[go: up one dir, main page]

Ravilla et al., 2023 - Google Patents

Study and Analysis of FIDO2 Passwordless Web Authentication

Ravilla et al., 2023

View PDF
Document ID
3024817272996293462
Author
Ravilla H
Sayal R
Kulkarni P
Publication year
Publication venue
International Conference on Advances in Computational Intelligence and Informatics

External Links

Snippet

As cyberthreats evolve, traditional password-based authentication systems have proven inadequate. FIDO2 passwordless authentication offers a compelling solution, eliminating passwords while enhancing security and user experience. This survey examines FIDO2's …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal

Similar Documents

Publication Publication Date Title
US11824995B2 (en) Bridging digital identity validation and verification with the FIDO authentication framework
CA3074709C (en) Mobile authentication interoperability for digital certificates
US10771451B2 (en) Mobile authentication and registration for digital certificates
Berbecaru et al. Providing login and Wi-Fi access services with the eIDAS network: a practical approach
TW201141176A (en) Method and apparatus for providing trusted single sing-on access to applications and internet-based services
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Laka et al. User perspective and security of a new mobile authentication method
Shukla et al. A passwordless MFA utilizing biometrics, proximity, and contactless communication
Ravilla et al. Study and Analysis of FIDO2 Passwordless Web Authentication
Jeyanthi A review of modern authentication methods in digital systems
Vivekanandan et al. Efficient user authentication protocol for distributed multimedia mobile cloud environment
Prasad A comparative study of passwordless authentication
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Bicakci et al. QRAuth: A secure and accessible Web authentication alternative to FIDO2
Aldumiji et al. Fingerprint and location based multifactor authentication for mobile applications
Gupta et al. Two-factor authentication using QR code and OTP
Kim et al. Multimedia image data processing on smartphone for authentication
Griffin Adaptive weak secrets for authenticated key exchange
Uppuluri et al. Secure multiparty access and authentication based on advanced fuzzy extractor in smart home
Prasad Breaking Barriers: Passwordless Authentication as the Future of Security
Seigneur et al. Identity management
Keil Social Security
da Paula Manteigueiro Authentication and Identity Management for the EPOS Project
Pramendorfer et al. User-to-PC Authentication Through Confirmation on Mobile Devices: On Usability and Performance
Kesarwani et al. Generalized Multi-server Platform-Based Remote User Authentication