Arvaree, 2024 - Google Patents
Security Reinforcement: An Overview of Multilevel Authentication TechniquesArvaree, 2024
- Document ID
- 17163080935764653074
- Author
- Arvaree T
- Publication year
- Publication venue
- International Journal of Advanced Networking and Applications
External Links
Snippet
Authentication mechanisms play a critical role in safeguarding against unauthorized access in today's mobile operating systems. This paper presents a comprehensive review of existing authentication methods tailored for mobile devices, aiming to elucidate their …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parmar et al. | A comprehensive study on passwordless authentication | |
EP3824592B1 (en) | Public-private key pair protected password manager | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
US7073067B2 (en) | Authentication system and method based upon random partial digitized path recognition | |
US8478990B2 (en) | Mobile transaction methods and devices with three-dimensional colorgram tokens | |
US7644433B2 (en) | Authentication system and method based upon random partial pattern recognition | |
US12184798B2 (en) | Dynamic value appended to cookie data for fraud detection and step-up authentication | |
Stanislav | Two-factor authentication | |
Izadeen et al. | Smart android graphical password strategy: A review | |
Iyanda et al. | Development of two-factor authentication login system using dynamic password with SMS verification | |
Abiodun et al. | Securing digital transaction using a three-level authentication system | |
Boonkrong | Multi-factor authentication | |
Joshi et al. | Authentication using text and graphical password | |
US20160021102A1 (en) | Method and device for authenticating persons | |
Arvaree | Security Reinforcement: An Overview of Multilevel Authentication Techniques | |
Seksak et al. | Choice-Based Graphical Password (CGP) Scheme for web applications | |
Bhardwaj et al. | Wearable Security-Authentication using Smartwatches | |
Gayathri et al. | Progression Towards a Safer and Private Authorization for Business Entities: Fire OAuth | |
Gupta et al. | Two-Factor Authentication Using QR Code and OTP | |
Oudina et al. | Improving Resource Security by Integrating Authentication and Cryptography | |
MALAU et al. | Review of text based password and other authentication methods for e-commerce data protection | |
Egwuche et al. | Assessing the Vulnerabilities of Internet Users to Cyber-Attacks using their Password Login Patterns | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
Saini | Comparative analysis of top 5, 2-factor authentication solutions | |
Kreshan | THREE-FACTOR AUTHENTICATION USING SMART PHONE |