Ruban et al., 2019 - Google Patents

Identification in informative systems on the basis of users' behaviour

Ruban et al., 2019

View PDF
Document ID
13658606488643931296
Author
Ruban I
Martovytskyi V
Kovalenko A
Lukova-Chuiko N
Publication year
Publication venue
2019 IEEE 8th International Conference on Advanced Optoelectronics and Lasers (CAOL)

External Links

Snippet

Distributed informative systems which unite the technology of client's server with global web have posed numerous problems. It turned out that standard methods of identification have already become obsolete. Particularly the problem is that the generally accepted division of …
Continue reading at openarchive.nure.ua (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Similar Documents

Publication Publication Date Title
US11947651B2 (en) Biometric identification platform
Ruban et al. Identification in informative systems on the basis of users’ behaviour
US11575678B1 (en) Adaptive authentication
Acar et al. WACA: Wearable-assisted continuous authentication
Ceccarelli et al. Continuous and transparent user identity verification for secure internet services
WO2020041772A1 (en) Machine learning-based platform for user identification
EP3607698B1 (en) Detection of anomalous key material
US9667611B1 (en) Situationally aware authentication
Martín et al. An approach to detect user behaviour anomalies within identity federations
US11151245B2 (en) User authentication
US11349829B2 (en) Systems and methods for use in verifying network identities
Sun et al. A 3‐D hand gesture signature based biometric authentication system for smartphones
Meng et al. The effect of adaptive mechanism on behavioural biometric based mobile phone authentication
Liu et al. User keystroke authentication based on convolutional neural network
Jamil et al. Keystroke pattern recognition preventing online fraud
Al Abdulwahid et al. A survey of continuous and transparent multibiometric authentication systems
Roy et al. A fuzzy decision support system for multifactor authentication
Michelin et al. Smartphone as a biometric service for web authentication
Pilankar et al. Multi-phase mouse dynamics authentication system using behavioural biometrics
Gorad et al. User identity verification using mouse signature
Hussain et al. Advanced authentication scheme using a predefined keystroke structure
Al Abdulwahid Federated authentication using the cloud (Cloud Aura)
Junquera-Sánchez et al. JBCA: Designing an adaptative continuous authentication architecture
Kobayashi et al. Trade-Off Between Authentication Performance and Detection Time for Zero-Effort Attack in Location-Based Authentication
Herdanu et al. Integration biometrics in web application: Security for web apps.