[go: up one dir, main page]

Popescu et al., 2013 - Google Patents

An hybrid text-image based authentication for cloud services

Popescu et al., 2013

View PDF
Document ID
4889814829278809931
Author
Popescu D
Lonea A
Publication year
Publication venue
International Journal of Computers Communications & Control

External Links

Snippet

The problem of securing access to the online information is acute today when access to bank accounts, health records, intellectual property and business or politically sensitive information are made by only a few clicks, regardless of geographic location. At the same …
Continue reading at univagora.ro (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Similar Documents

Publication Publication Date Title
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
CN106063219B (en) System and method for biometric protocol standards
WO2023009969A1 (en) Non-fungible token authentication
US20190305955A1 (en) Push notification authentication
US11700121B2 (en) Secure authorization for sensitive information
US9391982B1 (en) Network authentication of multiple profile accesses from a single remote device
Bernabe et al. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework
US12314430B1 (en) System and methods for protecting user privacy and providing secure access to user data
US20110202991A1 (en) Preserving privacy with digital identities
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Mondal et al. Know your customer (KYC) based authentication method for financial services through the internet
Ziyad et al. Critical review of authentication mechanisms in cloud computing
Karie et al. Hardening SAML by integrating SSO and multi-factor authentication (MFA) in the cloud
US11616780B2 (en) Security protection against threats to network identity providers
Popescu et al. An hybrid text-image based authentication for cloud services
EP3923542A1 (en) Computer device and method for authenticating a user
Arif Hassan et al. Enhancing multi-factor user authentication for electronic payments
Ng Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities: Emerging Research and Opportunities
US20250071108A1 (en) Decentralized identifier based authentication with verifiable credentials
Rastogi et al. Secured identity management system for preserving data privacy and transmission in cloud computing
Jindal et al. Multi-factor authentication scheme using mobile app and camera
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
González Arrieta et al. Two-step verification in the teaching/learning process
Eleftherios FIDO2 Overview, Use Cases, and Security Considerations
Dinesha et al. Evaluation of secure cloud transmission protocol