Uneingeschränkter Zugang

Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services


Zitieren

Mingoo Kang, et al., “individual digital safe system for set-top box by use of FIDO transaction certification and multiple DID personal identification”, Korea patent 10-2021-0126039, 2021.09.24 KangMingoo “individual digital safe system for set-top box by use of FIDO transaction certification and multiple DID personal identification” Korea patent 10-2021-0126039, 2021.09.24 Search in Google Scholar

https://www.sec.gov/ https://www.sec.gov/ Search in Google Scholar

https://www.sec.gov/info/smallbus/secg/custody_rule-secg.htm https://www.sec.gov/info/smallbus/secg/custody_rule-secg.htm Search in Google Scholar

https://fidoalliance.org/ https://fidoalliance.org/ Search in Google Scholar

E. Klieme, J. Wilke, N. van Dornick and C. Meinel, “FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication,” 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1857–1867, 2020 KliemeE. WilkeJ. van DornickN. MeinelC. “FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication,” 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 1857 1867 2020 Search in Google Scholar

Lyastani, S. G., Schilling, M., Neumayr, M., Backes, M., & Bugiel, S. “Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Password-less Authentication,” in IEEE Symposium on Security and Privacy, pp. 268–285, May 2020 LyastaniS. G. SchillingM. NeumayrM. BackesM. BugielS. “Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Password-less Authentication,” in IEEE Symposium on Security and Privacy 268 285 May 2020 Search in Google Scholar

Peter Smith, Nipun Srivastava, “A Market Overview of Custody for Digital Assets” Deloitte Digital Custodian Whitepaper, June 2020 SmithPeter SrivastavaNipun “A Market Overview of Custody for Digital Assets” Deloitte Digital Custodian Whitepaper June 2020 Search in Google Scholar

Mingoo Kang, Seungpil Hong. Sangchul Shin and Sangyep Nam, Digital Asset and Security, Sanghakdang, 2022 KangMingoo HongSeungpil ShinSangchul NamSangyep Digital Asset and Security Sanghakdang 2022 Search in Google Scholar

Rivera-Dourado, Martiño, et al. ‘An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards.” Engineering Proceedings 7.1(56). 2021 Rivera-DouradoMartiño ‘An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards.” Engineering Proceedings 7 1 56 2021 Search in Google Scholar

Biryukov, A., & Tikhomirov, S. “Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash.” Pervasive and Mobile Computing, 59, 101030. 2019 BiryukovA. TikhomirovS. “Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash.” Pervasive and Mobile Computing 59 101030 2019 Search in Google Scholar

Yeo, Hyeopgoo. “Touch fingerprint sensor based on sensor cell isolation technique with pseudo direct signaling.” International Journal on Smart Sensing and Intelligent Systems, vol.12, no.1, pp.1–9. 2019 YeoHyeopgoo “Touch fingerprint sensor based on sensor cell isolation technique with pseudo direct signaling.” International Journal on Smart Sensing and Intelligent Systems 12 1 1 9 2019 Search in Google Scholar

E. Rahmawati et al., “Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone.” 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), pp. 234–238. 2017 RahmawatiE. “Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone.” 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA) 234 238 2017 Search in Google Scholar

Lee, D., Kim, D. C., Kwon, D., & Kim, H. “Efficient hardware implementation of the lightweight block encryption algorithm LEA.” Sensors, vol 14(1), pp 975–994. 2014 LeeD. KimD. C. KwonD. KimH. “Efficient hardware implementation of the lightweight block encryption algorithm LEA.” Sensors 14 1 975 994 2014 Search in Google Scholar

J. Sun, Q. Zhong, L. Kou, W. Wang, Q. Da and Y. Lin, “A lightweight multi-factor mobile user authentication scheme.” IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 831–836. 2018 SunJ. ZhongQ. KouL. WangW. DaQ. LinY. “A lightweight multi-factor mobile user authentication scheme.” IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 831 836 2018 Search in Google Scholar

Katuk, Norliza, and Ikenna Rene Chiadighikaobi. “An Enhanced Block Pre-Processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment.” International Journal of Communication Networks and Information Security, 13.3 pp. 474–481. 2021 KatukNorliza ChiadighikaobiIkenna Rene “An Enhanced Block Pre-Processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment.” International Journal of Communication Networks and Information Security 13 3 474 481 2021 Search in Google Scholar

Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G. (2013, August). “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications (pp. 3–27). Springer, Cham. 2013 HongD. LeeJ. K. KimD. C. KwonD. RyuK. H. LeeD. G. 2013 August “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications 3 27 Springer, Cham 2013 Search in Google Scholar

Sonh, S. “Design of Encryption/Decryption IP for Lightweight Encryption LEA.” Journal of Internet Computing and Services, 18(5), vol 8. 2017 SonhS. “Design of Encryption/Decryption IP for Lightweight Encryption LEA.” Journal of Internet Computing and Services 18 5 8 2017 Search in Google Scholar

Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G. “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications (pp. 3–27). Springer, Cham. August 2013. HongD. LeeJ. K. KimD. C. KwonD. RyuK. H. LeeD. G. “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications 3 27 Springer, Cham August 2013 Search in Google Scholar

D. Cho, “A Simple Fingerprint Fuzzy Vault for FIDO.” KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5674–5128, 2016. ChoD. “A Simple Fingerprint Fuzzy Vault for FIDO.” KSII Transactions on Internet and Information Systems 10 11 5674 5128 2016 Search in Google Scholar

Y. Chen, Y. Ge, W. Wang and F. Yang, “A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.” KSII Transactions on Internet and Information Systems, vol. 12, no. 4, pp. 1779–1798, 2018 ChenY. GeY. WangW. YangF. “A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.” KSII Transactions on Internet and Information Systems 12 4 1779 1798 2018 Search in Google Scholar

Gyeong-Jin Ra and Im-Yeong Lee. 2018. “A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.” KSII Transactions on Internet and Information Systems, 12, 2, pp 892–905. 2018 RaGyeong-Jin LeeIm-Yeong 2018 “A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.” KSII Transactions on Internet and Information Systems 12 2 892 905 2018 Search in Google Scholar

Y. Zhang and X. Jia, “Fast image encryption algorithm based on substitution and diffusion.” KSII Transactions on Internet and Information Systems, vol. 12, no. 9, pp. 4487–4511, 2018 ZhangY. JiaX. “Fast image encryption algorithm based on substitution and diffusion.” KSII Transactions on Internet and Information Systems 12 9 4487 4511 2018 Search in Google Scholar

https://precisebiometrics.com https://precisebiometrics.com Search in Google Scholar

eISSN:
1178-5608
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere