Movatterモバイル変換


[0]ホーム

URL:


Li, 2020 - Google Patents

Smart Sensing Enabled Secure and Usable Pairing and Authentication

Li, 2020

ViewPDF
Document ID
1389703788927418825
Author
Li X
Publication year

External Links

Snippet

Abstract Internet of Things (IoT) technologies have made our lives more convenient and better informed by sensing and monitoring our surroundings. Security applications, such as device pairing and user authentication, are the fundamentals for building a trustworthy smart …
Continue reading atscholarcommons.sc.edu (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • G06F19/3418Telemedicine, e.g. remote diagnosis, remote control of instruments or remote monitoring of patient carried devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements

Similar Documents

PublicationPublication DateTitle
Li et al.Touch well before use: Intuitive and secure authentication for IoT devices
US11563564B2 (en)Authentication processing service
US11720656B2 (en)Live user authentication device, system and method
US12047773B2 (en)System and method for implicit authentication
Li et al.T2pair: Secure and usable pairing for heterogeneous iot devices
US9832206B2 (en)System, method and authorization device for biometric access control to digital devices
US20200110482A1 (en)Method and apparatus for battery-free identification token for touch sensing devices
Guerar et al.CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices
BuriroBehavioral biometrics for smartphone user authentication
Ayeswarya et al.A comprehensive review on secure biometric-based continuous authentication and user profiling
US12231897B2 (en)Password-free usable and secure pairing of IoT devices
WO2023016682A1 (en)Authentication processing services for generating high-entropy cryptographic keys
Mare et al.SAW: Wristband-based authentication for desktop computers
Shrestha et al.ZEMFA: zero-effort multi-factor authentication based on multi-modal gait biometrics
Mare et al.Continuous smartphone authentication using wristbands
GuptaNext-generation user authentication schemes for iot applications
Wu et al.Use it-no need to shake it! Accurate implicit authentication for everyday objects with smart sensing
WO2023244602A1 (en)Systems and methods that provide a high level of security for a user
Dhondge et al.Optical wireless authentication for smart devices using an onboard ambient light sensor
LiSmart Sensing Enabled Secure and Usable Pairing and Authentication
Wu et al.T2Pair++: Secure and Usable IoT Pairing with Zero Information Loss
MareSeamless Authentication for Ubiquitous Devices
AcarPrivacy-aware Security Applications in the Era of Internet of Things
SturgessAuthentication in systems with limited input capabilities
Neal et al.Presentation attacks in mobile and continuous behavioral biometric systems

[8]
ページ先頭

©2009-2025 Movatter.jp