Chew et al., 1997 - Google Patents
IAuth: An authentication system for Internet applicationsChew et al., 1997
- Document ID
- 11739136743109030382
- Author
- Chew S
- Ng K
- Chee C
- Publication year
- Publication venue
- Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97)
External Links
Snippet
With the advent of the Internet, an era of distributed computing is rapidly taking hold. The potential offered by distributed computing increases opportunities for security breaches. This emphasizes the importance of security practices, such as authentication. We have designed …
- 238000000034 method 0 description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Horn et al. | Authentication protocols for mobile network environment value-added services | |
US7630493B2 (en) | Multiple factor private portion of an asymmetric key | |
US8340287B2 (en) | Securing multifactor split key asymmetric crypto keys | |
US8099607B2 (en) | Asymmetric crypto-graphy with rolling key security | |
US7069435B2 (en) | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys | |
US7017041B2 (en) | Secure communications network with user control of authenticated personal information provided to network entities | |
US7599493B2 (en) | Asymmetric key pair having a kiosk mode | |
US7386720B2 (en) | Authentication protocol using a multi-factor asymmetric key pair | |
US8213608B2 (en) | Roaming utilizing an asymmetric key pair | |
US6940980B2 (en) | High security cryptosystem | |
US20030115452A1 (en) | One time password entry to access multiple network sites | |
US20080313719A1 (en) | Methods and Apparatus for Delegated Authentication | |
US7596697B2 (en) | Technique for providing multiple levels of security | |
KR20090095630A (en) | Authentication delegation based on re-verification of cryptographic evidence | |
JP2006511104A (en) | Encryption method and encryption apparatus for secure authentication | |
CA2463034A1 (en) | Method and system for providing client privacy when requesting content from a public server | |
JP2001186122A (en) | Authentication system and authentication method | |
US7565527B2 (en) | Technique for asymmetric crypto-key generation | |
Gollmann et al. | Authentication services in distributed systems | |
GB2378104A (en) | Authentification for computer networks using a hybrid protocol and digital certificate | |
Persiano et al. | A secure and private system for subscription-based remote services | |
Chatterjee et al. | A novel multi-server authentication scheme for e-commerce applications using smart card | |
Parnerkar et al. | Secret key distribution protocol using public key cryptography | |
Chew et al. | IAuth: An authentication system for Internet applications | |
Berger | A Scalable Architecture for Public Key Distribution Acting in Concert with Secure DNS |