Graham et al., 2003 - Google Patents
It's all about authenticationGraham et al., 2003
- Document ID
- 5895489802760305968
- Author
- Graham D
- Director C
- Publication year
- Publication venue
- SANS Institute
External Links
- 230000003247 decreasing 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11803633B1 (en) | Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates | |
Burr et al. | Electronic Authentication | |
US20030101348A1 (en) | Method and system for determining confidence in a digital transaction | |
US6745327B1 (en) | Electronic certificate signature program | |
CN102959559B (en) | For the method producing certificate | |
US20130219481A1 (en) | Cyberspace Trusted Identity (CTI) Module | |
US20090293111A1 (en) | Third party system for biometric authentication | |
EP1571525A1 (en) | A method, a hardware token, and a computer program for authentication | |
KR19990044692A (en) | Document authentication system and method | |
JPH10504150A (en) | A method for securely using digital signatures in commercial cryptosystems | |
CA2491628A1 (en) | Biometric private key infrastructure | |
Isobe et al. | Development of personal authentication system using fingerprint with digital signature technologies | |
Burr et al. | Sp 800-63-1. electronic authentication guideline | |
Bosworth et al. | Entities, identities, identifiers and credentials—what does it all mean? | |
Smejkal et al. | Strong authentication using dynamic biometric signature | |
Graham et al. | It’s all about authentication | |
Smejkal et al. | Development trends of electronic authentication | |
Al-Khouri et al. | Digital identities and the promise of the technology trio: PKI, smart cards, and biometrics | |
JP2006074487A (en) | Authentication management method and authentication management system | |
Al-Rawy et al. | Secure i-voting scheme with Blockchain technology and blind signature | |
Salaiwarakul et al. | Verification of integrity and secrecy properties of a biometric authentication protocol | |
Sedaghat et al. | The management of citizen identity in electronic government | |
WO2024059884A1 (en) | Verification and identification process records using digital signatures | |
Jameson et al. | ELECTRONIC IDENTIFICATION SCHEMES | |
Khan | How Are Digital Signatures Changing International Business? |