[go: up one dir, main page]

Mazhelis et al., 2005 - Google Patents

An integrated identity verification system for mobile terminals

Mazhelis et al., 2005

Document ID
5618036141484793345
Author
Mazhelis O
Markkula J
Veijalainen J
Publication year
Publication venue
Information management & computer security

External Links

Snippet

Purpose–To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐ friendliness. Design/methodology/approach–The reported research corresponds to the …
Continue reading at www.emerald.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Similar Documents

Publication Publication Date Title
US10664820B2 (en) Methods and systems for providing secure access to a hosted service via a client application
CN100438421C (en) Method and system for conducting user verification to sub position of network position
US20030105719A1 (en) Information content distribution based on privacy and/or personal information
US20040123158A1 (en) Using trusted communication channel to combat user name/password theft
US20120060214A1 (en) Behavioral Stochastic Authentication (BSA)
CN103020542B (en) Store the technology of the secret information being used for global data center
Pei et al. Data mining for intrusion detection: techniques, applications and systems
Priyatharsini et al. Self secured model for cloud based IOT systems
Kannan et al. Cryptography‐based deep artificial structure for secure communication using IoT‐enabled cyber‐physical system
Alswiti et al. Users profiling using clickstream data analysis and classification
Van Oorschot et al. Countering identity theft through digital uniqueness, location cross-checking, and funneling
Mazhelis et al. An integrated identity verification system for mobile terminals
US20060179031A1 (en) Internet Web shield
Weitzner In search of manageable identity systems
Khalid et al. Intelligent use of fog devices in edge‐cloud paradigm to assist in E‐polling
Mazhelis et al. An integrated identity verification system for mobile terminals: System components and their distribution
US7110858B2 (en) Object identification uses prediction of data in distributed network
De et al. Trusted cloud-and femtocell-based biometric authentication for mobile networks
Rajan et al. Iot security: Ai blockchaining solutions and practices
Gururajan A discussion on security risks in mobile commerce
US11917405B2 (en) Method and system for authenticating users of mobile communication devices through mobility traces
Bonazzi et al. From “security for privacy” to “privacy for security”
Jobanputra et al. Emerging security technologies for mobile user accesses
Babu et al. Transaction based authentication scheme for mobile communication: A cognitive agent based approach
Al Abdulwahid et al. Enhancing Healthcare Data Security and Accessibility Through Federated Biometric Authentication and Blockchain Integration: The Cloud Aura Model