Coffin, 2011 - Google Patents
Two-factor authenticationCoffin, 2011
- Document ID
- 11369876416145795031
- Author
- Coffin D
- Publication year
- Publication venue
- Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java
External Links
Snippet
What would life be like if there were no imposters, no charlatans, and no thieves? Sorry, that rhetorical question does not provide any security. Neither does putting on a set of rose- colored glasses and believing that we are secure just because we've implemented …
- 239000011521 glass 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9853962B2 (en) | Flexible authentication framework | |
| Chadwick | Federated identity management | |
| US7263717B1 (en) | Integrated security framework and privacy database scheme | |
| US9374369B2 (en) | Multi-factor authentication and comprehensive login system for client-server networks | |
| US9300653B1 (en) | Delivery of authentication information to a RESTful service using token validation scheme | |
| EP3938941B1 (en) | User choice in data location and policy adherence | |
| US7827318B2 (en) | User enrollment in an e-community | |
| US9092637B2 (en) | Profile and consent accrual | |
| US8027982B2 (en) | Self-service sources for secure search | |
| US8875249B2 (en) | Minimum lifespan credentials for crawling data repositories | |
| US7062563B1 (en) | Method and system for implementing current user links | |
| KR101130405B1 (en) | Method and system for identity recognition | |
| US20070143860A1 (en) | Networked identity framework | |
| US20150143546A1 (en) | Service oriented secure collaborative system for compartmented networks | |
| US20040024764A1 (en) | Assignment and management of authentication & authorization | |
| US20130152171A1 (en) | System and method to facilitate compliance with coppa for website registration | |
| US20070089167A1 (en) | Impersonation in an access system | |
| US20050210263A1 (en) | Electronic form routing and data capture system and method | |
| US20120011594A1 (en) | System and method for coppa compliance for online education | |
| US20040073668A1 (en) | Policy delegation for access control | |
| US20090126007A1 (en) | Identity management suite | |
| US11412002B2 (en) | Provision of policy compliant storage for DID data | |
| KR20090042864A (en) | Method and apparatus for providing reliable single sign-on access to applications and Internet-based services | |
| US20240396884A1 (en) | Identity access management systems and methods with enforceable compliance | |
| EP2077019B1 (en) | Secure access |