Salami et al., 2020 - Google Patents
SIMP-REAUTH: a simple multilevel real user remote authentication scheme for mobile cloud computingSalami et al., 2020
View PDF- Document ID
- 7573688190587689585
- Author
- Salami O
- Demchenko Y
- Adedokun E
- Mu’azu M
- Publication year
- Publication venue
- International Conference on Information and Communication Technology and Applications
External Links
Snippet
Remote authentication is commonly required for online transactions. Many computing activities are now done online through Cloud computing. Most of devices used to access data in the Cloud are low capacity mobile devices. The advancement of computing …
- 238000000034 method 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12074886B1 (en) | Identification (ID) proofing to deter threat actors | |
| US11552940B1 (en) | System and method for continuous authentication of user entity identity using context and behavior for real-time modeling and anomaly detection | |
| US11108752B2 (en) | Systems and methods for managing resetting of user online identities or accounts | |
| US10135835B1 (en) | Passwordless and decentralized identity verification | |
| CN102317903B (en) | Use social information that user conversation is authenticated | |
| US9348981B1 (en) | System and method for generating user authentication challenges | |
| US9509721B2 (en) | Managing social network accessibility based on age | |
| US20170201518A1 (en) | Method and system for real-time authentication of user access to a resource | |
| Ceccarelli et al. | Continuous and transparent user identity verification for secure internet services | |
| US11227036B1 (en) | Determination of authentication assurance via algorithmic decay | |
| WO2022026598A1 (en) | Systems and methods for state-based risk analysis and mitigation for exam registration and delivery processes | |
| US12079741B2 (en) | Evaluation of a registration process | |
| EP4189515A1 (en) | Risk analysis and mitigation with nested machine learning models for exam registration and delivery processes | |
| US12175549B2 (en) | Recommendation engine for testing conditions based on evaluation of test entity scores | |
| Hettiarachchige et al. | Holistic authentication framework for virtual agents; UK banking industry | |
| Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
| Salami et al. | SIMP-REAUTH: a simple multilevel real user remote authentication scheme for mobile cloud computing | |
| Bouke | Identity and access management (IAM) | |
| Kimani | Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities | |
| Luckett | A Zero Trust Roadmap for Consumers and Small Businesses | |
| Thiyagarajan et al. | Securing Credit Inquiries: The Role of Real-Time User Approval in Preventing SSN Identity Theft | |
| EP4546177A1 (en) | System and method for cross-platform recent user-activity based authentication | |
| Pete et al. | A novel approach for verifying selective user identity attributes online using open banking APIs | |
| Ahmad et al. | Enhancing the authentication mechanism of social media websites using face detection | |
| Baxter et al. | Enhancing Identity and Access Management in the US Navy Via Migration to More Modern Standards of Authentication |