23,236 research outputs found

    Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application

    Get PDF
    Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to generate token or OTP still have vulnerable because can attacked from tokens steal through MITM and found that the generated tokens with the same value. Therefore, we propose a two-factor authentication framework based on ethereum blockchain with dApp as token generation system. Firstly, outcome from the analysis of the system, next succeeded in creating a two-factor authentication system without using third-parties. Second, token system generate up to 3164 different tokens  in one second and has been collisions tested. Third, security method to protect token from MITM attack. The attacker unable to get access caused all the checking are done by dApp user authentication

    METHOD AND SYSTEM FOR SECURE CREDENTIAL GENERATION

    Get PDF
    One embodiment includes a method performed by an authentication provider. The method includes receiving a sensitive information from a user. For example, the sensitive information may include payment data or a healthcare data of the user. The method includes transmitting the sensitive information to a processing server and receiving a long living token associated with the sensitive information from the processing server. The authentication provider stores the long living token. The method further includes the authentication provider receiving, from a resource provider, a request for a subset of the sensitive information. The method includes transmitting the subset of the sensitive information and the long living token to the processing server; and receiving a short living token representing the subset of the sensitive information from the processing server. The authentication provider transmits the short living token to the resource provider. The resource provider transmits an authorization request message to the processing server for processing a transaction, the authorization request message including at least the short living token and transaction information associated with the transaction authorization response message including the identifier for the alternative funding source. FIG.1

    SYSTEM AND METHOD FOR AUTHENTICATION USING MOBILE DEVICE

    Get PDF
    The methods and system disclosed in present disclosure is to perform authentication of a user device before provisioning card details in a digital wallet. In present disclosure, user taps user device on mobile device, upon tapping interaction data is sent to user device. The user device further generates cryptogram using interaction data and credentials of user device. The cryptogram generated is sent to server computer, which verifies whether card details can be provisioned by sending token request to token service computer which further sends authentication request to authentication server system. The authentication server system authenticates received cryptogram and generates validation result either to be successful or to be a failure. The validation result is sent to token service system which in turn sends token response to server computer. Further, server computer decides whether to provision and store the card details and the token received based on token response. Finally, result of provisioning is updated to the user through the mobile device. Hence, the method and the system of the present disclosure eases the provisioning process for cardholders by removing the need to manually enter card details or take a photo of the card and provides assurance that the genuine card is in the possession of individual initiating the provisioning request

    Token-based Fast Authentication for Wireless Network

    Get PDF
    Wireless Networks based on WIFI or WIMAX become popular and are used in many places as compliment network to wired LAN to support mobility. The support of mobility of clients, the continuous access anywhere and anytime make WLAN preferable network for many applications. However, there are some issues associated with the usage of WLAN that put some restriction on adapting this technology everywhere. These issues are related to using the best routing algorithm to achieve good performance of throughput and delay, and to securing the open access to avoid attacks at the physical and MAC layer. IEEE 802.1x, suggested a solution to address the security issue at the MAC layer and but there are varieties of implementations address this solution and they differ in performance. IEEE 802.1af tried to address other security issue remained at the MAC layer but it is still at early stage and need verification for easy deployment. In this paper a new technique for securing wireless network using fast token-based authentication has been invented to address the vulnerability inherited by the wireless network at the MAC layer using fast authentication process. This technique is based on an authentication server distributing a security token, public authentication key, and network access key parameter to eligible mobile client MCs during registration. All messages will be encrypted during registration using temporary derived token key, but it will use derived valid token key during authentication. Authenticated MCs will then use derived group temporal key generated from the network access parameter key to encrypt all messages exchanged over the wireless network. The token, the authentication key and the access network parameter key will be only distributed during registration. This makes the security parameters known only to authentication server, authenticator and MC. Hence, this technique will protect the wireless network against attack since attackers are unable to know the token and other security keys. Moreover, it will avoid the exchange of public keys during authentication such as the one used in other existing technologies, and consequently speedup the authentication phase which is very critical to wireless technologies

    BRAILLE OTP TOKEN

    Get PDF
    The present disclosure relates to a system and a method of providing secured authentication to visually impaired users. The secured authentication is provided by connecting a braille token device (120) with a user mobile device (110) and receiving sensitive information in the braille token device read from Short Mailing Service (SMS) received in the user mobile device. To receive the sensitive information, the braille token device includes a driver program that may match a format of sensitive information stored in the braille token device with the format of the sensitive information received in the SMS of the user mobile device. If the format matches, the braille token device reads the sensitive information from the SMS. The proposed techniques may help the users to authenticate payment transactions in a secured wa

    TOWARD THE SYSTEMATIZATION OF ACTIVE AUTHENTICATION RESEARCH

    Get PDF
    Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted on a variety of data sources, features and classification schemes. This work proposes an extensible research framework to aid the systemization and preservation of research in this field by standardizing the interface for raw data collection, processing and interpretation. Specifically, this framework contributes transparent management of data collection and persistence, the presentation of past research in a highly configurable and extensible form, and the standardization of data forms to enhance innovative reuse and comparative analysis of prior research
    • …
    corecore