Sinno et al., 2020 - Google Patents
How biometrics can save companies from 'fire and forget'Sinno et al., 2020
- Document ID
- 10938715400147520038
- Author
- Sinno S
- Hawley C
- Publication year
- Publication venue
- Biometric Technology Today
External Links
Snippet
A few years ago, the media reported on the now notorious case of 'Bob', a star programmer who was earning a six-figure salary at an American infrastructure company. When the company commissioned a network-security audit, however, they belatedly discovered that …
- 230000003542 behavioural 0 description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/466—Transaction processing
- G06F9/467—Transactional memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2019206006B2 (en) | System and method for biometric protocol standards | |
US11038896B2 (en) | Adaptive multi-factor authentication system with multi-user permission strategy to access sensitive information | |
JP6046765B2 (en) | System and method enabling multi-party and multi-level authorization to access confidential information | |
US11810130B2 (en) | Security policy enforcement | |
Al Abdulwahid et al. | Continuous and transparent multimodal authentication: reviewing the state of the art | |
US20040083394A1 (en) | Dynamic user authentication | |
JP2010518493A (en) | Method and system for dynamically controlling access to a network | |
KR20230003146A (en) | Application-specific security | |
Olanrewaju et al. | A frictionless and secure user authentication in web-based premium applications | |
Mustafić et al. | Behavioral biometrics for persistent single sign-on | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
Sasada et al. | Web-biometrics for user authenticity verification in zero trust access control | |
Sinno et al. | How biometrics can save companies from ‘fire and forget’ | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Arohan et al. | An introduction to context-aware security and user entity behavior analytics | |
CN117597696A (en) | Machine learning computer system architecture | |
Suokas | Privileged Accounts Protection with Multi-factor Authentication | |
CN117914601B (en) | Multistage safety authentication and access control system of file robot | |
US20250247234A1 (en) | Systems and methods for scheduling actions in remote networking environments while minimizing exposure of secured access credentials | |
Rawal et al. | Manage the Identification and Authentication of People, Devices, and Services | |
Ahmad et al. | Enhancing the Authentication Mechanism of Social Media Websites using Face Detection | |
Schaffer | Ontology for authentication | |
Korolov | What is biometrics: and why collecting biometric data is risky | |
Vishnoi | Authentication Attacks | |
Tonape et al. | Result Paper on Implementing Secure Authentication in Node. js for Web Applications |