[go: up one dir, main page]

Smejkal et al., 2008 - Google Patents

Development trends of electronic authentication

Smejkal et al., 2008

View PDF
Document ID
4578455422260634568
Author
Smejkal V
Kodl J
Publication year
Publication venue
2008 42nd Annual IEEE International Carnahan Conference on Security Technology

External Links

Snippet

Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security. This article provides a description of present trends in authentication and authorization methods development not only from the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Burr et al. Electronic Authentication
Andress Foundations of information security: a straightforward introduction
Abu-Shanab et al. Security and Fraud Issues of E-banking
US20010048359A1 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
Sadhya et al. A critical survey of the security and privacy aspects of the Aadhaar framework
CN106911722B (en) Intelligent password signature identity authentication bidirectional authentication method and system
Bohm et al. Electronic commerce: Who carries the risk of fraud
Pakojwar et al. Security in online banking services-A comparative study
Manjula et al. Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking
Papaspirou et al. Security Revisited: Honeytokens meet Google Authenticator
Reno Multifactor authentication: Its time has come
Burr et al. Sp 800-63-1. electronic authentication guideline
Smejkal et al. Development trends of electronic authentication
CN106921501A (en) A kind of intelligent cipher signature identity differentiates authentication method and system
Chen et al. A trusted biometric system
Hamilton et al. A global look at authentication
Algamdi Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking
US20240062316A1 (en) Commenting entitlement system within an online social networking platform utilizing real-identification verification and method thereof
You et al. A study on the two-channel authentication method which provides two-way authentication in the Internet banking environment
Graham et al. It’s all about authentication
Sandhu et al. Identification and authentication
Marinakis et al. Strengthening the security of e-banking transactions: the case of NBG
Chaudhary A Study of Password Stealing Attacks and their Protection Mechanism
Augoye Eligibility Verifiability in Untrustworthy Voting Environments