[go: up one dir, main page]

Shemshi et al., 2019 - Google Patents

RISKS OF ELECTRONIC IDENTITY IN EDUCATION, BY USING TWO PROTOCOLS: OPEN ID CONNECT AND SAML PROTOCOLS

Shemshi et al., 2019

View PDF
Document ID
10085927466417025801
Author
Shemshi V
Idrizi F
Shemshi Q
Publication year
Publication venue
Journal of Natural Sciences and Mathematics of UT

External Links

Snippet

In recent years, due to the development of technology and the intense use of computers and other electronic devices, the internet has become a very important aspect of human society. The participation of social media has enabled individuals to identify themselves in wider …
Continue reading at eprints.unite.edu.mk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Similar Documents

Publication Publication Date Title
US10110584B1 (en) Elevating trust in user identity during RESTful authentication and authorization
US10652282B2 (en) Brokered authentication with risk sharing
EP3073671B1 (en) System and method enabling multiparty and multi level authorizations for accessing confidential information
CN106063219B (en) System and method for biometric protocol standards
US11012233B1 (en) Method for providing authentication service by using decentralized identity and server using the same
US20120254935A1 (en) Authentication collaboration system and authentication collaboration method
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
US20090260072A1 (en) Identity ownership migration
CN113542288A (en) Service authorization method, device, equipment and system
US11233776B1 (en) Providing content including sensitive data
Bakar et al. Adaptive authentication based on analysis of user behavior
US20250054087A1 (en) Apparatus and method for identity verification in a computer network with multiple enterprise participants
CN118118227A (en) Unified identity authentication method and device
Iyanda et al. Development of two-factor authentication login system using dynamic password with SMS verification
Mustafić et al. Behavioral biometrics for persistent single sign-on
JP2012118833A (en) Access control method
Bang et al. Design of personal data protection decentralized model using blockchain and IPFS
Deng et al. Towards a cross‐context identity management framework in e‐health
Popescu et al. An hybrid text-image based authentication for cloud services
Shemshi et al. RISKS OF ELECTRONIC IDENTITY IN EDUCATION, BY USING TWO PROTOCOLS: OPEN ID CONNECT AND SAML PROTOCOLS
Leitner et al. Authentication in the context of E-participation: current practice, challenges and recommendations
US10491391B1 (en) Feedback-based data security
Othman et al. The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol
Rawal et al. Manage the Identification and Authentication of People, Devices, and Services
Alghawli Analysis of Authentication Methods and Secure Web Application Realization With an Integrated Authentication System