[go: up one dir, main page]

Yohan et al., 2016 - Google Patents

Dynamic multi-factor authentication for smartphone

Yohan et al., 2016

Document ID
1970251599711084326
Author
Yohan A
Lo N
Lie H
Publication year
Publication venue
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)

External Links

Snippet

Nowadays, smartphone has become a vital tool for both productivity and entertainment that most people can't live without it. Due to the widespread usage of smartphone for both personal and professional purposes, many people consider them as private property. This …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal

Similar Documents

Publication Publication Date Title
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
Shah et al. Recent trends in user authentication–a survey
US12056975B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
US10440019B2 (en) Method, computer program, and system for identifying multiple users based on their behavior
CN107077552B (en) Distribute biometric authentication among devices in an ad hoc network
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
US9465930B2 (en) Fingerprint gestures
US10776464B2 (en) System and method for adaptive application of authentication policies
Al Abdulwahid et al. Continuous and transparent multimodal authentication: reviewing the state of the art
US9552472B2 (en) Associating distinct security modes with distinct wireless authenticators
WO2019140528A1 (en) Live user authentication device, system and method
US10185816B2 (en) Controlling user access to electronic resources without password
CN112491783B (en) User authentication confidence based on multiple devices
WO2016177671A1 (en) Using a secondary mobile device to identify a trusted environment
US11997085B2 (en) Complex user authentication factor integrating a sequence of fingerprints and a personal identification number
US20120311695A1 (en) Method and apparatus for dynamic modification of authentication requirements of a processing system
Yıldırım et al. Android based mobile application development for web login authentication using fingerprint recognition feature
Mostakim et al. Smart locker: IoT based intelligent locker with password protection and face detection approach
Li et al. Secure UHF RFID authentication with smart devices
Bissada et al. Mobile multi-factor authentication
US11334658B2 (en) Systems and methods for cloud-based continuous multifactor authentication
Yohan et al. Dynamic multi-factor authentication for smartphone
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
Papaioannou et al. Behavioral biometrics for mobile user authentication: benefits and limitations
KR101219957B1 (en) Authentication method, device and system using biometrics and recording medium for the same