Please enable JavaScript.
Coggle requires JavaScript to display documents.
Authentication Systems - Coggle Diagram
Authentication Systems
Real Time Web-based Audio/Video Communications
Needs
WebRTC lacking an authentication system
Use common third party authentication services may be too constraining
Solution: Guest scenario
Allowing only known users
The authentication of the client is actually required.
Isolated or Federated scenario is best choices
Allowing an unknown user
That security considerations are not applicable in the case that an unknown user is allowed to.
Is easy to use for a user if no specific authentication is required to start the A/V real time communication in the Web.
Differentiation
Those solutions are as much as possible aligned with system security requirements
Closely satisfying user preferences.
Benefits
Meets a higher security level
Fully Usable Speed
Fully Usable Efficiency
Highly Usable Learnability
Highly Usable Memorability
Highly Usable User preferences
Fully Usable Accessibility
User Authentication Method using Topographical Information of Google Maps
Needs
E-learning faces a major problem with respect to personal authentication
In distance learning, a teacher does not have the means to identify a student directly
It is practically impossible to monitor many students simultaneously by web camera
With a traditional ID-password pair, we cannot prevent spoofing.
Solution:
Using a mobile telephone with Google Maps
Differentiation
The authentication system accesses Google Maps using the address of the user.
It acquires the topographical information as a bitmapped image.
By means of a flood fill algorithm, the system paints the fill area of the address.
The system permits authentication on the constraint that the circle of the location information from a mobile overlaps with the painted fill area
Benefits
Improved the authentication system
Enhanced the accuracy of authentication
Enables us to pinpoint a student's position with greater accuracy.
A Secure and Convenient Mobile Solution for Passwords
Needs
Password managers rely on one master password to secure all of our passwords. If this master password is compromised then all other passwords can be recovered
Solution: Sesame
secure yet convenient mobile-based, voice-activated password manager
It combines all different methods of user authentication to create a more robust digital vault for personal data
Differentiation
Each password is encrypted with a new fresh key on the user’s mobile device for maximum security.
The keys are stored in our servers in a protected format.
Very secure digital vault that can protect users’ private data.
Benefits
The user has the option of backing up the encrypted passwords in any cloud service.
The user need not assume any trust to neither our servers nor any cloud storage.
There is no need to enter a master password every time since speaker recognition is used.
Can be generalized for secure cloud storage of any type of data.
A Secure and Practical Authentication Scheme Using Personal Devices
Needs
Conventional static username and password protocols suffer from various security issues.
Memorizing usernames and passwords
Legacy authentication methods have failed over and over, and they are not immune against a wide variety of attacks
Leaking or compromising one account could cause an attacker to infiltrate other systems and endanger users’ security and privacy.
Attackers have created numerous high-tech techniques to steal users’ credentials
Solution: authentication protocol
Consists of 4 algorithms for authentication scheme
Differentiation
This scheme utilize different cryptographic primitives
Does not require an authentication server to maintain static username and password tables for identifying and verifying the legitimacy of the login users.
Benefits
Get rid of many issues such as memorizing usernames and passwords
Widespread usage of ubiquitous computing and various intelligent portable and wearable devices
It is secure against password related attacks
It can resist replay attacks, shoulder surfing attacks, phishing attacks, and data breach incidents.
Novel Authentication Methods and Gradual Security Levels on Smartphones
Needs
The PIN does not sufficiently protect the personal data stored.
The idea of combining a gradual security system did not meet with great approval.
Solution: focus group
The participants were clustered into four groups
Focus group discuss about which authentication methods and related issue
Differentiation
Smartphones provide different security layers
Fingerprint Authentication with a perceived security of 95%, an overall acceptance of 89% and a willingness of use of 95%
Benefits
Gradual security is a useful concept and it would help to improve the security of personal data stored on phones.
The qualitative results can not merely be attributed to the specific group characteristics but possess a higher validity
Even if there is a light awareness of possible security threats most of the respondents did not really think about them or their possible consequences.
A Fair and Dynamic Password Authentication System
Needs
sophisticated cryptosystems or cryptographic protocols
problem of session key exchange and the property of forward secrecy
Solution
fair password authentication system
Detect and inspect the real cause of the authentication failure
Differentiation
users were illegal when the authentication failed, being unfair to the users in schemes.
Benefit
able to resist replay attacks and keylogger attacks
System administrators are unable to obtain or compute the users’ dynamic passwords
The security is based on the theory of quadratic residue and computational infeasibility of the integer factorization problem.
complete authentication simply by showing the password without the necessity to interact with the system.
The user can choose his password freely during registration
Users can use smart cards to save to calculate their passwords, increasing convenience and security.
Authentication System Using Reduced Joint Feature Vector of Iris and Face
Needs
Recognition based on modalities may not be sufficiently robust
Current approaches to the use of single bio metrics in personal identity authentication are limited
No single bio metric is generally considered both sufficiently accurate and user-acceptable for universal application
Solution
bio metric authentication system
system based on the fusion of two user-friendly biometric modalities: Iris and Face
Differentiation
This system can operate in two modes: to identify a particular person or to verify a person’s claimed identity.
Benefit
improve significantly the performance of multimodal identification systems
Iris and face can be used efficiently in multi modal system
can be simultaneously acquired and used to achieve the performance that may not be possible by single biometric alone.
higher discriminating power and lower dimensional
translation and rotation invariant ability
A Network Authentication System with Multi-Bio metrics
Needs
The role of authentication techniques to prevent unauthorized access by malicious users becomes more significant.
Methods based on human memory and physical devices cannot escape vulnerabilities caused by forgetfulness or losses
Benefits
useful to build a network authentication system with multi-bio metric
schedules jobs to responsible persons.
A larger size of bio metrics data may not enlarge authentication time over a network very much
Solution
Two authentication models as authentication architectures
CO-located Model
The Separated Model
Differentiation
support various applications where user authentication is necessary.
User Authentication Methodology Using Numeric Password and Fingerprint Bio metric Information
Needs
concerning about user information security
user authentication is vulnerable
threat of information leakage
Problem of authenticates a person by machines
Solution
that combines numeric-based password and biometric-based fingerprint authentication system
Use the information in the user’s fingerprint, authentication keys to obtain security.
Differentiation
The user cannot change user’s fingerprint information, but the user has a set password to easily change
Benefits
An attacker does not have the advantage of leaked password
Provides security and flexibility.
it can remove authentication errors
Three-Factor User Authentication Method Using Biometrics Challenge Response
Needs
An attacker can remotely change the legitimate user’s call-transfer setting
Differentiation
Users call the server and the server checks the caller’s number
Solution
A three-factor authentication method
Benefit
method enables a biometrics challenge response by using voice recognition and voice print recognition to prevent a replay attack
Is practical due to the use of multiple authentication factors
Crossover error rate of voiceprint authentication on public networks is 6.47%