[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wu, 2023 - Google Patents

Authentication in Web Applications

Wu, 2023

View PDF
Document ID
17760010632827228105
Author
Wu I
Publication year

External Links

Snippet

The goal of this thesis is to explore web service authentication methods in the context of modern web applications. As web services continue to be integral components of today's digital landscape, the need for simple but secure authentication is essential. This study aims …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
US11329989B2 (en) Token-based access control and grouping
Li et al. The {Emperor’s} new password manager: Security analysis of web-based password managers
Lodderstedt et al. OAuth 2.0 threat model and security considerations
Fett et al. A comprehensive formal security analysis of OAuth 2.0
US10715514B1 (en) Token-based credential renewal service
Naik et al. Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
US10673862B1 (en) Token-based access tracking and revocation
Fett et al. Spresso: A secure, privacy-respecting single sign-on system for the web
US10846432B2 (en) Secure data leak detection
US10218691B2 (en) Single sign-on framework for browser-based applications and native applications
Fett et al. An extensive formal security analysis of the openid financial-grade api
US10320771B2 (en) Single sign-on framework for browser-based applications and native applications
US10454949B2 (en) Guarding against cross-site request forgery (CSRF) attacks
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Hossain et al. OAuth-SSO: A framework to secure the OAuth-based SSO service for packaged web applications
Chandra et al. Authentication and authorization mechanism for cloud security
Lepofsky The manager's guide to web application security: a concise guide to the weaker side of the web
Mayer et al. Guardians of the clouds: When identity providers fail
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Liu et al. Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks
Jones et al. OAuth 2.0 dynamic client registration protocol
Wu Authentication in Web Applications
Maidine et al. Cloud Identity Management Mechanisms and Issues
Ghazizadeh et al. Secure OpenID authentication model by using Trusted Computing
Holtmann Single Sign-On Security: Security Analysis of Real-Life OpenID Connect Implementations