[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Klevjer, 2013 - Google Patents

Requirements and Analysis of Extended HTTP Digest Access Authentication

Klevjer, 2013

View PDF
Document ID
9066745062262246668
Author
Klevjer H
Publication year

External Links

Snippet

Authenticating to an online service is usually done by providing a username and password in some protected form so that the server can verify that those credentials correspond to a registered identity authorised for access. For the average Internet user, managing one's …
Continue reading at www.duo.uio.no (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0807Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets

Similar Documents

Publication Publication Date Title
Das et al. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
US8353016B1 (en) Secure portable store for security skins and authentication information
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Siriwardena Advanced API Security
Ghazizadeh et al. A survey on security issues of federated identity in the cloud computing
Al-Zubaidie et al. RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Tirfe et al. A survey on trends of two-factor authentication
US20150328119A1 (en) Method of treating hair
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
US9954853B2 (en) Network security
Mun et al. A novel secure and efficient hash function with extra padding against rainbow table attacks
Varmedal et al. The offpad: Requirements and usage
Klevjer et al. Extended HTTP digest access authentication
Anand et al. Lightweight Technical Implementation of Single Sign‐On Authentication and Key Agreement Mechanism for Multiserver Architecture‐Based Systems
Al Kabir et al. An overview of the present and future of user authentication
Aiash A formal analysis of authentication protocols for mobile devices in next generation networks
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Deeptha et al. Extending OpenID connect towards mission critical applications
Nash et al. Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy
Kim et al. Secure user authentication based on the trusted platform for mobile devices
Fongen et al. The integration of trusted platform modules into a tactical identity management system
Klevjer Requirements and Analysis of Extended HTTP Digest Access Authentication
Ghazizadeh et al. Secure OpenID authentication model by using Trusted Computing