Mir et al., 2015 - Google Patents
A secure user anonymity and authentication scheme using AVISPA for telecare medical information systemsMir et al., 2015
View PDF- Document ID
- 3366390875856789580
- Author
- Mir O
- van der Weide T
- Lee C
- Publication year
- Publication venue
- Journal of medical systems
External Links
Snippet
Telecare medicine information systems (TMIS) have been known as an effective mechanism to increase quality and security of healthcare services. In other to the protection of patient privacy, several authentication schemes have been proposed in TMIS, however, most of …
- 239000003814 drug 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Use of an alias or a single-use code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mir et al. | A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems | |
Ali et al. | An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring | |
Aghili et al. | LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT | |
Sahoo et al. | A secure three factor based authentication scheme for health care systems using IoT enabled devices | |
Challa et al. | An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks | |
Ryu et al. | Secure ECC-based three-factor mutual authentication protocol for telecare medical information system | |
Mir et al. | A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services | |
Chaudhry et al. | An enhanced lightweight anonymous biometric based authentication scheme for TMIS | |
Amin et al. | A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis | |
Das et al. | A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care | |
Mishra et al. | A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems | |
Wazid et al. | Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS | |
Jiang et al. | A privacy preserving three-factor authentication protocol for e-health clouds | |
Amin et al. | Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems | |
Srinivas et al. | A mutual authentication framework for wireless medical sensor networks | |
Amin et al. | An improved rsa based user authentication and session key agreement protocol usable in tmis | |
Das et al. | A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks | |
Amin et al. | A secure three-factor user authentication and key agreement protocol for tmis with user anonymity | |
Ravanbakhsh et al. | An efficient improvement remote user mutual authentication and session key agreement scheme for e-health care systems | |
Amin et al. | An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography | |
Mishra et al. | A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards | |
Amin et al. | Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment | |
Jiang et al. | A privacy enhanced authentication scheme for telecare medical information systems | |
Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
Mishra et al. | A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card |