AlQahtani et al., 2020 - Google Patents
0ei2fa: Zero effort indoor two factor authenticationAlQahtani et al., 2020
View PDF- Document ID
- 8682499767689203185
- Author
- AlQahtani A
- Alamleh H
- Gourd J
- Mugasa H
- Publication year
- Publication venue
- 2020 14th International Conference on Innovations in Information Technology (IIT)
External Links
Snippet
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke) …
- 238000000034 method 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/20—Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Location-based authentication and authorization using smart phones | |
| Chen et al. | S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol | |
| EP3552418B1 (en) | Wireless network authorization using a trusted authenticator | |
| Xie et al. | GeneWave: Fast authentication and key agreement on commodity mobile devices | |
| US10992670B1 (en) | Authenticating identities for establishing secure network tunnels | |
| US8737965B2 (en) | Wireless device monitoring systems and monitoring devices, and associated methods | |
| US8175578B2 (en) | Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture | |
| US8392712B1 (en) | System and method for provisioning a unique device credential | |
| AlQahtani et al. | 0EISUA: zero effort indoor secure user authentication | |
| AlQahtani et al. | Ts2fa: Trilateration system two factor authentication | |
| AlQahtani et al. | Bf2fa: Beacon frame two-factor authentication | |
| AlQahtani et al. | 0ei2fa: Zero effort indoor two factor authentication | |
| GB2418819A (en) | System which transmits security settings in authentication response message | |
| US20180248892A1 (en) | Location-Based Continuous Two-Factor Authentication | |
| Hasan et al. | Internet of things device authentication scheme using hardware serialization | |
| Xiao et al. | PHY-authentication protocol for spoofing detection in wireless networks | |
| Zhou et al. | Nauth: Secure face-to-face device authentication via nonlinearity | |
| Ghose et al. | ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification | |
| AlQahtani et al. | Ci2fa: Continuous indoor two-factor authentication based on trilateration system | |
| Mwinuka et al. | FakeAP detector: an android-based client-side application for detecting Wi-Fi hotspot spoofing | |
| Chen et al. | Wireless device authentication using acoustic hardware fingerprints | |
| Jia-Ning et al. | Ambient audio authentication | |
| Al-Attar et al. | Smartphone-key: Hands-free two-factor authentication for voice-controlled devices using wi-fi location | |
| Ji et al. | A nonlinearity-based secure face-to-face device authentication for mobile devices | |
| Brassil et al. | Traffic signature-based mobile device location authentication |