[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kuvonchbek, 2022 - Google Patents

Method Authentication of Objects Information Communication

Kuvonchbek, 2022

Document ID
1067123987744111042
Author
Kuvonchbek R
Publication year
Publication venue
International Conference on Next Generation Wired/Wireless Networking

External Links

Snippet

In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Volety et al. Cracking Bitcoin wallets: I want what you have in the wallets
Macedo et al. On the security aspects of Internet of Things: A systematic literature review
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
Wu et al. Session‐Based Webshell Detection Using Machine Learning in Web Logs
Kuvonchbek Method Authentication of Objects Information Communication
CN113709181A (en) Website login method, device, equipment and storage medium based on browser plug-in
Sarkar et al. Password strength analysis and its classification by applying machine learning based techniques
SE540649C2 (en) Method and system for secure password storage
Gadde et al. Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.
Fatima et al. A novel text-based user authentication scheme using pseudo-dynamic password
Inani et al. A machine learning algorithm TSF k-Nn based on automated data classification for securing mobile cloud computing model
Verma et al. A novel model to enhance the data security in cloud environment
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
Mihailescu et al. Three-factor authentication scheme based on searchable encryption and biometric fingerprint
Huang et al. Encrypted speech retrieval based on long sequence Biohashing
Usmani et al. New text-based user authentication scheme using CAPTCHA
Qiu et al. Covering the Monitoring Network: A Unified Framework to Protect E‐Commerce Security
Shannaq et al. Advancing user classification models: A comparative analysis of machine learning approaches to enhance faculty password policies at the University of Buraimi
Ahmed et al. Energetic data security management scheme using hybrid encryption algorithm over cloud environment
XIONG et al. Searchable Encryption Scheme for Large Data Sets in Cloud Storage Environment.
Bhavyasree et al. Public auditing to provide privacy preservation of cloud data using ring signatures
Abdullah et al. Smart Card Security Model Based on Sensitive Information
Prathima et al. Imposter detection with canvas and WebGL using Machine learning.
Ranadive et al. Secure File Storage on Cloud Computing Using Cryptographic Algorithm
Kuvonchbek Method authentication of objects information communication based on blockchain technology