[go: up one dir, main page]

Shetty, 2018 - Google Patents

SecureKey Company Overview (2018)

Shetty, 2018

Document ID
2520581865361577503
Author
Shetty S
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
Shetty SecureKey Company Overview (2018)
Moore De Rigo Rem Data Security Incident Notification
田邉美穂 Digital ID in Japan: My Number Card and the Path to Digital Transformation
Atherton The Enduring Risks of Biometric Identification Systems
Finn Readerlink Data Breach Notification
Laidley et al. Welfare in Canada, 2019: An Overview of Income Support Programs
田邉美穂 Digital Identity in the Digital Age: The Role and Challenges of My Number in Japan
Bond Trump's Second Term: Challenges and Strategies for Europe
Santiago Cybersecurity, Hacks, and National Strategies: An Interview with Herb Lin
Hartman et al. Thermo Fisher Scientific Data Security Incident Notification
Winter LINZ Interim Guideline: Authority, Identity, and Electronic Signing During COVID-19
Locke MSD Response to OIA Request on Rent Arrears and Rent in Advance Assistance
John et al. Small Retirement Accounts: Issues and Policy Options
Wiener EPIC Comments on NIST's FIPS 201-3 (Personal Identity Verification)
Iussa Wollongong City Council's Response to 2020 Auditor General's Report on Procurement Management
Dilenno et al. Absher Construction Company Data Breach Notification
Ward et al. Second Amendment to Master Services Agreement between Texas DIR and AT&T Corp.
Hillerstrom Responding to Power of Attorney and Court-Appointed Administrator Requests: Industry Guidelines
Toplisek Jehovah's Witnesses Religious Freedom Issues in Kyrgyzstan (2019)
Pranata et al. Big Data Surveillance System for Peer-to-Peer Lending Fintech Using Google Play Reviews
Richardson The Economics of Australia's Creative Arts Sector
Gillespie et al. Amendment 2: Renewal of Cloud Solutions Agreement
Jouste Tax Compliance of Small Enterprises in Uganda: Impact of TREP and E-filing
Ecker Housing Forum on Evidence-Based Practices: Screening and Assessment Tools
Gustafsson Chinese Aid to Africa: Distinguishing Features and Local Socio-Political Effects