[go: up one dir, main page]

Kizza, 2024 - Google Patents

Authentication

Kizza, 2024

Document ID
17659117688175171433
Author
Kizza J
Publication year
Publication venue
Guide to Computer Network Security

External Links

Snippet

Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is, in fact, who or what it is declared to be. In private and public computing systems, for example …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Parmar et al. A comprehensive study on passwordless authentication
US11770261B2 (en) Digital credentials for user device authentication
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
Burr et al. Electronic Authentication
US11792180B2 (en) Digital credentials for visitor network access
Todorov Mechanics of user identification and authentication: Fundamentals of identity management
JP2009541817A (en) Single sign-on between systems
JP2005532736A (en) Biometric private key infrastructure
Kizza Authentication
WO2008156772A1 (en) Token-based system and method for secure authentication to a service provider
Boonkrong Multi-factor authentication
KR20200016506A (en) Method for Establishing Anonymous Digital Identity
Razumov et al. Ensuring the security of web applications operating on the basis of the SSL/TLS protocol
Bilal et al. Evaluation of secure OpenID-based RAAA user authentication protocol for preventing specific Web attacks in Web apps
JP2010505334A (en) System and method for facilitating secure online transactions
Burr et al. Sp 800-63-1. electronic authentication guideline
Abubakar-Sadiq Establishing secure and privacy preserving digital identity with self-sovereign identity
Abbas et al. Identifying an OpenID anti‐phishing scheme for cyberspace
Goswami et al. A replay attack resilient system for PKI based authentication in challenge-response mode for online application
Jeyanthi A review of modern authentication methods in digital systems
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Guel A framework for choosing your next generation authentication/authorization system
Form Content
Halonen Authentication and authorization in mobile environment
Khodabacchus et al. Secured SAML cloud authentication using fingerprint