Culnane et al., 2023 - Google Patents
Formalising Application-Driven Authentication & Access-Control based on Users' Companion DevicesCulnane et al., 2023
- Document ID
- 6952985208767746677
- Author
- Culnane C
- Boureanu I
- Snyman J
- Wesemeyer S
- Treharne H
- Publication year
- Publication venue
- Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
External Links
Snippet
We define and formalise a generic cryptographic construction that underpins coupling of companion devices, eg, biometrics-enabled devices, with main devices (eg, PCs), in a user- aware manner, mainly for on-demand authentication and secure storage for applications …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108768988B (en) | Block chain access control method, block chain access control equipment and computer readable storage medium | |
KR102018971B1 (en) | Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium | |
US11853438B2 (en) | Providing cryptographically secure post-secrets-provisioning services | |
CN108173662B (en) | Equipment authentication method and device | |
WO2016177052A1 (en) | User authentication method and apparatus | |
US8495383B2 (en) | Method for the secure storing of program state data in an electronic device | |
US20140281493A1 (en) | Provisioning sensitive data into third party | |
CA2879910C (en) | Terminal identity verification and service authentication method, system and terminal | |
US20140006781A1 (en) | Encapsulating the complexity of cryptographic authentication in black-boxes | |
US11831753B2 (en) | Secure distributed key management system | |
JP2019530265A (en) | Method and apparatus for providing and acquiring graphic code information and terminal | |
DK2414983T3 (en) | Secure computer system | |
TWI827906B (en) | Message transmitting system, user device and hardware security module for use therein | |
WO2008053279A1 (en) | Logging on a user device to a server | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
TW201539239A (en) | Server, user device, and method of interaction between user device and server | |
CN114338091B (en) | Data transmission method, device, electronic equipment and storage medium | |
JP5622668B2 (en) | Application authentication system, application authentication method | |
Zhang et al. | Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks | |
Bindel et al. | To attest or not to attest, this is the question–Provable attestation in FIDO2 | |
Nishimura et al. | Secure authentication key sharing between personal mobile devices based on owner identity | |
Kim et al. | Secure user authentication based on the trusted platform for mobile devices | |
Culnane et al. | Formalising Application-Driven Authentication & Access-Control based on Users’ Companion Devices | |
Arfaoui et al. | Practical and privacy-preserving TEE migration | |
CN112087467A (en) | Information encryption transmission method and system based on web system |