[go: up one dir, main page]

Ramya et al., 2014 - Google Patents

Personalized authentication procedure for restricted web service access in mobile phones

Ramya et al., 2014

View PDF
Document ID
3626293671989394914
Author
Ramya T
Malathi S
Pratheeksha G
Kumar V
Publication year
Publication venue
The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)

External Links

Snippet

Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection

Similar Documents

Publication Publication Date Title
US11983964B2 (en) Liveness detection
JP7636476B2 (en) Advanced authentication technology and its applications
JP7346426B2 (en) System and method for binding verifiable claims
JP2025041684A (en) Secure Key Storage Extensions for Transaction Verification and Cryptocurrencies
KR102577208B1 (en) Authentication techniques including speech and/or lip movement analysis
KR102586749B1 (en) Authentication techniques including speech and/or lip movement analysis
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
US10776464B2 (en) System and method for adaptive application of authentication policies
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
JP2022532677A (en) Identity verification and management system
US8621583B2 (en) Sensor-based authentication to a computer network-based service
US11171951B2 (en) Device interface output based on biometric input orientation and captured proximate data
US20080120507A1 (en) Methods and systems for authentication of a user
US20250132919A1 (en) Decentralized zero-trust identity verification-authentication system and method
US20210217024A1 (en) System and Method of Consolidating Identity Services
Vivaracho-Pascual et al. On the use of mobile phones and biometrics for accessing restricted web services
WO2021244471A1 (en) Real-name authentication method and device
Toli et al. A survey on multimodal biometrics and the protection of their templates
Ramya et al. Personalized authentication procedure for restricted web service access in mobile phones
Podio et al. Biometric authentication technology: From the movies to your desktop
Adesuyi et al. Secure authentication for mobile banking using facial recognition
Chetalam Enhancing Security of MPesa Transactions by Use of Voice Biometrics
Hintze et al. CORMORANT: On implementing risk-aware multi-modal biometric cross-device authentication for Android
Lupu et al. Fingerprints used for security enhancement of online banking authentication process