Quadry et al., 2021 - Google Patents
Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical PasswordQuadry et al., 2021
View PDF- Document ID
- 8201947702324575899
- Author
- Quadry K
- Govardhan A
- Misbahuddin M
- Publication year
- Publication venue
- International Journal of Computer Network & Information Security
External Links
Snippet
With the increase in the number of e-services, there is a sharp increase in online financial transactions these days. These services require a strong authentication scheme to validate the users of these services and allow access to the resources for strong security. Since two …
- 238000000034 method 0 description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mandal et al. | Certificateless-signcryption-based three-factor user access control scheme for IoT environment | |
US10979227B2 (en) | Blockchain ID connect | |
EP3424176B1 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
Jangirala et al. | A multi-server environment with secure and efficient remote user authentication scheme based on dynamic ID using smart cards | |
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
Karuppiah et al. | A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks | |
Zhao et al. | Secure and efficient user authentication scheme based on password and smart card for multiserver environment | |
US20130275750A1 (en) | Configuring a valid duration period for a digital certificate | |
WO2012067847A1 (en) | System and method for end to end encryption | |
EP2572489B1 (en) | System and method for protecting access to authentication systems | |
US20030163694A1 (en) | Method and system to deliver authentication authority web services using non-reusable and non-reversible one-time identity codes | |
US20060143695A1 (en) | Anonymous Spoof resistant authentication and enrollment methods | |
Mishra et al. | An anonymous biometric‐based remote user‐authenticated key agreement scheme for multimedia systems | |
Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
CN114389810B (en) | Method and device for generating certification, electronic equipment and storage medium | |
Sharma et al. | Advanced multi-factor user authentication scheme for E-governance applications in smart cities | |
Hussain et al. | An improved authentication scheme for digital rights management system | |
JP5186648B2 (en) | System and method for facilitating secure online transactions | |
Sarower et al. | SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security | |
Quadry et al. | Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password | |
Pampori et al. | Securely eradicating cellular dependency for e-banking applications | |
Ranjan et al. | An efficient remote user password authentication scheme based on Rabin’s cryptosystem | |
Kim et al. | Can we create a cross-domain federated identity for the industrial Internet of Things without Google? | |
EP3681098A1 (en) | Authentication system with reduced attack surface | |
Davaanaym et al. | A ping pong based one-time-passwords authentication system |