TR201208191A2 - Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi. - Google Patents
Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi.Info
- Publication number
- TR201208191A2 TR201208191A2 TR2012/08191A TR201208191A TR201208191A2 TR 201208191 A2 TR201208191 A2 TR 201208191A2 TR 2012/08191 A TR2012/08191 A TR 2012/08191A TR 201208191 A TR201208191 A TR 201208191A TR 201208191 A2 TR201208191 A2 TR 201208191A2
- Authority
- TR
- Turkey
- Prior art keywords
- virtual environment
- authentication method
- characteristic
- virtual encryption
- persons
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Biomedical Technology (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
- Collating Specific Patterns (AREA)
Abstract
Bu buluş, kişi ve şirketlere kimlik doğrulama yöntemiyle karakteristik sanal şifreleme oluşturulması, oluşturulan şifre vasıtasıyla sanal ortamda yazılan veya hazırlanan tüm çalışmaların kime ait olduğunun tespitinin sağlanması yöntemi ile ilgilidir. Yöntem vasıtasıyla sanal ortamda kişilere karakteristik bir renk şifresi atanmaktadır. Sanal ortamda bütün dosya ve bilgilerde yazılan yazıda söz konusu renk karışımı uygulanmaktadır. Böylelikle yazılan yazının hangi kişiye ait olduğu net bir biçimde tespit edilebilmektedir.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2012/08191A TR201208191A2 (tr) | 2012-07-12 | 2012-07-12 | Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi. |
PCT/TR2013/000188 WO2014011128A2 (en) | 2012-07-12 | 2013-06-19 | The method of authentication by characteristic virtual encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2012/08191A TR201208191A2 (tr) | 2012-07-12 | 2012-07-12 | Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi. |
Publications (1)
Publication Number | Publication Date |
---|---|
TR201208191A2 true TR201208191A2 (tr) | 2012-12-21 |
Family
ID=47679843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TR2012/08191A TR201208191A2 (tr) | 2012-07-12 | 2012-07-12 | Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi. |
Country Status (2)
Country | Link |
---|---|
TR (1) | TR201208191A2 (tr) |
WO (1) | WO2014011128A2 (tr) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4862652B2 (ja) * | 2006-12-28 | 2012-01-25 | ブラザー工業株式会社 | 画像形成システム、画像形成装置及びプログラム |
-
2012
- 2012-07-12 TR TR2012/08191A patent/TR201208191A2/tr unknown
-
2013
- 2013-06-19 WO PCT/TR2013/000188 patent/WO2014011128A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2014011128A3 (en) | 2014-03-06 |
WO2014011128A2 (en) | 2014-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2015200905B9 (en) | Method and system for providing an efficient vulnerability management and verification service | |
IN2014MN02179A (tr) | ||
BR112013026156A2 (pt) | sistema para a realização de operações biométricas remotas e método de operações biométricas remotas que é implementado no sistema | |
GB201515593D0 (en) | Trusted and authenticating using trusted biometric information | |
BR112014017553A8 (pt) | documento de segurança, método para aplicar o verniz protetor, uso de um documento de segurança, uso de uma ou mais áreas livres de verniz, método de autenticação de um documento de segurança e sistema | |
PH12014501692A1 (en) | Control method, system and device | |
Cheng et al. | User resistance of mobile banking in China: Focus on perceived risk | |
PT3475097T (pt) | Documento autodestrutivo para segurança de informação e proteção de privacidade | |
TR201208191A2 (tr) | Karakteristik sanal şifreleme ile kimlik doğrulama yöntemi. | |
Estes | Job 28 in Its Literary Context | |
Watson et al. | Energy policy special issue: UK Energy Research Centre uncertainties project | |
Davis et al. | Defining, enhancing, and documenting impact of STEM education and public outreach projects through a quantitative collaborative impact analysis evaluation method | |
UA92754U (ru) | Одноразовый бумажный билет с электронной валидацией действительности | |
Viseur et al. | Approach for computing 1D fracture density: application to fracture corridor characterization | |
Fontquerni Gorchs et al. | Rockfall exposures in Montserrat mountain | |
TW201612790A (en) | Method of increasing effectiveness of information security risk assessment and risk recognition | |
žÛŨĩÛÛÁõĻÛūÛÛŨ ïõÁõÛýÛéÅÛÛ ūÛÐüŦČÛķÛÛ žÛŨĩÛÛÁõĻÛāýÛ ÍÛäĩÛÛÁõÛ et al. | ÍÛæÛķÛÛ: žÛĩÛÛ ļÛóĘķÛÛéķÛÛ „ÛäĻÛ ÍÛÁõ” ÛÛ™ öé. 1.―ÛÛÁõĐÛāýÛ žÛŨĩÛÛÁõĻÛķÛÛ ÅÛ “ÛĻÛÛé… ķÛé ÜČÛÉÛéĖÛĐÛÛ… ÛéķÛäŨ ČÛĻÛŲķÛ ïõÁõÛé. | |
Eroshenko | Nonlinear gravitationally bound structures in the early Universe | |
Sawicz et al. | A top-down modelling approach to understand hydrologic similarity | |
Putri et al. | Compliance with BYOD Security Policy | |
Faculty Development Committee | Faculty Development minutes 10/25/2012 | |
Gomes et al. | The role of signalling to understand sustainability orientation and supply network engagement: a case in the UK food retail sector | |
Long | Order on Motion to Reconsider and Vacate Order Denying MFSJ (O'Brien _Conza) | |
Prusaczyk | A Proposed Data Qualification Procedure for the Connecticut Bridge Monitoring Network | |
Adviser__________________ | GRADUATE STUDIES AND RESEARCH |