Pic et al., 2019 - Google Patents
Remote KYC: Attacks and counter-measuresPic et al., 2019
View PDF- Document ID
- 9672743781474305090
- Author
- Pic M
- Mahfoudi G
- Trabelsi A
- Publication year
- Publication venue
- 2019 European Intelligence and Security Informatics Conference (EISIC)
External Links
Snippet
Onboarding of new customers is a sensitive task for various services, like Banks who have to follow the Know Your Customer (KYC) rules. Mobile Onboarding Applications or KYC by Streaming are expanding rapidly to provide this capacity at home. Unfortunately, this leaves …
- 238000000034 method 0 description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Peng et al. | FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image | |
Boulkenafet et al. | Face antispoofing using speeded-up robust features and fisher vector encoding | |
Pinto et al. | Face spoofing detection through visual codebooks of spectral temporal cubes | |
Xu et al. | Virtual u: Defeating face liveness detection by building virtual models from your public photos | |
Pic et al. | Remote KYC: Attacks and counter-measures | |
Wojtowicz et al. | Digital images authentication scheme based on bimodal biometric watermarking in an independent domain | |
Yu et al. | Privacy protecting visual processing for secure video surveillance | |
Rathgeb et al. | Makeup presentation attacks: Review and detection performance benchmark | |
Zafar et al. | Fingerprint authentication and security risks in smart devices | |
Agarwal et al. | MagNet: Detecting digital presentation attacks on face recognition | |
Barni et al. | Iris deidentification with high visual realism for privacy protection on websites and social networks | |
Hao et al. | Robustness analysis of face obscuration | |
Uludag | Secure biometric systems | |
Khan et al. | A comprehensive study of document security system, open issues and challenges | |
Kirchgasser et al. | Is warping-based cancellable biometrics (still) sensible for face recognition? | |
Ramasamy et al. | Securing one-time password generation using elliptic-curve cryptography with self-portrait photograph for mobile commerce application | |
Pilania et al. | Exploring face detection and recognition in steganography | |
Yu et al. | Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection | |
Mahore et al. | Detection of 3d mask in 2d face recognition system using dwt and lbp | |
Maurya et al. | A Survey on Cancellable Biometrics Techniques | |
Bakshi et al. | 3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine | |
Abbas et al. | Sanitization of visual multimedia content: a survey of techniques, attacks, and future directions | |
Sun et al. | Presentation attacks in palmprint recognition systems | |
Do et al. | Potential Attacks of DeepFake on eKYC Systems and Remedy for eKYC with DeepFake Detection Using Two-Stream Network of Facial Appearance and Motion Features | |
Delehanty | Security issues in biometric identification |