Sensor-Enhanced Authentication Token for Dynamic Identity Management
نویسنده
چکیده
sensor, authentication, identity management, security communication protocol Identity management as a component in applications is increasing in importance. Many applications need to manage user identities in a dynamic way because threats or conditions under which the application is to be used can change rapidly. We describe a new system for dynamic identity management that can accommodate changes in authentication requirements based on context. Central to this system is a user neutral, context aware token that is worn by a person seeking access to resources or assets. The token device stores information related to the wearer’s security permissions including biometric data. A unique feature of this system is the use of user attachment sensors that detect if the token has been removed from the wearer’s possession, and return it to its neutral state. Using this token, we explore security in context aware and dynamic systems, and give details from a prototype system.
منابع مشابه
Identity Metasystem in Location Based Persistent Authentication
Persistent authentication in smart environments (PAISE) is a new effective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more usercentric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user is simply persistently tracked by sensors in the smart environment...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملAccount Management Method with Blind Signature Scheme
Reducing the risk of information leaks is one of the most important functions of identity management systems. To achieve this purpose, Dey et al. have already proposed an account management method for a federated login system using a blind signature scheme. In order to ensure account anonymity for the authentication provider, referred to as an IDP (identity provider), a blind signature scheme i...
متن کاملUser-Centric Identity Using ePassports
The worldwide introduction of ePassports presents a unique opportunity for the online identity community to implement trustworthy identity providers. The ePassport provides citizens with a strong authentication token within a global Public Key Infrastructure backed by government administrations. This paper studies the possibilities for leveraging the ePassport for usercentric identity and repor...
متن کاملFederated Identity Management - We Built It; Why Won't They Come?
M any companies take advantage of single-sign-on (SSO) technologies. After a successful login, the authentication service sends the computer a security token, which is subsequently forwarded as proof of authentication each time that computer accesses a protected service. Examples of services linked through SSO include access to network drives, email services, a corporate intranet, project porta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003