[go: up one dir, main page]

Graham et al., 2003 - Google Patents

It's all about authentication

Graham et al., 2003

Document ID
5895489802760305968
Author
Graham D
Director C
Publication year
Publication venue
SANS Institute

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates

Similar Documents

Publication Publication Date Title
US11803633B1 (en) Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
Burr et al. Electronic Authentication
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
US6745327B1 (en) Electronic certificate signature program
CN102959559B (en) For the method producing certificate
US20130219481A1 (en) Cyberspace Trusted Identity (CTI) Module
US20090293111A1 (en) Third party system for biometric authentication
EP1571525A1 (en) A method, a hardware token, and a computer program for authentication
KR19990044692A (en) Document authentication system and method
JPH10504150A (en) A method for securely using digital signatures in commercial cryptosystems
CA2491628A1 (en) Biometric private key infrastructure
Isobe et al. Development of personal authentication system using fingerprint with digital signature technologies
Burr et al. Sp 800-63-1. electronic authentication guideline
Bosworth et al. Entities, identities, identifiers and credentials—what does it all mean?
Smejkal et al. Strong authentication using dynamic biometric signature
Graham et al. It’s all about authentication
Smejkal et al. Development trends of electronic authentication
Al-Khouri et al. Digital identities and the promise of the technology trio: PKI, smart cards, and biometrics
JP2006074487A (en) Authentication management method and authentication management system
Al-Rawy et al. Secure i-voting scheme with Blockchain technology and blind signature
Salaiwarakul et al. Verification of integrity and secrecy properties of a biometric authentication protocol
Sedaghat et al. The management of citizen identity in electronic government
WO2024059884A1 (en) Verification and identification process records using digital signatures
Jameson et al. ELECTRONIC IDENTIFICATION SCHEMES
Khan How Are Digital Signatures Changing International Business?