[go: up one dir, main page]

Chand et al., 2018 - Google Patents

Biometric authentication using SaaS in cloud computing

Chand et al., 2018

View PDF
Document ID
12805255827917998888
Author
Chand K
Rani B
Publication year
Publication venue
International Research Journal of Engineering and Technology (IRJET)

External Links

Snippet

Now a day's cloud users are facing the major problem of fake logging in and data theft. So it is required to authenticate the cloud user that requests access to an account for providing privacy and security. Present days cloud computing is becoming a hot trend in IT industries …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
US20220294631A1 (en) System and Method for Securing Personal Information Via Biometric Public Key
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
Yang et al. Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
AU2020399657B2 (en) Privacy-preserving biometric authentication
CN101420301A (en) Human face recognizing identity authentication system
Kuznetsov et al. Deep learning-based biometric cryptographic key generation with post-quantum security
US11063936B2 (en) Encryption parameter selection
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Lone et al. A novel OTP based tripartite authentication scheme
Ayoup et al. Cancellable multi-biometric template generation based on arnold cat map and aliasing
Kwon et al. CCTV-based multi-factor authentication system.
Aanjanadevi et al. Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics.
WO2024221057A1 (en) Digital identity system and methods
US20230254309A1 (en) Decentralized secure true digital id for communication
Chand et al. Biometric authentication using SaaS in cloud computing
Thawre et al. Survey on security of biometric data using cryptography
Kevenaar Protection of biometric information
Saraswathi et al. Retinal biometrics based authentication and key exchange system
Bentahar et al. Biometric cryptosystem scheme for Internet of Things using fuzzy commitment principle
Jegede et al. State of the art in biometric key binding and key generation schemes
Failla Privacy-preserving processing of biometric templates by homomorphic encryption
Aravinda et al. User authentication using image processing techniques
Ganjewar et al. Privacy threat reduction using modified multi-line code generation algorithm (MMLCGA) for cancelable biometric technique (CBT)
Tallapragada et al. Multilevel Network Security Based on Iris Biometric
Mondal et al. Dynamic Key‐based Biometric End‐User Authentication Proposal for IoT in Industry 4.0