Kakei et al., 2016 - Google Patents
SSL client authentication with TPMKakei et al., 2016
View PDF- Document ID
- 1257182316287183896
- Author
- Kakei S
- Mohri M
- Shiraishi Y
- Morii M
- Publication year
- Publication venue
- IEICE TRANSACTIONS on Information and Systems
External Links
Snippet
TPM-embedded devices can be used as authentication tokens by issuing certificates to signing keys generated by TPM. TPM generates Attestation Identity Key (AIK) and Binding Key (BK) that are RSA keys. AIK is used to identify TPM. BK is used to encrypt data so that …
- 235000010956 sodium stearoyl-2-lactylate 0 title abstract description 94
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7602539B2 (en) | Quantum Safe Networking | |
AU2016287728B2 (en) | Confidential authentication and provisioning | |
Anakath et al. | Privacy preserving multi factor authentication using trust management | |
US11323274B1 (en) | Certificate authority | |
CA2864347C (en) | Cloud-based key management | |
US8555072B2 (en) | Attestation of computing platforms | |
Khalid et al. | Cloud based secure and privacy enhanced authentication & authorization protocol | |
US10867058B2 (en) | Method and system for protecting secure computer systems from insider threats | |
AU2020284514B2 (en) | Systems, methods, and storage media for permissioned delegation in a computing environment | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Rountree | Security for Microsoft Windows system administrators: introduction to key information security concepts | |
Jayakrishnan et al. | A simple and robust end-to-end encryption architecture for anonymous and secure whistleblowing | |
WO2021073383A1 (en) | User registration method, user login method and corresponding device | |
Kaiser et al. | A multi-layer security system for data access control, authentication, and authorization | |
JP6045018B2 (en) | Electronic signature proxy server, electronic signature proxy system, and electronic signature proxy method | |
Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
Kakei et al. | SSL client authentication with TPM | |
Sudha et al. | A survey on different authentication schemes in cloud computing environment | |
Benson et al. | Security & integrity in FHIR | |
Seo | The Future of Digital Authentication: Blockchain-Driven Decentralized Authentication in Web 3.0 | |
US20240012933A1 (en) | Integration of identity access management infrastructure with zero-knowledge services | |
Corella et al. | Strong and convenient multi-factor authentication on mobile devices | |
Kansro et al. | Users authentication issues and challenges in electronic commerce applications | |
CN110874464B (en) | User authentication data management method and device | |
Gerard | Identity and Access Management Via Digital Certificates |