Patil et al., 2021 - Google Patents
An analytical survey for improving authentication levels in cloud computingPatil et al., 2021
- Document ID
- 15278718271412319989
- Author
- Patil D
- Mahajan N
- Publication year
- Publication venue
- 2021 international conference on advance computing and innovative technologies in engineering (ICACITE)
External Links
Snippet
Cloud Computing is an on-demand network. Cloud computing is an excellent favourable and quickly developing technology. In this type of network, you can access your data at anytime, anywhere if you are an authentic user of Cloud Computing. To store data on cloud …
- 238000005516 engineering process 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
- G07D7/12—Visible light, infra-red or ultra violet radiation
- G07D7/128—Viewing devices
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/20—Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
- G07D7/2025—Pattern matching
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/0046—Security markings invisible to the naked eye, e.g. "digital watermarks"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ibrokhimov et al. | Multi-factor authentication in cyber physical system: A state of art survey | |
CN112769826B (en) | Information processing method, device, equipment and storage medium | |
JP2013508854A (en) | Authentication using cloud authentication | |
CN116578962A (en) | Identity verification method, device and equipment | |
US8370908B2 (en) | Decreasing login latency | |
Patil et al. | An analytical survey for improving authentication levels in cloud computing | |
Archana et al. | Survey on usable and secure two-factor authentication | |
CN113347206A (en) | Network access method and device | |
CN111355726A (en) | Identity authorization login method and device, electronic equipment and storage medium | |
Singh et al. | A secure multi-tier authentication scheme in cloud computing environment | |
CN111404859A (en) | A client authentication method, apparatus and computer-readable storage medium | |
CN113572763B (en) | Data processing method and device, electronic equipment and storage medium | |
KR20120087095A (en) | Apparatus and method for generating a realtime password and storage medium | |
US11528134B2 (en) | Authentication using transformation verification | |
Dinesha et al. | Multi-dimensional password generation technique for accessing cloud services | |
US20220263818A1 (en) | Using a service worker to present a third-party cryptographic credential | |
Hussain et al. | Secure password transmission for web applications over internet using cryptography and image steganography | |
Malathi et al. | Achieving privacy and security using QR code by means of encryption technique in ATM | |
Liu et al. | A digital memories based user authentication scheme with privacy preservation | |
Popescu et al. | An hybrid text-image based authentication for cloud services | |
CN114201740A (en) | Login method, login device, electronic equipment and storage medium | |
CN114268438A (en) | Multi-party collaborative signature method and device, computer equipment and storage medium | |
Khimani et al. | A novel model for security and data access for jointly accessing the cloud service | |
He et al. | On the security of an authentication scheme for multi-server architecture | |
Pete et al. | A novel approach for verifying selective user identity attributes online using open banking APIs |