Corella et al., 2012 - Google Patents
Strong and convenient multi-factor authentication on mobile devicesCorella et al., 2012
View PDF- Document ID
- 11550460777455095248
- Author
- Corella F
- Lewison K
- Publication year
External Links
Snippet
Two methods are used today for user authentication on mobile devices: ordinary passwords, and one-time passwords. Both of them have security and usability drawbacks. An alternative, public key certificates, provides strong security, but is difficult to deploy. Instead …
- 238000000034 method 0 description 38
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11223614B2 (en) | Single sign on with multiple authentication factors | |
US20210288957A1 (en) | Time-based one time password (totp) for network authentication | |
US9686080B2 (en) | System and method to provide secure credential | |
US8719952B1 (en) | Systems and methods using passwords for secure storage of private keys on mobile devices | |
US9589143B2 (en) | Semi-trusted Data-as-a-Service platform | |
US11363009B2 (en) | System and method for providing secure cloud-based single sign-on connections using a security service provider having zero-knowledge architecture | |
KR101265873B1 (en) | Distributed Single Signing Service Method | |
CN104038486B (en) | System and method for realizing user login identification based on identification type codes | |
US8775794B2 (en) | System and method for end to end encryption | |
US20180351921A1 (en) | Pluggable cipher suite negotiation | |
US9185111B2 (en) | Cryptographic authentication techniques for mobile devices | |
AU2016287728A1 (en) | Confidential authentication and provisioning | |
DK2414983T3 (en) | Secure computer system | |
US11777721B2 (en) | Method and apparatus for two-step data signing | |
GB2554082A (en) | User sign-in and authentication without passwords | |
CN105577606B (en) | A kind of method and apparatus for realizing authenticator registration | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Corella et al. | Strong and convenient multi-factor authentication on mobile devices | |
Fongen et al. | The integration of trusted platform modules into a tactical identity management system | |
KR102827883B1 (en) | Method of creating account for 2FA authenticaed electronic signature by secure multi-party computation | |
Corella et al. | An example of a derived credentials architecture | |
Culnane et al. | Formalising Application-Driven Authentication & Access-Control based on Users’ Companion Devices | |
Jacob et al. | Security Enhancement of Single Sign on Mechanism for Distributed Computer Networks | |
Akhras | BACHELOR PAPER | |
Corella et al. | A comprehensive approach to cryptographic and biometric authentication from a mobile perspective |