SOUL System: secure online USB login system

نویسندگان

  • Joshua Arvin S. Lat
  • Rod Xavier R. Bondoc
  • Kevin Charles V. Atienza
چکیده

The SOUL System is a secure online authentication system involving a two-factor authentication scheme that uses a password and an ordinary hardware device as security token. The three main parts of the system include the website, the ordinary hardware device, and a trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party website to allow two-factor authentication. The security token is any ordinary hardware digital container that holds files such as BMP and PNG where the user’s data are hidden. Examples of possible containers include a USB flash drive, a laptop, a cellular phone, and even a dropbox folder. It must be registered with the trusted third party for it to access the SOUL-System-integrated websites. The trusted third party stores and provides the public keys of both the two-factorlogin-enabled websites and the registered security tokens. The SOUL System ensures a more secure website authentication by adding another requirement to the login and registration processes. Instead of having only a password to log in, the user now requires both a password and the security token to access the website. If any hacker manages to obtain the user’s password but not the contents of the security token, he would still be unable to access the accounts. If the hacker manages to steal the security token, the accounts are still inaccessible without the password. General Terms: Security

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Alternative Graphical Authentication for Online Banking Environments

Many financial institutes tend to implement a secure authentication mechanism through the utilization of the One-Time-Password (OTP) technique. The use of a hardware security token to generate the required OTP has been widespread. Despite the fact that this method provides a fairly high level of security, many systems have not taken into consideration the need for a secure alternative login met...

متن کامل

An Optimal Strong Password Authentication Protocol with USB Sticks

Authentication is the process for identify the correct user or not. The identities enclose mainly the username and passwords for verifying the two entities. The authentication information’s are stored in the form of encryption in a device which is properly registered in the server. At the time of authentication process performs between user and server the intruder can eves-dropping the communic...

متن کامل

SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines

In modern attacks, the attacker’s goal often entails illegal gathering of user credentials such as passwords or browser cookies from a compromised web browser. An attacker first compromises the computer via some kind of attack, and then uses the control over the system to steal interesting data that she can utilize for other kinds of attacks (e. g., impersonation attacks). Protecting user crede...

متن کامل

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user’s computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module. Due to the rapid progress of the Internet, e-banking has become more and more popular all ov...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2013