[go: up one dir, main page]

Nisar, 2019 - Google Patents

Location based authentication service using 4G/5G Devices

Nisar, 2019

Document ID
6288038265252502248
Author
Nisar F
Publication year
Publication venue
2019 International Conference on Communication Technologies (ComTech)

External Links

Snippet

Mobile devices 4G/5G have become an important part of our day to day lives. Accessing internet applications has become much easier due to mobile phones. Mobile phones nowadays have been built with new technologies like location based services like GPS …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or paths for security, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Similar Documents

Publication Publication Date Title
EP3997597B1 (en) System and method for identifying a browser instance in a browser session with a server
Zhang et al. Location-based authentication and authorization using smart phones
US9529985B2 (en) Global authentication service using a global user identifier
US9628282B2 (en) Universal anonymous cross-site authentication
Mishra et al. Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
US9692603B2 (en) Biometric PKI authentication
Hsieh et al. Design of a time and location based One-Time Password authentication scheme
US10484350B2 (en) Privacy-preserving location corroborations
US20140289509A1 (en) System and method for delegating trust to a new authenticator
Agadakos et al. Location-enhanced authentication using the IoT: Because you cannot be in two places at once
Manurung Designing of user authentication based on multi-factor authentication on wireless networks
Berbecaru LRAP: A location-based remote client authentication protocol for mobile environments
Han et al. Efficient Multifactor Two‐Server Authenticated Scheme under Mobile Cloud Computing
Alaca et al. Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
Nisar Location based authentication service using 4G/5G Devices
Vivekanandan et al. Biometric based user authentication protocol for mobile cloud environment
KR101473576B1 (en) Method for Offline Login based on SW Token and Mobile Device using the same
Vorugunti et al. Improving security of lightweight authentication technique for heterogeneous wireless sensor networks
Avdyushkin et al. Secure location validation with wi-fi geo-fencing and nfc
Chen et al. Anti-synchronization and robust authentication for noisy PUF-based smart card
Zhang Secure mobile service-oriented architecture
Khan Securing ATM with OTP and Biometric
Manolopoulos Security and privacy in smartphone based intelligent transportation systems
Maranco et al. Novel Approach For End User Security Access in Cyber Physical System Using Multilayer Authentication
Hsieh et al. A time and location information assisted OTP scheme