Non-intrusive authentication

نویسندگان

  • Daniel Alberto Galliano
  • Antonio Lioy
  • Fabio Maino
چکیده

Available security solutions often are not widely used because the associated secure applications are awkward to use or they lack functionality when compared to standard insecure tools. To avoid this dicothomy, we developed a non-intrusive (or external) clientserver authentication framework which requires no modi cation to both the clients and the servers. In this way, full featured clients can be used to the satisfaction of the user community, and o -the-shelf servers can be used with augmented security to the happiness of the system administrators. Our approach relies on software agents which use private keys and a challengeresponse protocol to authenticate TCP/IP connection setup. The paper discusses the general framework as well as a sample implementation. Attacks and countermeasures are also outlined. The approach explicitly doesn't address data privacy during transmission, as we would rather see it placed at application level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-intrusive Person Authentication for Access Control by Visual Tracking and Face Recognition

Abs t r ac t . Face recognition systems typically operate robustly only within highly constrained environments. This paper describes work aimed at performing face recognition in more unconstrained environments such as occur in security applications based on closed-circuit television (CCTV). The system described detects and tracks several people as they m o v e through complex scenes. It uses a ...

متن کامل

Non-intrusive liveness detection by face images

A technique evaluating liveness in face image sequences is presented. To ensure the actual presence of a live face in contrast to a photograph (playback attack), is a significant problem in face authentication to the extent that anti-spoofing measures are highly desirable. The purpose of the proposed system is to assist in a biometric authentication framework, by adding liveness awareness in a ...

متن کامل

Biometric Authentication for Mobile Devices

Mobile devices have found an important place in modern society, with hundreds of millions currently in use. The majority of these use inherently weak authentication mechanisms, based upon passwords and PINs, which can potentially be compromised and thereby allow attackers access to the device and its stored data. A need for stronger authentication is identified and the discussion considers the ...

متن کامل

A Non-intrusive Method for Copy-Move Forgery Detection

The issue of verifying the authenticity and integrity of digital images is becoming increasingly important. Copy-move forgery is one type of image tempering that is commonly used for manipulating digital content; in this case, some part of an image is copied and pasted on another region of the image. Using a non-intrusive approach to solve this problem is becoming attractive because it does not...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997