Ravilla et al., 2023 - Google Patents
Study and Analysis of FIDO2 Passwordless Web AuthenticationRavilla et al., 2023
View PDF- Document ID
- 3024817272996293462
- Author
- Ravilla H
- Sayal R
- Kulkarni P
- Publication year
- Publication venue
- International Conference on Advances in Computational Intelligence and Informatics
External Links
Snippet
As cyberthreats evolve, traditional password-based authentication systems have proven inadequate. FIDO2 passwordless authentication offers a compelling solution, eliminating passwords while enhancing security and user experience. This survey examines FIDO2's …
- 238000004458 analytical method 0 title abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11824995B2 (en) | Bridging digital identity validation and verification with the FIDO authentication framework | |
| CA3074709C (en) | Mobile authentication interoperability for digital certificates | |
| US10771451B2 (en) | Mobile authentication and registration for digital certificates | |
| Berbecaru et al. | Providing login and Wi-Fi access services with the eIDAS network: a practical approach | |
| TW201141176A (en) | Method and apparatus for providing trusted single sing-on access to applications and internet-based services | |
| Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
| Laka et al. | User perspective and security of a new mobile authentication method | |
| Shukla et al. | A passwordless MFA utilizing biometrics, proximity, and contactless communication | |
| Ravilla et al. | Study and Analysis of FIDO2 Passwordless Web Authentication | |
| Jeyanthi | A review of modern authentication methods in digital systems | |
| Vivekanandan et al. | Efficient user authentication protocol for distributed multimedia mobile cloud environment | |
| Prasad | A comparative study of passwordless authentication | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| Bicakci et al. | QRAuth: A secure and accessible Web authentication alternative to FIDO2 | |
| Aldumiji et al. | Fingerprint and location based multifactor authentication for mobile applications | |
| Gupta et al. | Two-factor authentication using QR code and OTP | |
| Kim et al. | Multimedia image data processing on smartphone for authentication | |
| Griffin | Adaptive weak secrets for authenticated key exchange | |
| Uppuluri et al. | Secure multiparty access and authentication based on advanced fuzzy extractor in smart home | |
| Prasad | Breaking Barriers: Passwordless Authentication as the Future of Security | |
| Seigneur et al. | Identity management | |
| Keil | Social Security | |
| da Paula Manteigueiro | Authentication and Identity Management for the EPOS Project | |
| Pramendorfer et al. | User-to-PC Authentication Through Confirmation on Mobile Devices: On Usability and Performance | |
| Kesarwani et al. | Generalized Multi-server Platform-Based Remote User Authentication |