[go: up one dir, main page]

Hosseyni et al., 2022 - Google Patents

Formal Security Analysis of the OpenID Financial-grade API 2.0

Hosseyni et al., 2022

View PDF
Document ID
2787099490548874669
Author
Hosseyni P
Küsters R
Würtele T
Publication year
Publication venue
url: https://openid. net/wordpress-content/uploads/2022/12/Formal-Security-Analysis-of-FAPI-2.0 _FINAL_2022-10. pdf (visited on 09/27/2023)(cit. on pp. 62, 83, 84, 86)

External Links

Snippet

With the emergence of FinTech companies, interfaces between banks and FinTechs became increasingly important. While early FinTechs were forced to use techniques like screen scraping to deliver their services, pressure from customers and lawmakers, eg, with …
Continue reading at openid.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Fett et al. An extensive formal security analysis of the openid financial-grade api
Lodderstedt et al. OAuth 2.0 threat model and security considerations
US9397990B1 (en) Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud
He et al. A strong user authentication scheme with smart cards for wireless communications
Kaur et al. A secure two‐factor authentication framework in cloud computing
Yang et al. A security analysis of the OAuth protocol
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Zhang et al. EL PASSO: Efficient and lightweight privacy-preserving single sign on
Wu et al. SGX-UAM: A secure unified access management scheme with one time passwords via Intel SGX
Guo et al. Uppresso: Untraceable and unlinkable privacy-preserving single sign-on services
Heilman et al. Openpubkey: Augmenting openid connect with user held signing keys
Maidine et al. Cloud identity management mechanisms and issues
Paquin U-prove technology overview v1. 1
Cesena et al. Anonymous authentication with TLS and DAA
Göçer et al. An authorization framework with oauth for fintech servers
Lodderstedt et al. RFC 9700: Best Current Practice for OAuth 2.0 Security
Hosseyni et al. Formal Security Analysis of the OpenID Financial-grade API 2.0
Holtmann Single sign-on security: security analysis of real-life openid connect implementations
Axeland et al. Security analysis of attack surfaces on the grant negotiation and authorization protocol
Jesudoss et al. Enhanced Kerberos authentication for distributed environment
Aiemworawutikul et al. Vulnerability Assessment in National Identity Services
Damabi Security analysis of the OpenID financial-grade API
Chen et al. SSL/TLS session-aware user authentication using a gaa bootstrapped key
CN114996770B (en) Identity recognition method based on sink management system
Kohlar et al. Secure bindings of SAML assertions to TLS sessions