Lai, 2011 - Google Patents
Intelligent online risk-based authentication using Bayesian network modelLai, 2011
View PDF- Document ID
- 14641834225639790468
- Author
- Lai D
- Publication year
External Links
Snippet
Risk-based authentication is an increasingly popular component in the security architecture deployed by many organizations in mitigating online identity threat. Risk-based authentication uses contextual and historical information extracted from online …
- 238000011156 evaluation 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Traore et al. | Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments | |
US12326924B1 (en) | Behavioral profiling method and system to authenticate a user | |
US12058135B2 (en) | System and method for unauthorized activity detection | |
Ahmed et al. | Biometric recognition based on free-text keystroke dynamics | |
Chu et al. | Blog or block: Detecting blog bots through behavioral biometrics | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
Traore et al. | Online risk-based authentication using behavioral biometrics | |
Bours et al. | Continuous authentication with keystroke dynamics | |
Serwadda et al. | Toward robotic robbery on the touch screen | |
Mahadi et al. | A survey of machine learning techniques for behavioral-based biometric user authentication | |
Solano et al. | Risk-based static authentication in web applications with behavioral biometrics and session context analytics | |
Alshanketi et al. | Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords | |
Eddermoug et al. | KLM-based profiling and preventing security attacks for cloud computing: A comparative study | |
Shannaq et al. | Enhancing security with multi-factor user behavior identification via longest common subsequence analysis | |
Yang et al. | TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings | |
Grzenda et al. | Evaluation of machine learning methods for impostor detection in web applications | |
Wahab et al. | Securing account recovery mechanism on desktop computers and mobile phones with keystroke dynamics | |
Pramila et al. | A survey on adaptive authentication using machine learning techniques | |
Abo‐alian et al. | Keystroke dynamics‐based user authentication service for cloud computing | |
Shannaq et al. | Enhancing Security through Multi-Factor User Behavior Identification: Moving Beyond the Use of the Longest Common Subsequence (LCS) | |
Al-Rumaim et al. | Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm | |
Obaidat et al. | Advances in key stroke dynamics-based security schemes | |
Lai | Intelligent online risk-based authentication using Bayesian network model | |
Gupta | User attribution in digital forensics through modeling keystroke and mouse usage data using xgboost | |
Abo-Alian et al. | Authentication as a service for cloud computing |