Nothing Special   »   [go: up one dir, main page]

Tsukayama, 2015 - Google Patents

This program lets you snap a photo of whoever's trying to hack you

Tsukayama, 2015

Document ID
7580572847710999764
Author
Tsukayama H
Publication year
Publication venue
Washingtonpost. com

External Links

Snippet

A password manager called LogMeOnce now gives you the option to take a picture of whoever is trying to access the accounts that you've registered with its service. It does this by hacking the hacker's camera, whether that is attached to a computer or mobile device, and …
Continue reading at go.gale.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
US11677756B2 (en) Risk adaptive protection
US11575685B2 (en) User behavior profile including temporal detail corresponding to user interaction
Soomro et al. Social media-related cybercrimes and techniques for their prevention
Filkins et al. Privacy and security in the era of digital health: what should translational researchers know and do about it?
Clarke Transparent user authentication: biometrics, RFID and behavioural profiling
Weber The digital future–A challenge for privacy?
US11386202B2 (en) Apparatus and method for social account access control
EP3937040B1 (en) Systems and methods for securing login access
Brockett et al. Enterprise cyber risk management
Shabani et al. A review of cyber security issues in hospitality industry
Ghasemi et al. Threats of social engineering attacks against security of Internet of Things (IoT)
Cook Effective cyber security strategies for small businesses
Hennig Privacy and security online: Best practices for cybersecurity
Fatima et al. Home Automation and RFID‐Based Internet of Things Security: Challenges and Issues
Ogbanufe et al. Towards a conceptual typology of darknet risks
Tsukayama This program lets you snap a photo of whoever's trying to hack you
Kenneally How to throw the race to the bottom: revisiting signals for ethical and legal research using online data
Ghosh et al. Cyber security issues by using the Internet of Things (IoT)-A legal analysis
Campbell Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment.
Hassan et al. Essential Privacy Tips
Slagell Thinking critically about computer security trade-offs
Kumar et al. Data Security: A Review on Concept, Concerns and Methods
Henriquez Cyber Attacks on College Campuses
Johnson et al. Crime and the Consumer Internet of Things
McGonagle The Human Element: The “Trigger” on Cyber Weapons