Chand et al., 2018 - Google Patents
Biometric authentication using SaaS in cloud computingChand et al., 2018
View PDF- Document ID
- 12805255827917998888
- Author
- Chand K
- Rani B
- Publication year
- Publication venue
- International Research Journal of Engineering and Technology (IRJET)
External Links
Snippet
Now a day's cloud users are facing the major problem of fake logging in and data theft. So it is required to authenticate the cloud user that requests access to an account for providing privacy and security. Present days cloud computing is becoming a hot trend in IT industries …
- 238000000034 method 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transaction
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20220294631A1 (en) | System and Method for Securing Personal Information Via Biometric Public Key | |
| CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
| Yang et al. | Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem | |
| AU2020399657B2 (en) | Privacy-preserving biometric authentication | |
| CN101420301A (en) | Human face recognizing identity authentication system | |
| Kuznetsov et al. | Deep learning-based biometric cryptographic key generation with post-quantum security | |
| US11063936B2 (en) | Encryption parameter selection | |
| Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
| Lone et al. | A novel OTP based tripartite authentication scheme | |
| Ayoup et al. | Cancellable multi-biometric template generation based on arnold cat map and aliasing | |
| Kwon et al. | CCTV-based multi-factor authentication system. | |
| Aanjanadevi et al. | Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. | |
| WO2024221057A1 (en) | Digital identity system and methods | |
| US20230254309A1 (en) | Decentralized secure true digital id for communication | |
| Chand et al. | Biometric authentication using SaaS in cloud computing | |
| Thawre et al. | Survey on security of biometric data using cryptography | |
| Kevenaar | Protection of biometric information | |
| Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
| Bentahar et al. | Biometric cryptosystem scheme for Internet of Things using fuzzy commitment principle | |
| Jegede et al. | State of the art in biometric key binding and key generation schemes | |
| Failla | Privacy-preserving processing of biometric templates by homomorphic encryption | |
| Aravinda et al. | User authentication using image processing techniques | |
| Ganjewar et al. | Privacy threat reduction using modified multi-line code generation algorithm (MMLCGA) for cancelable biometric technique (CBT) | |
| Tallapragada et al. | Multilevel Network Security Based on Iris Biometric | |
| Mondal et al. | Dynamic Key‐based Biometric End‐User Authentication Proposal for IoT in Industry 4.0 |