Ruban et al., 2019 - Google Patents
Identification in informative systems on the basis of users' behaviourRuban et al., 2019
View PDF- Document ID
- 13658606488643931296
- Author
- Ruban I
- Martovytskyi V
- Kovalenko A
- Lukova-Chuiko N
- Publication year
- Publication venue
- 2019 IEEE 8th International Conference on Advanced Optoelectronics and Lasers (CAOL)
External Links
Snippet
Distributed informative systems which unite the technology of client's server with global web have posed numerous problems. It turned out that standard methods of identification have already become obsolete. Particularly the problem is that the generally accepted division of …
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11947651B2 (en) | Biometric identification platform | |
Ruban et al. | Identification in informative systems on the basis of users’ behaviour | |
US11575678B1 (en) | Adaptive authentication | |
Acar et al. | WACA: Wearable-assisted continuous authentication | |
Ceccarelli et al. | Continuous and transparent user identity verification for secure internet services | |
WO2020041772A1 (en) | Machine learning-based platform for user identification | |
EP3607698B1 (en) | Detection of anomalous key material | |
US9667611B1 (en) | Situationally aware authentication | |
Martín et al. | An approach to detect user behaviour anomalies within identity federations | |
US11151245B2 (en) | User authentication | |
US11349829B2 (en) | Systems and methods for use in verifying network identities | |
Sun et al. | A 3‐D hand gesture signature based biometric authentication system for smartphones | |
Meng et al. | The effect of adaptive mechanism on behavioural biometric based mobile phone authentication | |
Liu et al. | User keystroke authentication based on convolutional neural network | |
Jamil et al. | Keystroke pattern recognition preventing online fraud | |
Al Abdulwahid et al. | A survey of continuous and transparent multibiometric authentication systems | |
Roy et al. | A fuzzy decision support system for multifactor authentication | |
Michelin et al. | Smartphone as a biometric service for web authentication | |
Pilankar et al. | Multi-phase mouse dynamics authentication system using behavioural biometrics | |
Gorad et al. | User identity verification using mouse signature | |
Hussain et al. | Advanced authentication scheme using a predefined keystroke structure | |
Al Abdulwahid | Federated authentication using the cloud (Cloud Aura) | |
Junquera-Sánchez et al. | JBCA: Designing an adaptative continuous authentication architecture | |
Kobayashi et al. | Trade-Off Between Authentication Performance and Detection Time for Zero-Effort Attack in Location-Based Authentication | |
Herdanu et al. | Integration biometrics in web application: Security for web apps. |