[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Patil et al., 2021 - Google Patents

An analytical survey for improving authentication levels in cloud computing

Patil et al., 2021

Document ID
15278718271412319989
Author
Patil D
Mahajan N
Publication year
Publication venue
2021 international conference on advance computing and innovative technologies in engineering (ICACITE)

External Links

Snippet

Cloud Computing is an on-demand network. Cloud computing is an excellent favourable and quickly developing technology. In this type of network, you can access your data at anytime, anywhere if you are an authentic user of Cloud Computing. To store data on cloud …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
    • G07D7/12Visible light, infra-red or ultra violet radiation
    • G07D7/128Viewing devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/20Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
    • G07D7/2025Pattern matching
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/0046Security markings invisible to the naked eye, e.g. "digital watermarks"
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means

Similar Documents

Publication Publication Date Title
Ibrokhimov et al. Multi-factor authentication in cyber physical system: A state of art survey
CN112769826B (en) Information processing method, device, equipment and storage medium
JP2013508854A (en) Authentication using cloud authentication
CN116578962A (en) Identity verification method, device and equipment
US8370908B2 (en) Decreasing login latency
Patil et al. An analytical survey for improving authentication levels in cloud computing
Archana et al. Survey on usable and secure two-factor authentication
CN113347206A (en) Network access method and device
CN111355726A (en) Identity authorization login method and device, electronic equipment and storage medium
Singh et al. A secure multi-tier authentication scheme in cloud computing environment
CN111404859A (en) A client authentication method, apparatus and computer-readable storage medium
CN113572763B (en) Data processing method and device, electronic equipment and storage medium
KR20120087095A (en) Apparatus and method for generating a realtime password and storage medium
US11528134B2 (en) Authentication using transformation verification
Dinesha et al. Multi-dimensional password generation technique for accessing cloud services
US20220263818A1 (en) Using a service worker to present a third-party cryptographic credential
Hussain et al. Secure password transmission for web applications over internet using cryptography and image steganography
Malathi et al. Achieving privacy and security using QR code by means of encryption technique in ATM
Liu et al. A digital memories based user authentication scheme with privacy preservation
Popescu et al. An hybrid text-image based authentication for cloud services
CN114201740A (en) Login method, login device, electronic equipment and storage medium
CN114268438A (en) Multi-party collaborative signature method and device, computer equipment and storage medium
Khimani et al. A novel model for security and data access for jointly accessing the cloud service
He et al. On the security of an authentication scheme for multi-server architecture
Pete et al. A novel approach for verifying selective user identity attributes online using open banking APIs