Ramya et al., 2014 - Google Patents
Personalized authentication procedure for restricted web service access in mobile phonesRamya et al., 2014
View PDF- Document ID
- 3626293671989394914
- Author
- Ramya T
- Malathi S
- Pratheeksha G
- Kumar V
- Publication year
- Publication venue
- The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)
External Links
Snippet
Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the …
- 238000000034 method 0 title abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11983964B2 (en) | Liveness detection | |
JP7636476B2 (en) | Advanced authentication technology and its applications | |
JP7346426B2 (en) | System and method for binding verifiable claims | |
JP2025041684A (en) | Secure Key Storage Extensions for Transaction Verification and Cryptocurrencies | |
KR102577208B1 (en) | Authentication techniques including speech and/or lip movement analysis | |
KR102586749B1 (en) | Authentication techniques including speech and/or lip movement analysis | |
Gupta et al. | Demystifying authentication concepts in smartphones: Ways and types to secure access | |
CN108804884B (en) | Identity authentication method, identity authentication device and computer storage medium | |
US10776464B2 (en) | System and method for adaptive application of authentication policies | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
JP2022532677A (en) | Identity verification and management system | |
US8621583B2 (en) | Sensor-based authentication to a computer network-based service | |
US11171951B2 (en) | Device interface output based on biometric input orientation and captured proximate data | |
US20080120507A1 (en) | Methods and systems for authentication of a user | |
US20250132919A1 (en) | Decentralized zero-trust identity verification-authentication system and method | |
US20210217024A1 (en) | System and Method of Consolidating Identity Services | |
Vivaracho-Pascual et al. | On the use of mobile phones and biometrics for accessing restricted web services | |
WO2021244471A1 (en) | Real-name authentication method and device | |
Toli et al. | A survey on multimodal biometrics and the protection of their templates | |
Ramya et al. | Personalized authentication procedure for restricted web service access in mobile phones | |
Podio et al. | Biometric authentication technology: From the movies to your desktop | |
Adesuyi et al. | Secure authentication for mobile banking using facial recognition | |
Chetalam | Enhancing Security of MPesa Transactions by Use of Voice Biometrics | |
Hintze et al. | CORMORANT: On implementing risk-aware multi-modal biometric cross-device authentication for Android | |
Lupu et al. | Fingerprints used for security enhancement of online banking authentication process |