[go: up one dir, main page]

Kurkovsky et al., 2010 - Google Patents

Approaches and issues in location-aware continuous authentication

Kurkovsky et al., 2010

View PDF
Document ID
9150392769723169796
Author
Kurkovsky S
Syta E
Publication year
Publication venue
2010 13th IEEE International Conference on Computational Science and Engineering

External Links

Snippet

Convergence of technologies enabling physical and information security makes it possible to combine the features of location-aware and continuous authentication in a single system. We discuss the design of a location-aware continuous authentication system and discuss …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
EP3428819B1 (en) Mobile security countermeasures
US11552940B1 (en) System and method for continuous authentication of user entity identity using context and behavior for real-time modeling and anomaly detection
US10055559B2 (en) Security device, methods, and systems for continuous authentication
US11217051B2 (en) System and method for providing credential activation layered security
Hayashi et al. Casa: context-aware scalable authentication
Lee et al. Implicit sensor-based authentication of smartphone users with smartwatch
US11184766B1 (en) Systems and methods for continuous authentication, identity assurance and access control
US10440019B2 (en) Method, computer program, and system for identifying multiple users based on their behavior
US12056975B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
US9552684B2 (en) Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US9092605B2 (en) Ongoing authentication and access control with network access device
US20180082304A1 (en) System for user identification and authentication
US10686793B2 (en) Integrated biometrics for application security
US20140283059A1 (en) Continuous Monitoring of Computer User and Computer Activities
Shila et al. CASTRA: Seamless and unobtrusive authentication of users to diverse mobile services
Aramide AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics
US11444953B2 (en) Methods, systems, apparatuses and devices for facilitating security of a resource using a plurality of credentials
EP4016924B1 (en) Risk-aware access control method and related computer program and device
Kurkovsky et al. Continuous RFID-enabled authentication: Privacy implications
Kurkovsky et al. Approaches and issues in location-aware continuous authentication
US11917405B2 (en) Method and system for authenticating users of mobile communication devices through mobility traces
Vaidya et al. Survey of Multi level Authentication for improving the Privacy Preservation and Security
Navya et al. File access control for multiple user system using Computer Vision
Shetty et al. A GAIT-Based Three-Level Authentication System for Enhanced Cybersecurity