[go: up one dir, main page]

Blasko et al., 2005 - Google Patents

A wristwatch-computer based password-vault

Blasko et al., 2005

Document ID
784346095504026689
Author
Blasko G
Narayanaswami C
Raghunath M
Publication year
Publication venue
IBM Technical Report RC23616 (W0503–066)

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets

Similar Documents

Publication Publication Date Title
US20250165580A1 (en) Security System and Method for Controlling Access to Computing Resources
US9935935B1 (en) Identity selector for use with a user-portable device and method of use in a user-centric identity management system
US8924724B2 (en) Document encryption and decryption
US9021254B2 (en) Multi-platform user device malicious website protection system
US20090276839A1 (en) Identity collection, verification and security access control system
KR20120126084A (en) Personal portable secured network access system
WO2014182964A1 (en) Systems and methods for storing and accessing confidential data
EP2230622A1 (en) Mass storage device with automated credentials loading
CN109428725A (en) Information processing equipment, control method and storage medium
JP2012248198A (en) Safe operation method of computer device
US20080172750A1 (en) Self validation of user authentication requests
JP2013517584A (en) Personal portable and secure network access system
TWI739778B (en) The login mechanism of the operating system
Hayashi et al. WebTicket: Account management using printable tokens
CN117751551A (en) System and method for secure internet communications
US11075920B2 (en) Providing access to structured stored data
CN107306270B (en) High security user multi-authentication system and method
Blasko et al. A wristwatch-computer based password-vault
US10491391B1 (en) Feedback-based data security
Pramendorfer et al. User-to-PC Authentication Through Confirmation on Mobile Devices: On Usability and Performance
Park et al. One touch logon: Replacing multiple passwords with single fingerprint recognition
Sheil Security, Privacy & Usability in Modern Web Services.
Ostela Older adults' perspectives on authentication methods
Gibson et al. Accessible and secure? Design constraints on image and sound based passwords
Zamfiroiu et al. Behavior characteristics of mobile web applications authenticated users