Hamid et al., 2023 - Google Patents
A secured clinic booking system with multi factor authenticationHamid et al., 2023
View PDF- Document ID
- 12054135596837090243
- Author
- Hamid I
- et al.
- Publication year
- Publication venue
- Applied Information Technology And Computer Science
External Links
Snippet
Online Booking system is a software platform where user do not use phone tag and emails to book their sessions. Phone tag is a scenario where two parties contacted each other by using telephone calls or messages. Dr. Hannani Clinic's existing system implements the …
- 238000013459 approach 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Suleski et al. | A review of multi-factor authentication in the Internet of Healthcare Things | |
| US12174935B2 (en) | Method and system for interoperable identity and interoperable credentials | |
| US9967261B2 (en) | Method and system for secure authentication | |
| Otta et al. | A systematic survey of multi-factor authentication for cloud infrastructure | |
| Weidman et al. | I like it, but i hate it: Employee perceptions towards an institutional transition to byod second-factor authentication | |
| US20180295120A1 (en) | Session-limited, manually-entered user authentication information | |
| WO2016205813A1 (en) | System and method for biometric-based authentication of a user for a secure event carried out via a portable electronic device | |
| US8856954B1 (en) | Authenticating using organization based information | |
| Esther Omolara et al. | HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys | |
| Forget et al. | Choose your own authentication | |
| CN106416336A (en) | Identification and/or authentication systems and methods | |
| CN115735206A (en) | Systems and methods for determining knowledge-based authentication questions | |
| Alghamdi | A verification system for multi-factor authentication for ehealthcare architectures | |
| Hamid | A secured clinic booking system with multi factor authentication | |
| Ide et al. | Personhood credentials: Human-centered design recommendation balancing security, usability, and trust | |
| Ondiege et al. | Health care professionals’ perception of security of personal health devices | |
| Kimani | Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities | |
| CN113326263A (en) | Method and device for processing and controlling use authority of secure storage area | |
| Leitner et al. | Authentication in the context of E-participation: current practice, challenges and recommendations | |
| Kumar et al. | SecureClean Pro: A Vehicle Detailing Service Booking System Using Enhanced One-Time Password (OTP-X) for Azim AIC Sdn. Bhd. | |
| US12081991B2 (en) | System and method for user access using mobile identification credential | |
| Suokas | Privileged Accounts Protection with Multi-factor Authentication | |
| Randolph | Identifying the Role of Healthcare Leaders in Protecting Sensitive Information Within Their Sector | |
| Shanmugam | Improving Customer Experience and Reducing Customer Churn by Implementing Frictionless, Adaptive, and Risk-Based Authentication Controls for Digital Assets | |
| Breit et al. | Exploration of the security and usability of the fido2 authentication protocol |