[go: up one dir, main page]

Mohammed et al., 2021 - Google Patents

A new system for user authentication using Android application

Mohammed et al., 2021

Document ID
3581971202313729854
Author
Mohammed I
Mohamed Y
Publication year
Publication venue
2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)

External Links

Snippet

For most of us, Internet services have become an almost daily activity and an integral part of our lives, and these services come with many requirements regarding protection, including advanced authentication, which is usually dealt with or neglected by users. Furthermore, the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Similar Documents

Publication Publication Date Title
Dasgupta et al. Advances in user authentication
Khan et al. Comparative study of authentication techniques
Lone et al. A novel OTP based tripartite authentication scheme
Kaiwartya et al. An Investigation on Biometric Internet Security.
Boonkrong Methods and threats of authentication
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Kiyani et al. Secure online banking with biometrics
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Deepa et al. A Behavioral Biometric system for Recognition and Authenticity via Internet in detecting attacks to provide Information Security Using multiple security interceptive biometric scanners (MSIBS)
Mohammed et al. A new system for user authentication using Android application
Aldwairi et al. A novel multi-stage authentication system for mobile applications
Dasgupta et al. Authentication Basics: Key to the kingdom–Access a Computing System
Yusop et al. Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Waheed et al. Secure login protocols: An analysis on modern attacks and solutions
Sabater Biometrics as password alternative
Kavitha et al. Enhancing Digital Security: A Comprehensive Multi-Model Authentication Framework Leveraging Cryptography and Biometrics
Mohialden et al. Enhancing User Authentication with Facial Recognition and Feature-Based Credentials
Hamilton et al. A global look at authentication
van Oorschot et al. User authentication—passwords, biometrics and alternatives
Richardson et al. WebID+ biometrics with permuted disposable features
Goyal et al. Two-way Robust Authentication Method to Prevent Shoulder Surfing Attack
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking
Jøsang User Authentication
Ojo Development of a Three Factor Authentication System for Online Banking
Mehraj et al. Critical Challenges in Access Management Schemes for Smartphones: An Appraisal