[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Berbecaru, 2011 - Google Patents

LRAP: A location-based remote client authentication protocol for mobile environments

Berbecaru, 2011

Document ID
14588908669168656135
Author
Berbecaru D
Publication year
Publication venue
2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing

External Links

Snippet

Mobile networks are driven by the need to provide more advanced services to mobile or nomadic computing devices, such as security services requiring remote client authentication. In such services, the user's location might be used as authentication factor, in …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Similar Documents

Publication Publication Date Title
Zhang et al. Location-based authentication and authorization using smart phones
EP2127300B1 (en) Method and apparatus for securing location information and access control using the location information
Hsieh et al. Design of a time and location based One-Time Password authentication scheme
US11785449B2 (en) Secure on-demand ultra-wideband communication channels systems and methods
AU2009305365A1 (en) Multifactor authentication
CN104106277A (en) Enabling secure access to discovered location server for mobile device
CN102088353A (en) Two-factor authentication method and system based on mobile terminal
Berbecaru LRAP: A location-based remote client authentication protocol for mobile environments
Kuseler et al. Using geographical location as an authentication factor to enhance mCommerce applications on smartphones
Wullems et al. Enhancing the security of internet applications using location: A new model for tamper-resistant GSM location
Ahamad et al. A biometric based secure mobile payment framework
US20220147986A1 (en) Method and system for single purpose public keys for public ledgers
US20140019366A1 (en) Method and a system for securing financial transaction
Tafti et al. A new NFC mobile payment protocol using improved GSM based authentication
Park et al. Leveraging cellular infrastructure to improve fraud prevention
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Cobourne et al. Using the smart card web server in secure branchless banking
Jurcut et al. A novel authentication mechanism for mobile satellite communication systems
Zhang Secure mobile service-oriented architecture
Nisar Location based authentication service using 4G/5G Devices
Yu et al. AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials
Panjwani Practical receipt authentication for branchless banking
Lami et al. LocBiometrics: Mobile phone based multifactor biometric authentication with time and location assurance
Hemamalini et al. Credit card forgery identification system with location based tracking using mobiles with GPS
Kuseler et al. Privacy preserving, real-time and location secured biometrics for mCommerce authentication