Ranganath, 2021 - Google Patents
Cloud Data Security through Hybrid Verification Technique Based on Cryptographic Hash FunctionRanganath, 2021
View PDF- Document ID
- 13691769722328128760
- Author
- Ranganath V
- Publication year
External Links
Snippet
Encrypted communications have a long history of use. Today, however, we can protect information confidentiality and privacy, which is critical to contemporary encryption research. Encrypted data is also used in research initiatives including human behaviour, financial …
- 238000000034 method 0 title abstract description 46
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11811936B2 (en) | Public/private key biometric authentication system | |
US11824991B2 (en) | Securing transactions with a blockchain network | |
US11245532B2 (en) | Authentication method for a client over a network | |
TWI578749B (en) | Methods and apparatus for migrating keys | |
KR101658501B1 (en) | Digital signature service system based on hash function and method thereof | |
US20170078091A1 (en) | One-Time Passcodes with Asymmetric Keys | |
JP2012044670A (en) | User authentication method based on utilization of biometric identification techniques, and related architecture | |
US20130088327A1 (en) | Template delivery type cancelable biometric authentication system and method therefor | |
US9280650B2 (en) | Authenticate a fingerprint image | |
CN111541713A (en) | Identity authentication method and device based on block chain and user signature | |
AU2018100503A4 (en) | Split data/split storage | |
Al-Assam et al. | Automated biometric authentication with cloud computing | |
Griffin | Telebiometric authentication objects | |
US20080250245A1 (en) | Biometric-based document security | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
US20240364526A1 (en) | Methods and systems for generating and validating uses of digital credentials and other documents | |
US11868457B2 (en) | Device and method for authenticating user and obtaining user signature using user's biometrics | |
US20240121098A1 (en) | Scalable Authentication System with Synthesized Signed Challenge | |
Khalid et al. | Cloud server security using bio-cryptography | |
Patel et al. | The study of digital signature authentication process | |
Ranganath | Cloud Data Security through Hybrid Verification Technique Based on Cryptographic Hash Function | |
Zhang et al. | BioP-TAP: An efficient method of template protection and two-factor authentication protocol combining biometric and PUF | |
US20240169350A1 (en) | Securing transactions with a blockchain network | |
Narayanankutty et al. | Novel authentication system for personal and domestic network systems using image feature comparison and digital signatures | |
PRIYA et al. | TRUSTED HYBRID MULTIFACTOR AUTHENTICATION FOR CLOUD USERS. |