Shetty, 2018 - Google Patents
SecureKey Company Overview (2018)Shetty, 2018
- Document ID
- 2520581865361577503
- Author
- Shetty S
- Publication year
External Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0861—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shetty | SecureKey Company Overview (2018) | |
Moore | De Rigo Rem Data Security Incident Notification | |
田邉美穂 | Digital ID in Japan: My Number Card and the Path to Digital Transformation | |
Atherton | The Enduring Risks of Biometric Identification Systems | |
Finn | Readerlink Data Breach Notification | |
Laidley et al. | Welfare in Canada, 2019: An Overview of Income Support Programs | |
田邉美穂 | Digital Identity in the Digital Age: The Role and Challenges of My Number in Japan | |
Bond | Trump's Second Term: Challenges and Strategies for Europe | |
Santiago | Cybersecurity, Hacks, and National Strategies: An Interview with Herb Lin | |
Hartman et al. | Thermo Fisher Scientific Data Security Incident Notification | |
Winter | LINZ Interim Guideline: Authority, Identity, and Electronic Signing During COVID-19 | |
Locke | MSD Response to OIA Request on Rent Arrears and Rent in Advance Assistance | |
John et al. | Small Retirement Accounts: Issues and Policy Options | |
Wiener | EPIC Comments on NIST's FIPS 201-3 (Personal Identity Verification) | |
Iussa | Wollongong City Council's Response to 2020 Auditor General's Report on Procurement Management | |
Dilenno et al. | Absher Construction Company Data Breach Notification | |
Ward et al. | Second Amendment to Master Services Agreement between Texas DIR and AT&T Corp. | |
Hillerstrom | Responding to Power of Attorney and Court-Appointed Administrator Requests: Industry Guidelines | |
Toplisek | Jehovah's Witnesses Religious Freedom Issues in Kyrgyzstan (2019) | |
Pranata et al. | Big Data Surveillance System for Peer-to-Peer Lending Fintech Using Google Play Reviews | |
Richardson | The Economics of Australia's Creative Arts Sector | |
Gillespie et al. | Amendment 2: Renewal of Cloud Solutions Agreement | |
Jouste | Tax Compliance of Small Enterprises in Uganda: Impact of TREP and E-filing | |
Ecker | Housing Forum on Evidence-Based Practices: Screening and Assessment Tools | |
Gustafsson | Chinese Aid to Africa: Distinguishing Features and Local Socio-Political Effects |