Popescu et al., 2013 - Google Patents
An hybrid text-image based authentication for cloud servicesPopescu et al., 2013
View PDF- Document ID
- 4889814829278809931
- Author
- Popescu D
- Lonea A
- Publication year
- Publication venue
- International Journal of Computers Communications & Control
External Links
Snippet
The problem of securing access to the online information is acute today when access to bank accounts, health records, intellectual property and business or politically sensitive information are made by only a few clicks, regardless of geographic location. At the same …
- 230000001154 acute 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7083892B2 (en) | Mobile authentication interoperability of digital certificates | |
| CN106063219B (en) | System and method for biometric protocol standards | |
| WO2023009969A1 (en) | Non-fungible token authentication | |
| US20190305955A1 (en) | Push notification authentication | |
| US11700121B2 (en) | Secure authorization for sensitive information | |
| US9391982B1 (en) | Network authentication of multiple profile accesses from a single remote device | |
| Bernabe et al. | ARIES: Evaluation of a reliable and privacy-preserving European identity management framework | |
| US12314430B1 (en) | System and methods for protecting user privacy and providing secure access to user data | |
| US20110202991A1 (en) | Preserving privacy with digital identities | |
| Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
| Mondal et al. | Know your customer (KYC) based authentication method for financial services through the internet | |
| Ziyad et al. | Critical review of authentication mechanisms in cloud computing | |
| Karie et al. | Hardening SAML by integrating SSO and multi-factor authentication (MFA) in the cloud | |
| US11616780B2 (en) | Security protection against threats to network identity providers | |
| Popescu et al. | An hybrid text-image based authentication for cloud services | |
| EP3923542A1 (en) | Computer device and method for authenticating a user | |
| Arif Hassan et al. | Enhancing multi-factor user authentication for electronic payments | |
| Ng | Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities: Emerging Research and Opportunities | |
| US20250071108A1 (en) | Decentralized identifier based authentication with verifiable credentials | |
| Rastogi et al. | Secured identity management system for preserving data privacy and transmission in cloud computing | |
| Jindal et al. | Multi-factor authentication scheme using mobile app and camera | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| González Arrieta et al. | Two-step verification in the teaching/learning process | |
| Eleftherios | FIDO2 Overview, Use Cases, and Security Considerations | |
| Dinesha et al. | Evaluation of secure cloud transmission protocol |