[go: up one dir, main page]

Zhang et al., 2019 - Google Patents

Evaluation of the Multifactor Authentication Technique for mobile applications

Zhang et al., 2019

Document ID
8890948892455368166
Author
Zhang T
Yang L
Wu Y
Publication year
Publication venue
Intelligent Computing-Proceedings of the Computing Conference

External Links

Snippet

Nowadays, mobile smartphones are popular devices among general population. Compared to the traditional mobile phone, smartphone is closer to a personal computer with a good number of mobile applications installed. However, when a user browses certain mobile …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Similar Documents

Publication Publication Date Title
US11176553B2 (en) Method and system providing peer effort-based validation
US11140155B2 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
US11709921B1 (en) Quick-logon for computing device
CN106575281B (en) System and method for implementing hosted authentication services
US20130263240A1 (en) Method for authentication and verification of user identity
KR20060063647A (en) System and method for user authentication
US9602510B2 (en) User authentication
Karim et al. UIPA: User authentication method based on user interface preferences for account recovery process
US20240338429A1 (en) Methods and systems for facilitating authenticating of users
Khan et al. Comparative study of authentication techniques
Abiodun et al. Securing digital transaction using a three-level authentication system
Zhang et al. Evaluation of the Multifactor Authentication Technique for mobile applications
Dasgupta et al. Authentication Basics: Key to the kingdom–Access a Computing System
KR101986244B1 (en) Method of telebiometric authentication based on mobile devices
Jagadamba et al. A secured authentication system using an effective keystroke dynamics
KR20160037520A (en) System and method for federated authentication based on biometrics
Usmani et al. New text-based user authentication scheme using CAPTCHA
Simha. R et al. Beyond passwords: a multi‐factor authentication approach for robust digital security
US20200311226A1 (en) Methods, systems, apparatuses and devices for facilitating secure publishing of a digital content
Salami et al. SIMP-REAUTH: a simple multilevel real user remote authentication scheme for mobile cloud computing
MALAU et al. Review of text based password and other authentication methods for e-commerce data protection
Bhardwaj et al. Wearable Security-Authentication using Smartwatches
Amein Hidden risks of consumer-grade biometrics
Rawal et al. Manage the Identification and Authentication of People, Devices, and Services
Sampangi et al. Who Are You? It Depends (On What You Ask {Me!)}:{Context-Dependent} Dynamic User Authentication