[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Culnane et al., 2023 - Google Patents

Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices

Culnane et al., 2023

Document ID
6952985208767746677
Author
Culnane C
Boureanu I
Snyman J
Wesemeyer S
Treharne H
Publication year
Publication venue
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security

External Links

Snippet

We define and formalise a generic cryptographic construction that underpins coupling of companion devices, eg, biometrics-enabled devices, with main devices (eg, PCs), in a user- aware manner, mainly for on-demand authentication and secure storage for applications …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
CN108768988B (en) Block chain access control method, block chain access control equipment and computer readable storage medium
KR102018971B1 (en) Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium
US11853438B2 (en) Providing cryptographically secure post-secrets-provisioning services
CN108173662B (en) Equipment authentication method and device
WO2016177052A1 (en) User authentication method and apparatus
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
US20140281493A1 (en) Provisioning sensitive data into third party
CA2879910C (en) Terminal identity verification and service authentication method, system and terminal
US20140006781A1 (en) Encapsulating the complexity of cryptographic authentication in black-boxes
US11831753B2 (en) Secure distributed key management system
JP2019530265A (en) Method and apparatus for providing and acquiring graphic code information and terminal
DK2414983T3 (en) Secure computer system
TWI827906B (en) Message transmitting system, user device and hardware security module for use therein
WO2008053279A1 (en) Logging on a user device to a server
CN115473655B (en) Terminal authentication method, device and storage medium for access network
TW201539239A (en) Server, user device, and method of interaction between user device and server
CN114338091B (en) Data transmission method, device, electronic equipment and storage medium
JP5622668B2 (en) Application authentication system, application authentication method
Zhang et al. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks
Bindel et al. To attest or not to attest, this is the question–Provable attestation in FIDO2
Nishimura et al. Secure authentication key sharing between personal mobile devices based on owner identity
Kim et al. Secure user authentication based on the trusted platform for mobile devices
Culnane et al. Formalising Application-Driven Authentication & Access-Control based on Users’ Companion Devices
Arfaoui et al. Practical and privacy-preserving TEE migration
CN112087467A (en) Information encryption transmission method and system based on web system