[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lai, 2011 - Google Patents

Intelligent online risk-based authentication using Bayesian network model

Lai, 2011

View PDF
Document ID
14641834225639790468
Author
Lai D
Publication year

External Links

Snippet

Risk-based authentication is an increasingly popular component in the security architecture deployed by many organizations in mitigating online identity threat. Risk-based authentication uses contextual and historical information extracted from online …
Continue reading at dspace.library.uvic.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Similar Documents

Publication Publication Date Title
Traore et al. Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments
US12326924B1 (en) Behavioral profiling method and system to authenticate a user
US12058135B2 (en) System and method for unauthorized activity detection
Ahmed et al. Biometric recognition based on free-text keystroke dynamics
Chu et al. Blog or block: Detecting blog bots through behavioral biometrics
US20130263240A1 (en) Method for authentication and verification of user identity
Traore et al. Online risk-based authentication using behavioral biometrics
Bours et al. Continuous authentication with keystroke dynamics
Serwadda et al. Toward robotic robbery on the touch screen
Mahadi et al. A survey of machine learning techniques for behavioral-based biometric user authentication
Solano et al. Risk-based static authentication in web applications with behavioral biometrics and session context analytics
Alshanketi et al. Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords
Eddermoug et al. KLM-based profiling and preventing security attacks for cloud computing: A comparative study
Shannaq et al. Enhancing security with multi-factor user behavior identification via longest common subsequence analysis
Yang et al. TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
Grzenda et al. Evaluation of machine learning methods for impostor detection in web applications
Wahab et al. Securing account recovery mechanism on desktop computers and mobile phones with keystroke dynamics
Pramila et al. A survey on adaptive authentication using machine learning techniques
Abo‐alian et al. Keystroke dynamics‐based user authentication service for cloud computing
Shannaq et al. Enhancing Security through Multi-Factor User Behavior Identification: Moving Beyond the Use of the Longest Common Subsequence (LCS)
Al-Rumaim et al. Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm
Obaidat et al. Advances in key stroke dynamics-based security schemes
Lai Intelligent online risk-based authentication using Bayesian network model
Gupta User attribution in digital forensics through modeling keystroke and mouse usage data using xgboost
Abo-Alian et al. Authentication as a service for cloud computing