods for determining knowledge-based authentication questions
Alghamdi A verification system for multi-factor authentication for ehealthcare architectures
Hamid A secured clinic booking system with multi factor authentication
Ide et al. Personhood credentials: Human-centered design recommendation balancing security, usability, and trust
Ondiege et al. Health care professionals’ perception of security of personal health devices
Kimani Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities
CN113326263A (en) Method and device for processing and controlling use authority of secure storage area
Leitner et al. Authentication in the context of E-participation: current practice, challenges and recommendations
Kumar et al. SecureClean Pro: A Vehicle Detailing Service Booking System Using Enhanced One-Time Password (OTP-X) for Azim AIC Sdn. Bhd.
US12081991B2 (en) System and method for user access using mobile identification credential
Suokas Privileged Accounts Protection with Multi-factor Authentication
Randolph Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector
Shanmugam Improving Customer Experience and Reducing Customer Churn by Implementing Frictionless, Adaptive, and Risk-Based Authentication Controls for Digital Assets
Breit et al. Exploration of the security and usability of the fido2 authentication protocol