[go: up one dir, main page]

Corella et al., 2012 - Google Patents

Strong and convenient multi-factor authentication on mobile devices

Corella et al., 2012

View PDF
Document ID
11550460777455095248
Author
Corella F
Lewison K
Publication year

External Links

Snippet

Two methods are used today for user authentication on mobile devices: ordinary passwords, and one-time passwords. Both of them have security and usability drawbacks. An alternative, public key certificates, provides strong security, but is difficult to deploy. Instead …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
US11223614B2 (en) Single sign on with multiple authentication factors
US20210288957A1 (en) Time-based one time password (totp) for network authentication
US9686080B2 (en) System and method to provide secure credential
US8719952B1 (en) Systems and methods using passwords for secure storage of private keys on mobile devices
US9589143B2 (en) Semi-trusted Data-as-a-Service platform
US11363009B2 (en) System and method for providing secure cloud-based single sign-on connections using a security service provider having zero-knowledge architecture
KR101265873B1 (en) Distributed Single Signing Service Method
CN104038486B (en) System and method for realizing user login identification based on identification type codes
US8775794B2 (en) System and method for end to end encryption
US20180351921A1 (en) Pluggable cipher suite negotiation
US9185111B2 (en) Cryptographic authentication techniques for mobile devices
AU2016287728A1 (en) Confidential authentication and provisioning
DK2414983T3 (en) Secure computer system
US11777721B2 (en) Method and apparatus for two-step data signing
GB2554082A (en) User sign-in and authentication without passwords
CN105577606B (en) A kind of method and apparatus for realizing authenticator registration
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Corella et al. Strong and convenient multi-factor authentication on mobile devices
Fongen et al. The integration of trusted platform modules into a tactical identity management system
KR102827883B1 (en) Method of creating account for 2FA authenticaed electronic signature by secure multi-party computation
Corella et al. An example of a derived credentials architecture
Culnane et al. Formalising Application-Driven Authentication & Access-Control based on Users’ Companion Devices
Jacob et al. Security Enhancement of Single Sign on Mechanism for Distributed Computer Networks
Akhras BACHELOR PAPER
Corella et al. A comprehensive approach to cryptographic and biometric authentication from a mobile perspective