Mazhelis et al., 2005 - Google Patents
An integrated identity verification system for mobile terminalsMazhelis et al., 2005
- Document ID
- 5618036141484793345
- Author
- Mazhelis O
- Markkula J
- Veijalainen J
- Publication year
- Publication venue
- Information management & computer security
External Links
Snippet
Purpose–To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐ friendliness. Design/methodology/approach–The reported research corresponds to the …
- 230000003068 static 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10664820B2 (en) | Methods and systems for providing secure access to a hosted service via a client application | |
CN100438421C (en) | Method and system for conducting user verification to sub position of network position | |
US20030105719A1 (en) | Information content distribution based on privacy and/or personal information | |
US20040123158A1 (en) | Using trusted communication channel to combat user name/password theft | |
US20120060214A1 (en) | Behavioral Stochastic Authentication (BSA) | |
CN103020542B (en) | Store the technology of the secret information being used for global data center | |
Pei et al. | Data mining for intrusion detection: techniques, applications and systems | |
Priyatharsini et al. | Self secured model for cloud based IOT systems | |
Kannan et al. | Cryptography‐based deep artificial structure for secure communication using IoT‐enabled cyber‐physical system | |
Alswiti et al. | Users profiling using clickstream data analysis and classification | |
Van Oorschot et al. | Countering identity theft through digital uniqueness, location cross-checking, and funneling | |
Mazhelis et al. | An integrated identity verification system for mobile terminals | |
US20060179031A1 (en) | Internet Web shield | |
Weitzner | In search of manageable identity systems | |
Khalid et al. | Intelligent use of fog devices in edge‐cloud paradigm to assist in E‐polling | |
Mazhelis et al. | An integrated identity verification system for mobile terminals: System components and their distribution | |
US7110858B2 (en) | Object identification uses prediction of data in distributed network | |
De et al. | Trusted cloud-and femtocell-based biometric authentication for mobile networks | |
Rajan et al. | Iot security: Ai blockchaining solutions and practices | |
Gururajan | A discussion on security risks in mobile commerce | |
US11917405B2 (en) | Method and system for authenticating users of mobile communication devices through mobility traces | |
Bonazzi et al. | From “security for privacy” to “privacy for security” | |
Jobanputra et al. | Emerging security technologies for mobile user accesses | |
Babu et al. | Transaction based authentication scheme for mobile communication: A cognitive agent based approach | |
Al Abdulwahid et al. | Enhancing Healthcare Data Security and Accessibility Through Federated Biometric Authentication and Blockchain Integration: The Cloud Aura Model |