Mohammed et al., 2021 - Google Patents
A new system for user authentication using Android applicationMohammed et al., 2021
- Document ID
- 3581971202313729854
- Author
- Mohammed I
- Mohamed Y
- Publication year
- Publication venue
- 2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)
External Links
Snippet
For most of us, Internet services have become an almost daily activity and an integral part of our lives, and these services come with many requirements regarding protection, including advanced authentication, which is usually dealt with or neglected by users. Furthermore, the …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dasgupta et al. | Advances in user authentication | |
Khan et al. | Comparative study of authentication techniques | |
Lone et al. | A novel OTP based tripartite authentication scheme | |
Kaiwartya et al. | An Investigation on Biometric Internet Security. | |
Boonkrong | Methods and threats of authentication | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Kiyani et al. | Secure online banking with biometrics | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Deepa et al. | A Behavioral Biometric system for Recognition and Authenticity via Internet in detecting attacks to provide Information Security Using multiple security interceptive biometric scanners (MSIBS) | |
Mohammed et al. | A new system for user authentication using Android application | |
Aldwairi et al. | A novel multi-stage authentication system for mobile applications | |
Dasgupta et al. | Authentication Basics: Key to the kingdom–Access a Computing System | |
Yusop et al. | Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity | |
Waheed et al. | Secure login protocols: An analysis on modern attacks and solutions | |
Sabater | Biometrics as password alternative | |
Kavitha et al. | Enhancing Digital Security: A Comprehensive Multi-Model Authentication Framework Leveraging Cryptography and Biometrics | |
Mohialden et al. | Enhancing User Authentication with Facial Recognition and Feature-Based Credentials | |
Hamilton et al. | A global look at authentication | |
van Oorschot et al. | User authentication—passwords, biometrics and alternatives | |
Richardson et al. | WebID+ biometrics with permuted disposable features | |
Goyal et al. | Two-way Robust Authentication Method to Prevent Shoulder Surfing Attack | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
Jøsang | User Authentication | |
Ojo | Development of a Three Factor Authentication System for Online Banking | |
Mehraj et al. | Critical Challenges in Access Management Schemes for Smartphones: An Appraisal |