Blasko et al., 2005 - Google Patents
A wristwatch-computer based password-vaultBlasko et al., 2005
- Document ID
- 784346095504026689
- Author
- Blasko G
- Narayanaswami C
- Raghunath M
- Publication year
- Publication venue
- IBM Technical Report RC23616 (W0503–066)
External Links
- 238000000034 method 0 abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250165580A1 (en) | Security System and Method for Controlling Access to Computing Resources | |
| US9935935B1 (en) | Identity selector for use with a user-portable device and method of use in a user-centric identity management system | |
| US8924724B2 (en) | Document encryption and decryption | |
| US9021254B2 (en) | Multi-platform user device malicious website protection system | |
| US20090276839A1 (en) | Identity collection, verification and security access control system | |
| KR20120126084A (en) | Personal portable secured network access system | |
| WO2014182964A1 (en) | Systems and methods for storing and accessing confidential data | |
| EP2230622A1 (en) | Mass storage device with automated credentials loading | |
| CN109428725A (en) | Information processing equipment, control method and storage medium | |
| JP2012248198A (en) | Safe operation method of computer device | |
| US20080172750A1 (en) | Self validation of user authentication requests | |
| JP2013517584A (en) | Personal portable and secure network access system | |
| TWI739778B (en) | The login mechanism of the operating system | |
| Hayashi et al. | WebTicket: Account management using printable tokens | |
| CN117751551A (en) | System and method for secure internet communications | |
| US11075920B2 (en) | Providing access to structured stored data | |
| CN107306270B (en) | High security user multi-authentication system and method | |
| Blasko et al. | A wristwatch-computer based password-vault | |
| US10491391B1 (en) | Feedback-based data security | |
| Pramendorfer et al. | User-to-PC Authentication Through Confirmation on Mobile Devices: On Usability and Performance | |
| Park et al. | One touch logon: Replacing multiple passwords with single fingerprint recognition | |
| Sheil | Security, Privacy & Usability in Modern Web Services. | |
| Ostela | Older adults' perspectives on authentication methods | |
| Gibson et al. | Accessible and secure? Design constraints on image and sound based passwords | |
| Zamfiroiu et al. | Behavior characteristics of mobile web applications authenticated users |