Yohan et al., 2016 - Google Patents
Dynamic multi-factor authentication for smartphoneYohan et al., 2016
- Document ID
- 1970251599711084326
- Author
- Yohan A
- Lo N
- Lie H
- Publication year
- Publication venue
- 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
External Links
Snippet
Nowadays, smartphone has become a vital tool for both productivity and entertainment that most people can't live without it. Due to the widespread usage of smartphone for both personal and professional purposes, many people consider them as private property. This …
- 238000000034 method 0 description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11101993B1 (en) | Authentication and authorization through derived behavioral credentials using secured paired communication devices | |
| Shah et al. | Recent trends in user authentication–a survey | |
| US12056975B1 (en) | System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score | |
| US10440019B2 (en) | Method, computer program, and system for identifying multiple users based on their behavior | |
| CN107077552B (en) | Distribute biometric authentication among devices in an ad hoc network | |
| Gupta et al. | Demystifying authentication concepts in smartphones: Ways and types to secure access | |
| US9465930B2 (en) | Fingerprint gestures | |
| US10776464B2 (en) | System and method for adaptive application of authentication policies | |
| Al Abdulwahid et al. | Continuous and transparent multimodal authentication: reviewing the state of the art | |
| US9552472B2 (en) | Associating distinct security modes with distinct wireless authenticators | |
| WO2019140528A1 (en) | Live user authentication device, system and method | |
| US10185816B2 (en) | Controlling user access to electronic resources without password | |
| CN112491783B (en) | User authentication confidence based on multiple devices | |
| WO2016177671A1 (en) | Using a secondary mobile device to identify a trusted environment | |
| US11997085B2 (en) | Complex user authentication factor integrating a sequence of fingerprints and a personal identification number | |
| US20120311695A1 (en) | Method and apparatus for dynamic modification of authentication requirements of a processing system | |
| Yıldırım et al. | Android based mobile application development for web login authentication using fingerprint recognition feature | |
| Mostakim et al. | Smart locker: IoT based intelligent locker with password protection and face detection approach | |
| Li et al. | Secure UHF RFID authentication with smart devices | |
| Bissada et al. | Mobile multi-factor authentication | |
| US11334658B2 (en) | Systems and methods for cloud-based continuous multifactor authentication | |
| Yohan et al. | Dynamic multi-factor authentication for smartphone | |
| Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
| Papaioannou et al. | Behavioral biometrics for mobile user authentication: benefits and limitations | |
| KR101219957B1 (en) | Authentication method, device and system using biometrics and recording medium for the same |