Shemshi et al., 2019 - Google Patents
RISKS OF ELECTRONIC IDENTITY IN EDUCATION, BY USING TWO PROTOCOLS: OPEN ID CONNECT AND SAML PROTOCOLSShemshi et al., 2019
View PDF- Document ID
- 10085927466417025801
- Author
- Shemshi V
- Idrizi F
- Shemshi Q
- Publication year
- Publication venue
- Journal of Natural Sciences and Mathematics of UT
External Links
Snippet
In recent years, due to the development of technology and the intense use of computers and other electronic devices, the internet has become a very important aspect of human society. The participation of social media has enabled individuals to identify themselves in wider …
- 238000005516 engineering process 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10110584B1 (en) | Elevating trust in user identity during RESTful authentication and authorization | |
US10652282B2 (en) | Brokered authentication with risk sharing | |
EP3073671B1 (en) | System and method enabling multiparty and multi level authorizations for accessing confidential information | |
CN106063219B (en) | System and method for biometric protocol standards | |
US11012233B1 (en) | Method for providing authentication service by using decentralized identity and server using the same | |
US20120254935A1 (en) | Authentication collaboration system and authentication collaboration method | |
CN110326251A (en) | The system and method that the general dispersion solution of user is verified using cross validation feature are provided | |
US20090260072A1 (en) | Identity ownership migration | |
CN113542288A (en) | Service authorization method, device, equipment and system | |
US11233776B1 (en) | Providing content including sensitive data | |
Bakar et al. | Adaptive authentication based on analysis of user behavior | |
US20250054087A1 (en) | Apparatus and method for identity verification in a computer network with multiple enterprise participants | |
CN118118227A (en) | Unified identity authentication method and device | |
Iyanda et al. | Development of two-factor authentication login system using dynamic password with SMS verification | |
Mustafić et al. | Behavioral biometrics for persistent single sign-on | |
JP2012118833A (en) | Access control method | |
Bang et al. | Design of personal data protection decentralized model using blockchain and IPFS | |
Deng et al. | Towards a cross‐context identity management framework in e‐health | |
Popescu et al. | An hybrid text-image based authentication for cloud services | |
Shemshi et al. | RISKS OF ELECTRONIC IDENTITY IN EDUCATION, BY USING TWO PROTOCOLS: OPEN ID CONNECT AND SAML PROTOCOLS | |
Leitner et al. | Authentication in the context of E-participation: current practice, challenges and recommendations | |
US10491391B1 (en) | Feedback-based data security | |
Othman et al. | The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol | |
Rawal et al. | Manage the Identification and Authentication of People, Devices, and Services | |
Alghawli | Analysis of Authentication Methods and Secure Web Application Realization With an Integrated Authentication System |