Nisar, 2019 - Google Patents
Location based authentication service using 4G/5G DevicesNisar, 2019
- Document ID
- 6288038265252502248
- Author
- Nisar F
- Publication year
- Publication venue
- 2019 International Conference on Communication Technologies (ComTech)
External Links
Snippet
Mobile devices 4G/5G have become an important part of our day to day lives. Accessing internet applications has become much easier due to mobile phones. Mobile phones nowadays have been built with new technologies like location based services like GPS …
- 238000000034 method 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or paths for security, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3997597B1 (en) | System and method for identifying a browser instance in a browser session with a server | |
Zhang et al. | Location-based authentication and authorization using smart phones | |
US9529985B2 (en) | Global authentication service using a global user identifier | |
US9628282B2 (en) | Universal anonymous cross-site authentication | |
Mishra et al. | Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems | |
US9692603B2 (en) | Biometric PKI authentication | |
Hsieh et al. | Design of a time and location based One-Time Password authentication scheme | |
US10484350B2 (en) | Privacy-preserving location corroborations | |
US20140289509A1 (en) | System and method for delegating trust to a new authenticator | |
Agadakos et al. | Location-enhanced authentication using the IoT: Because you cannot be in two places at once | |
Manurung | Designing of user authentication based on multi-factor authentication on wireless networks | |
Berbecaru | LRAP: A location-based remote client authentication protocol for mobile environments | |
Han et al. | Efficient Multifactor Two‐Server Authenticated Scheme under Mobile Cloud Computing | |
Alaca et al. | Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes | |
Nisar | Location based authentication service using 4G/5G Devices | |
Vivekanandan et al. | Biometric based user authentication protocol for mobile cloud environment | |
KR101473576B1 (en) | Method for Offline Login based on SW Token and Mobile Device using the same | |
Vorugunti et al. | Improving security of lightweight authentication technique for heterogeneous wireless sensor networks | |
Avdyushkin et al. | Secure location validation with wi-fi geo-fencing and nfc | |
Chen et al. | Anti-synchronization and robust authentication for noisy PUF-based smart card | |
Zhang | Secure mobile service-oriented architecture | |
Khan | Securing ATM with OTP and Biometric | |
Manolopoulos | Security and privacy in smartphone based intelligent transportation systems | |
Maranco et al. | Novel Approach For End User Security Access in Cyber Physical System Using Multilayer Authentication | |
Hsieh et al. | A time and location information assisted OTP scheme |