Zhang et al., 2019 - Google Patents
Evaluation of the Multifactor Authentication Technique for mobile applicationsZhang et al., 2019
- Document ID
- 8890948892455368166
- Author
- Zhang T
- Yang L
- Wu Y
- Publication year
- Publication venue
- Intelligent Computing-Proceedings of the Computing Conference
External Links
Snippet
Nowadays, mobile smartphones are popular devices among general population. Compared to the traditional mobile phone, smartphone is closer to a personal computer with a good number of mobile applications installed. However, when a user browses certain mobile …
- 238000011156 evaluation 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11176553B2 (en) | Method and system providing peer effort-based validation | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
US11709921B1 (en) | Quick-logon for computing device | |
CN106575281B (en) | System and method for implementing hosted authentication services | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
KR20060063647A (en) | System and method for user authentication | |
US9602510B2 (en) | User authentication | |
Karim et al. | UIPA: User authentication method based on user interface preferences for account recovery process | |
US20240338429A1 (en) | Methods and systems for facilitating authenticating of users | |
Khan et al. | Comparative study of authentication techniques | |
Abiodun et al. | Securing digital transaction using a three-level authentication system | |
Zhang et al. | Evaluation of the Multifactor Authentication Technique for mobile applications | |
Dasgupta et al. | Authentication Basics: Key to the kingdom–Access a Computing System | |
KR101986244B1 (en) | Method of telebiometric authentication based on mobile devices | |
Jagadamba et al. | A secured authentication system using an effective keystroke dynamics | |
KR20160037520A (en) | System and method for federated authentication based on biometrics | |
Usmani et al. | New text-based user authentication scheme using CAPTCHA | |
Simha. R et al. | Beyond passwords: a multi‐factor authentication approach for robust digital security | |
US20200311226A1 (en) | Methods, systems, apparatuses and devices for facilitating secure publishing of a digital content | |
Salami et al. | SIMP-REAUTH: a simple multilevel real user remote authentication scheme for mobile cloud computing | |
MALAU et al. | Review of text based password and other authentication methods for e-commerce data protection | |
Bhardwaj et al. | Wearable Security-Authentication using Smartwatches | |
Amein | Hidden risks of consumer-grade biometrics | |
Rawal et al. | Manage the Identification and Authentication of People, Devices, and Services | |
Sampangi et al. | Who Are You? It Depends (On What You Ask {Me!)}:{Context-Dependent} Dynamic User Authentication |