Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Hamidi, 2019 - Google Patents

An approach to develop the smart health using Internet of Things and authentication based on biometric technology

Hamidi, 2019

View PDF
Document ID
6978802591658276064
Author
Hamidi H
Publication year
Publication venue
Future generation computer systems

External Links

Snippet

Internet of things is a new pattern in wireless communications of things. The basic theory of IoT is the comprehensive presence of different kinds of things in surrounding environment. The three main dimensions of data security in the Internet are integration, privacy and …
Continue reading at muhammetbaykara.com (PDF) (other versions)
  • 238000005516 engineering process 0 title abstract description 40

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Hamidi An approach to develop the smart health using Internet of Things and authentication based on biometric technology
Rui et al. A survey on biometric authentication: Toward secure and privacy-preserving identification
Al-Naji et al. CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things
JP2021504860A (en) Extension of secure key storage for transaction verification and cryptocurrencies
Sharma et al. Applicability of WSN and biometric models in the field of healthcare
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
Bernabe et al. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
Papathanasaki et al. Modern authentication methods: A comprehensive survey
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Siddiqui et al. Security analysis of smartphone and cloud computing authentication frameworks and protocols
Otta et al. A systematic survey of multi-factor authentication for cloud infrastructure
Abualese et al. A new trust framework for e-government in cloud of things
Kumar et al. Privacy preservation and security challenges: a new frontier multimodal machine learning research
Lone et al. A novel OTP based tripartite authentication scheme
Awan et al. A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
Wells et al. Privacy and biometrics for smart healthcare systems: attacks, and techniques
Fatima et al. Home Automation and RFID‐Based Internet of Things Security: Challenges and Issues
Verma et al. A novel model to enhance the data security in cloud environment
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Zhu et al. Realid: Building a secure anonymous yet transparent immutable id service
Awadallah et al. Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities
Wan Muhamad et al. Enhance multi-factor authentication model for intelligence community access to critical surveillance data
Alkhalifah Password based authentication for web based graphics computing services retrieval in cloud