[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kakei et al., 2016 - Google Patents

SSL client authentication with TPM

Kakei et al., 2016

View PDF
Document ID
1257182316287183896
Author
Kakei S
Mohri M
Shiraishi Y
Morii M
Publication year
Publication venue
IEICE TRANSACTIONS on Information and Systems

External Links

Snippet

TPM-embedded devices can be used as authentication tokens by issuing certificates to signing keys generated by TPM. TPM generates Attestation Identity Key (AIK) and Binding Key (BK) that are RSA keys. AIK is used to identify TPM. BK is used to encrypt data so that …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Similar Documents

Publication Publication Date Title
JP7602539B2 (en) Quantum Safe Networking
AU2016287728B2 (en) Confidential authentication and provisioning
Anakath et al. Privacy preserving multi factor authentication using trust management
US11323274B1 (en) Certificate authority
CA2864347C (en) Cloud-based key management
US8555072B2 (en) Attestation of computing platforms
Khalid et al. Cloud based secure and privacy enhanced authentication & authorization protocol
US10867058B2 (en) Method and system for protecting secure computer systems from insider threats
AU2020284514B2 (en) Systems, methods, and storage media for permissioned delegation in a computing environment
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Rountree Security for Microsoft Windows system administrators: introduction to key information security concepts
Jayakrishnan et al. A simple and robust end-to-end encryption architecture for anonymous and secure whistleblowing
WO2021073383A1 (en) User registration method, user login method and corresponding device
Kaiser et al. A multi-layer security system for data access control, authentication, and authorization
JP6045018B2 (en) Electronic signature proxy server, electronic signature proxy system, and electronic signature proxy method
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
Kakei et al. SSL client authentication with TPM
Sudha et al. A survey on different authentication schemes in cloud computing environment
Benson et al. Security & integrity in FHIR
Seo The Future of Digital Authentication: Blockchain-Driven Decentralized Authentication in Web 3.0
US20240012933A1 (en) Integration of identity access management infrastructure with zero-knowledge services
Corella et al. Strong and convenient multi-factor authentication on mobile devices
Kansro et al. Users authentication issues and challenges in electronic commerce applications
CN110874464B (en) User authentication data management method and device
Gerard Identity and Access Management Via Digital Certificates