Nothing Special   »   [go: up one dir, main page]

Teymourlouei et al., 2019 - Google Patents

Blockchain: enhance the authentication and verification of the identity of a user to prevent data breaches and security intrusions

Teymourlouei et al., 2019

Document ID
7894733697161930416
Author
Teymourlouei H
Jackson L
Publication year
Publication venue
Proceedings of the international conference on scientific computing (CSC)

External Links

Snippet

Blockchain has attracted many of attention across the world. Instead of storing information in centralized servers, blockchain utilize a network of independent computers that replicate each record of data it creates. Users can use blockchain and still experience hacker …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Similar Documents

Publication Publication Date Title
Alketbi et al. Blockchain for government services—Use cases, security benefits and challenges
Elisa et al. A framework of blockchain-based secure and privacy-preserving E-government system
RU2747947C2 (en) Systems and methods of personal identification and verification
KR20190075793A (en) Authentication System for Providing Instant Access Using Block Chain
Ahmed et al. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey
Ali et al. Blockchain and the future of the internet: A comprehensive review
WO2019195691A1 (en) Discrete blockchain and blockchain communications
Haque et al. Blockchain technology: Methodology, application and security issues
Ranjith Kumar et al. Blockchain based chameleon hashing technique for privacy preservation in E-governance system
ul Hassan et al. Blockchain and the future of the internet: a comprehensive review
Ayed et al. The blockchain technology: applications and threats
Nabi Comparative study on identity management methods using blockchain
Kamboj et al. An exploratory analysis of blockchain: applications, security, and related issues
Subha Assessing security features of blockchain technology
Ghonge et al. A comprehensive review of the security and privacy issues in blockchain technologies
Biswas et al. Secure login: a blockchain based web application for identity access management system
Das et al. Data privacy in IoT network using blockchain technology
Patole et al. Personal identity on blockchain
US20220188836A1 (en) Anti-Money Laundering Blockchain Technology
Teymourlouei et al. Blockchain: enhance the authentication and verification of the identity of a user to prevent data breaches and security intrusions
Vagadia et al. Data integrity, control and tokenization
Chhabra et al. Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval
Perwej et al. A technological perspective of blockchain security
Maram Bitcoin generation using Blockchain technology
Mahmood et al. A survey on privacy and policy aspects of blockchain technology