Teymourlouei et al., 2019 - Google Patents
Blockchain: enhance the authentication and verification of the identity of a user to prevent data breaches and security intrusionsTeymourlouei et al., 2019
- Document ID
- 7894733697161930416
- Author
- Teymourlouei H
- Jackson L
- Publication year
- Publication venue
- Proceedings of the international conference on scientific computing (CSC)
External Links
Snippet
Blockchain has attracted many of attention across the world. Instead of storing information in centralized servers, blockchain utilize a network of independent computers that replicate each record of data it creates. Users can use blockchain and still experience hacker …
- 230000002708 enhancing 0 title description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alketbi et al. | Blockchain for government services—Use cases, security benefits and challenges | |
Elisa et al. | A framework of blockchain-based secure and privacy-preserving E-government system | |
RU2747947C2 (en) | Systems and methods of personal identification and verification | |
KR20190075793A (en) | Authentication System for Providing Instant Access Using Block Chain | |
Ahmed et al. | Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey | |
Ali et al. | Blockchain and the future of the internet: A comprehensive review | |
WO2019195691A1 (en) | Discrete blockchain and blockchain communications | |
Haque et al. | Blockchain technology: Methodology, application and security issues | |
Ranjith Kumar et al. | Blockchain based chameleon hashing technique for privacy preservation in E-governance system | |
ul Hassan et al. | Blockchain and the future of the internet: a comprehensive review | |
Ayed et al. | The blockchain technology: applications and threats | |
Nabi | Comparative study on identity management methods using blockchain | |
Kamboj et al. | An exploratory analysis of blockchain: applications, security, and related issues | |
Subha | Assessing security features of blockchain technology | |
Ghonge et al. | A comprehensive review of the security and privacy issues in blockchain technologies | |
Biswas et al. | Secure login: a blockchain based web application for identity access management system | |
Das et al. | Data privacy in IoT network using blockchain technology | |
Patole et al. | Personal identity on blockchain | |
US20220188836A1 (en) | Anti-Money Laundering Blockchain Technology | |
Teymourlouei et al. | Blockchain: enhance the authentication and verification of the identity of a user to prevent data breaches and security intrusions | |
Vagadia et al. | Data integrity, control and tokenization | |
Chhabra et al. | Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval | |
Perwej et al. | A technological perspective of blockchain security | |
Maram | Bitcoin generation using Blockchain technology | |
Mahmood et al. | A survey on privacy and policy aspects of blockchain technology |