[go: up one dir, main page]

Li et al., 2016 - Google Patents

A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems

Li et al., 2016

Document ID
12721130921212583920
Author
Li C
Lee C
Weng C
Chen S
Publication year
Publication venue
Journal of medical systems

External Links

Snippet

Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Li et al. A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems
Hathaliya et al. Securing electronics healthcare records in healthcare 4.0: A biometric-based approach
Ostad-Sharif et al. A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications
Jiang et al. A privacy preserving three-factor authentication protocol for e-health clouds
Renuka et al. Design of a secure three-factor authentication scheme for smart healthcare
Mishra et al. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems
Jiang et al. A privacy enhanced authentication scheme for telecare medical information systems
Jiang et al. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Amin et al. A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis
Srinivas et al. A mutual authentication framework for wireless medical sensor networks
Chaudhry et al. An enhanced lightweight anonymous biometric based authentication scheme for TMIS
Wu et al. A secure authentication scheme for telecare medicine information systems
Amin et al. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography
Lu et al. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Mohit et al. A standard mutual authentication protocol for cloud computing based health care system
Arshad et al. Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
Chiou et al. Improvement of a privacy authentication scheme based on cloud for medical environment
Aslam et al. A survey of authentication schemes in telecare medicine information systems
Irshad et al. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
Mir et al. A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems
Alzahrani Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks
Suganthi et al. End to end light weight mutual authentication scheme in IoT-based healthcare environment
Chaudhry et al. A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
Khan et al. An improved user authentication protocol for healthcare services via wireless medical sensor networks