Kizza, 2024 - Google Patents
AuthenticationKizza, 2024
- Document ID
- 17659117688175171433
- Author
- Kizza J
- Publication year
- Publication venue
- Guide to Computer Network Security
External Links
Snippet
Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is, in fact, who or what it is declared to be. In private and public computing systems, for example …
- 238000000034 method 0 abstract description 65
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11770261B2 (en) | Digital credentials for user device authentication | |
Todorov | Mechanics of user identification and authentication: Fundamentals of identity management | |
US8700901B2 (en) | Facilitating secure online transactions | |
JP5695120B2 (en) | Single sign-on between systems | |
Parmar et al. | A comprehensive study on passwordless authentication | |
JP7083892B2 (en) | Mobile authentication interoperability of digital certificates | |
Dhamija et al. | Phish and hips: Human interactive proofs to detect phishing attacks | |
US20080077791A1 (en) | System and method for secured network access | |
JP2005532736A (en) | Biometric private key infrastructure | |
WO2008156772A1 (en) | Token-based system and method for secure authentication to a service provider | |
Kizza | Authentication | |
KR20200016506A (en) | Method for Establishing Anonymous Digital Identity | |
Boonkrong et al. | Multi-factor authentication | |
JP2010505334A (en) | System and method for facilitating secure online transactions | |
Goswami et al. | A replay attack resilient system for PKI based authentication in challenge-response mode for online application | |
Bilal et al. | Evaluation of secure OpenID-based RAAA user authentication protocol for preventing specific Web attacks in Web apps | |
Burr et al. | Sp 800-63-1. electronic authentication guideline | |
Abbas et al. | Identifying an OpenID anti‐phishing scheme for cyberspace | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Guel | A framework for choosing your next generation authentication/authorization system | |
Razumov et al. | Ensuring the security of web applications operating on the basis of the SSL/TLS protocol | |
Form | Content | |
Halonen | Authentication and authorization in mobile environment | |
Yasin et al. | Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). | |
Khodabacchus et al. | Secured SAML cloud authentication using fingerprint |