Kuvonchbek, 2022 - Google Patents
Method Authentication of Objects Information CommunicationKuvonchbek, 2022
- Document ID
- 1067123987744111042
- Author
- Kuvonchbek R
- Publication year
- Publication venue
- International Conference on Next Generation Wired/Wireless Networking
External Links
Snippet
In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Volety et al. | Cracking Bitcoin wallets: I want what you have in the wallets | |
Macedo et al. | On the security aspects of Internet of Things: A systematic literature review | |
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
Wu et al. | Session‐Based Webshell Detection Using Machine Learning in Web Logs | |
Kuvonchbek | Method Authentication of Objects Information Communication | |
CN113709181A (en) | Website login method, device, equipment and storage medium based on browser plug-in | |
Sarkar et al. | Password strength analysis and its classification by applying machine learning based techniques | |
SE540649C2 (en) | Method and system for secure password storage | |
Gadde et al. | Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions. | |
Fatima et al. | A novel text-based user authentication scheme using pseudo-dynamic password | |
Inani et al. | A machine learning algorithm TSF k-Nn based on automated data classification for securing mobile cloud computing model | |
Verma et al. | A novel model to enhance the data security in cloud environment | |
CN116055067B (en) | Weak password detection method, device, electronic equipment and medium | |
Mihailescu et al. | Three-factor authentication scheme based on searchable encryption and biometric fingerprint | |
Huang et al. | Encrypted speech retrieval based on long sequence Biohashing | |
Usmani et al. | New text-based user authentication scheme using CAPTCHA | |
Qiu et al. | Covering the Monitoring Network: A Unified Framework to Protect E‐Commerce Security | |
Shannaq et al. | Advancing user classification models: A comparative analysis of machine learning approaches to enhance faculty password policies at the University of Buraimi | |
Ahmed et al. | Energetic data security management scheme using hybrid encryption algorithm over cloud environment | |
XIONG et al. | Searchable Encryption Scheme for Large Data Sets in Cloud Storage Environment. | |
Bhavyasree et al. | Public auditing to provide privacy preservation of cloud data using ring signatures | |
Abdullah et al. | Smart Card Security Model Based on Sensitive Information | |
Prathima et al. | Imposter detection with canvas and WebGL using Machine learning. | |
Ranadive et al. | Secure File Storage on Cloud Computing Using Cryptographic Algorithm | |
Kuvonchbek | Method authentication of objects information communication based on blockchain technology |