Pilania et al., 2023 - Google Patents
ENCRYPTO: A Reliable and Efficient Mobile App for Password ManagementPilania et al., 2023
View PDF- Document ID
- 4956283116343622600
- Author
- Pilania U
- Kumar M
- Srivastava S
- Dhingra B
- Adhana L
- Gaur R
- Publication year
- Publication venue
- International Conference on Recent Developments in Cyber Security
External Links
Snippet
Passwords and weak secrets are frequently used as cryptographic keys in security protocols. Despite users' attempts to secure their data with system passwords or other measures, these protection schemes can create a false sense of security. Windows desktop …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anakath et al. | Privacy preserving multi factor authentication using trust management | |
CN106537403B (en) | System for accessing data from multiple devices | |
US20090260077A1 (en) | Security-enhanced log in | |
Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
US10623400B2 (en) | Method and device for credential and data protection | |
Kaiser et al. | A multi-layer security system for data access control, authentication, and authorization | |
Kim et al. | Security analysis and bypass user authentication bound to device of windows hello in the wild | |
Sharma et al. | A two-tier security solution for storing data across public cloud | |
Syahreen et al. | A Systematic Review on Multi-Factor Authentication Framework. | |
Othman et al. | A protocol for decentralized biometric-based self-sovereign identity ecosystem | |
Abubakar-Sadiq | Establishing secure and privacy preserving digital identity with self-sovereign identity | |
Zaidi et al. | Exploring the landscape of password managers for individual users through innovative solution | |
Simpson et al. | Secure Identity for Enterprises. | |
Binu et al. | A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services | |
Pilania et al. | ENCRYPTO: A Reliable and Efficient Mobile App for Password Management | |
Fietkau et al. | Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints | |
TWI640928B (en) | System for generating and decrypting two-dimensional codes and method thereof | |
Patil et al. | Pen-drive based password management system for online accounts | |
Doğan | A Survey on Password-free Authentication Method: Passkey | |
Othman et al. | The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol | |
Marisargunam | Cloud Service Authentication Based on Advanced Encryption Standard (AES) For Ensure Privacy | |
Chahal et al. | Challenges and security issues of NoSQL databases | |
CN109284615A (en) | Mobile device digital resource method for managing security | |
Saini | Comparative analysis of top 5, 2-factor authentication solutions | |
HADERKA | Security and usability of password managers |