McDaniel, 2002 - Google Patents
AT&T Labs-Research May 31, 2002McDaniel, 2002
View PDF- Document ID
- 13758099224318837280
- Author
- McDaniel P
- Publication year
External Links
Snippet
Authentication is the process by which the identity of an entity is established. Authenticating entities present credentials, such as passwords or certificates, as evidence of their identity. The entity is deemed authentic where presented credentials are valid and sufficient. Note …
- 238000000034 method 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9871791B2 (en) | Multi factor user authentication on multiple devices | |
US8434137B2 (en) | Method of securely logging into remote servers | |
US9055107B2 (en) | Authentication delegation based on re-verification of cryptographic evidence | |
US7840993B2 (en) | Protecting one-time-passwords against man-in-the-middle attacks | |
US8800018B2 (en) | Method and system for verifying user instructions | |
TWI543574B (en) | Method for authenticatiing online transactions using a browser | |
US7100054B2 (en) | Computer network security system | |
US8527757B2 (en) | Method of preventing web browser extensions from hijacking user information | |
US7320073B2 (en) | Secure method for roaming keys and certificates | |
US20100217975A1 (en) | Method and system for secure online transactions with message-level validation | |
US20080022085A1 (en) | Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system | |
KR20030088855A (en) | Session key security protocol | |
US20110179478A1 (en) | Method for secure transmission of sensitive data utilizing network communications and for one time passcode and multi-factor authentication | |
JP2001186122A (en) | Authentication system and authentication method | |
Kizza | Authentication | |
Khattak et al. | Analysis of open environment sign-in schemes-privacy enhanced & trustworthy approach | |
Badra et al. | Phishing attacks and solutions | |
Alsaid et al. | Preventing phishing attacks using trusted computing technology | |
McDaniel | AT&T Labs-Research May 31, 2002 | |
McDaniel | Pennsylvania State University September 18, 2006 | |
Abbott et al. | CPG: Closed pseudonymous groups | |
Yang et al. | The design and implementation of improved secure cookies based on certificate | |
Yang et al. | A new design for a practical secure cookies system | |
McCormack et al. | An authentication framework for Web access to remote hosts | |
Hassan | User-defined key pair protocol |