Merlin et al., 2019 - Google Patents
Anticipated Security Model for Session Transfer and Services Using OTPMerlin et al., 2019
View PDF- Document ID
- 16936301916552245268
- Author
- Merlin J
- Prathipa A
- Ramyadevi G
- Radhika P
- Publication year
External Links
Snippet
Internet security is a branch of computer sciences often involving browser security, network security, applications and operating systems to keep the internet as a secure channel to exchange information by reducing the risk and attacks. There are a number of studies that …
- 230000003466 anti-cipated 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11368490B2 (en) | Distributed cloud-based security systems and methods | |
US20220156369A1 (en) | Method and system of monitoring and controlling exfiltration of enterprise data on cloud | |
US7926089B2 (en) | Router for managing trust relationships | |
US7934253B2 (en) | System and method of securing web applications across an enterprise | |
US20120180120A1 (en) | System for data leak prevention from networks using context sensitive firewall | |
US9787635B1 (en) | Identifying external user names and enforcing policies | |
US20080034424A1 (en) | System and method of preventing web applications threats | |
Chanti et al. | A literature review on classification of phishing attacks | |
Hasan et al. | Towards a threat model and security analysis of video conferencing systems | |
US12003537B2 (en) | Mitigating phishing attempts | |
US9003186B2 (en) | HTTP authentication and authorization management | |
EP2311218B1 (en) | Http authentication and authorization management | |
US8656462B2 (en) | HTTP authentication and authorization management | |
Merlin et al. | Anticipated Security Model for Session Transfer and Services Using OTP | |
Thamizhiniyal | Probable Defense Representation for Session Transfer and Network Services Using OTP | |
Bixenstine | Employment Law Implications of a Remote Workplace. | |
US12294605B2 (en) | Providing identity protection | |
Vrakas et al. | Privacy requirements engineering for trustworthy e-government services | |
Gupta et al. | Information security and cloud computing | |
Riyaj et al. | A Survey On Blocking Hacking Users In Cloud Network Using Ticket Based Security Manager | |
Motawie et al. | Addressing Security Issues in Cloud Computing |