[go: up one dir, main page]

Quadry et al., 2021 - Google Patents

Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password

Quadry et al., 2021

View PDF
Document ID
8201947702324575899
Author
Quadry K
Govardhan A
Misbahuddin M
Publication year
Publication venue
International Journal of Computer Network & Information Security

External Links

Snippet

With the increase in the number of e-services, there is a sharp increase in online financial transactions these days. These services require a strong authentication scheme to validate the users of these services and allow access to the resources for strong security. Since two …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card

Similar Documents

Publication Publication Date Title
Mandal et al. Certificateless-signcryption-based three-factor user access control scheme for IoT environment
US10979227B2 (en) Blockchain ID connect
EP3424176B1 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Jangirala et al. A multi-server environment with secure and efficient remote user authentication scheme based on dynamic ID using smart cards
EP2020797B1 (en) Client-server Opaque token passing apparatus and method
Karuppiah et al. A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks
Zhao et al. Secure and efficient user authentication scheme based on password and smart card for multiserver environment
US20130275750A1 (en) Configuring a valid duration period for a digital certificate
WO2012067847A1 (en) System and method for end to end encryption
EP2572489B1 (en) System and method for protecting access to authentication systems
US20030163694A1 (en) Method and system to deliver authentication authority web services using non-reusable and non-reversible one-time identity codes
US20060143695A1 (en) Anonymous Spoof resistant authentication and enrollment methods
Mishra et al. An anonymous biometric‐based remote user‐authenticated key agreement scheme for multimedia systems
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
CN114389810B (en) Method and device for generating certification, electronic equipment and storage medium
Sharma et al. Advanced multi-factor user authentication scheme for E-governance applications in smart cities
Hussain et al. An improved authentication scheme for digital rights management system
JP5186648B2 (en) System and method for facilitating secure online transactions
Sarower et al. SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
Quadry et al. Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Ranjan et al. An efficient remote user password authentication scheme based on Rabin’s cryptosystem
Kim et al. Can we create a cross-domain federated identity for the industrial Internet of Things without Google?
EP3681098A1 (en) Authentication system with reduced attack surface
Davaanaym et al. A ping pong based one-time-passwords authentication system