Kurkovsky et al., 2010 - Google Patents
Approaches and issues in location-aware continuous authenticationKurkovsky et al., 2010
View PDF- Document ID
- 9150392769723169796
- Author
- Kurkovsky S
- Syta E
- Publication year
- Publication venue
- 2010 13th IEEE International Conference on Computational Science and Engineering
External Links
Snippet
Convergence of technologies enabling physical and information security makes it possible to combine the features of location-aware and continuous authentication in a single system. We discuss the design of a location-aware continuous authentication system and discuss …
- 238000000034 method 0 description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11101993B1 (en) | Authentication and authorization through derived behavioral credentials using secured paired communication devices | |
EP3428819B1 (en) | Mobile security countermeasures | |
US11552940B1 (en) | System and method for continuous authentication of user entity identity using context and behavior for real-time modeling and anomaly detection | |
US10055559B2 (en) | Security device, methods, and systems for continuous authentication | |
US11217051B2 (en) | System and method for providing credential activation layered security | |
Hayashi et al. | Casa: context-aware scalable authentication | |
Lee et al. | Implicit sensor-based authentication of smartphone users with smartwatch | |
US11184766B1 (en) | Systems and methods for continuous authentication, identity assurance and access control | |
US10440019B2 (en) | Method, computer program, and system for identifying multiple users based on their behavior | |
US12056975B1 (en) | System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score | |
US9552684B2 (en) | Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control | |
US9092605B2 (en) | Ongoing authentication and access control with network access device | |
US20180082304A1 (en) | System for user identification and authentication | |
US10686793B2 (en) | Integrated biometrics for application security | |
US20140283059A1 (en) | Continuous Monitoring of Computer User and Computer Activities | |
Shila et al. | CASTRA: Seamless and unobtrusive authentication of users to diverse mobile services | |
Aramide | AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics | |
US11444953B2 (en) | Methods, systems, apparatuses and devices for facilitating security of a resource using a plurality of credentials | |
EP4016924B1 (en) | Risk-aware access control method and related computer program and device | |
Kurkovsky et al. | Continuous RFID-enabled authentication: Privacy implications | |
Kurkovsky et al. | Approaches and issues in location-aware continuous authentication | |
US11917405B2 (en) | Method and system for authenticating users of mobile communication devices through mobility traces | |
Vaidya et al. | Survey of Multi level Authentication for improving the Privacy Preservation and Security | |
Navya et al. | File access control for multiple user system using Computer Vision | |
Shetty et al. | A GAIT-Based Three-Level Authentication System for Enhanced Cybersecurity |