VideoTicket: Detecting Identity Fraud Attempts via Audiovisual Certi cates and Signatures
نویسندگان
چکیده
Identity fraud (IDF) may be defined informally as exploitation of credential information using some form of impersonation or misrepresentation of identity, in the context of transactions. Thus, IDF may be viewed as a combination of two old problems: user authentication and transaction authorization. We propose an innovative approach to detect IDF attempts, by combining av-certificates (digitally-signed audiovisual recordings in which users identify themselves) with av-signatures (audiovisual recordings showing users’ explicit consent for unique transaction details). Avcertificates may be used in on-site transactions, to confirm user identity. In the case of remote (e.g. web-based) transactions, both av-certificates and av-signatures may be used to authenticate users and verify their consent for transaction details. Conventional impersonation attacks, whereby credentials (e.g. passwords, biometrics, or signing keys) are used without the consent of their legitimate users, fail against VideoTicket. The proposed solution assumes that identity thieves have access to such credentials.
منابع مشابه
Improving Performance in Global PKI using Virtual Certi cates and Synthetic Certi cates
| A digital certi cate may be used to inform the world of the public key of its owner. To guard against impersonations and fraud, the receiver needs to perform a series of checks. When a hierarchy of certi cates is involved, and when there are large volumes of messages between two parties, as is frequent in commerce, the repeated validation of the same chain of certi cates consume signi cant re...
متن کاملSmart Certi cates: Extending X.509 for Secure Attribute Services on the Web
An attribute is a particular property of an entity, such as a role, access identity, group, or clearance. If attributes are provided integrity, authentication, and con dentiality, Web servers can then trust these secure attributes and use them for many purposes, such as access control, authorization, authentication, and electronic transactions. In this paper, we present a comprehensive approach...
متن کاملProof-Carrying Code from Certi ed Abstract Interpretation and Fixpoint Compression
Proof-Carrying Code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's safety policy. We show how certi ed abstract interpretation can be used to build a PCC architecture where the code producer can produce program certi cates automatically. Code consumers use proof checkers derived from certi ed analysers to check certi cates. ...
متن کاملCertiicate Revocation and Certiicate Update
A new solution is suggested for the problem of certi cate revocation. This solution represents Certi cate Revocation Lists by an authenticated search data structure. The process of verifying whether a certi cate is in the list or not, as well as updating the list, is made very e cient. The suggested solution gains in scalability, communication costs, robustness to parameter changes and update r...
متن کاملA PCC Architecture based on Certi ed Abstract Interpretation
Proof-Carrying Code (PCC) is a technique for downloading mobile code on a host machine while ensuring that the code adheres to the host's security policy. We show how certi ed abstract interpretation can be used to build a PCC architecture where the code producer can produce program certi cates automatically. Code consumers use proof checkers derived from certi ed analysers to check certi cates...
متن کامل