[go: up one dir, main page]

Pilania et al., 2023 - Google Patents

ENCRYPTO: A Reliable and Efficient Mobile App for Password Management

Pilania et al., 2023

View PDF
Document ID
4956283116343622600
Author
Pilania U
Kumar M
Srivastava S
Dhingra B
Adhana L
Gaur R
Publication year
Publication venue
International Conference on Recent Developments in Cyber Security

External Links

Snippet

Passwords and weak secrets are frequently used as cryptographic keys in security protocols. Despite users' attempts to secure their data with system passwords or other measures, these protection schemes can create a false sense of security. Windows desktop …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Similar Documents

Publication Publication Date Title
Anakath et al. Privacy preserving multi factor authentication using trust management
CN106537403B (en) System for accessing data from multiple devices
US20090260077A1 (en) Security-enhanced log in
Ghazizadeh et al. Trusted computing strengthens cloud authentication
US10623400B2 (en) Method and device for credential and data protection
Kaiser et al. A multi-layer security system for data access control, authentication, and authorization
Kim et al. Security analysis and bypass user authentication bound to device of windows hello in the wild
Sharma et al. A two-tier security solution for storing data across public cloud
Syahreen et al. A Systematic Review on Multi-Factor Authentication Framework.
Othman et al. A protocol for decentralized biometric-based self-sovereign identity ecosystem
Abubakar-Sadiq Establishing secure and privacy preserving digital identity with self-sovereign identity
Zaidi et al. Exploring the landscape of password managers for individual users through innovative solution
Simpson et al. Secure Identity for Enterprises.
Binu et al. A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services
Pilania et al. ENCRYPTO: A Reliable and Efficient Mobile App for Password Management
Fietkau et al. Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints
TWI640928B (en) System for generating and decrypting two-dimensional codes and method thereof
Patil et al. Pen-drive based password management system for online accounts
Doğan A Survey on Password-free Authentication Method: Passkey
Othman et al. The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol
Marisargunam Cloud Service Authentication Based on Advanced Encryption Standard (AES) For Ensure Privacy
Chahal et al. Challenges and security issues of NoSQL databases
CN109284615A (en) Mobile device digital resource method for managing security
Saini Comparative analysis of top 5, 2-factor authentication solutions
HADERKA Security and usability of password managers