Knowledge-Based and Token-Based Authentication
نویسنده
چکیده
The issue in today’s society is access, whether entering into a restricted building like an office or home, or attempting to access a bank account or credit card. An individual must prove their identity before authorized for utilization. Bruce Schneier, a well-known security expert and CEO of Counterpane Internet Security, states the need to be able to identify, authenticate, and authorize individuals is a critical component to security. Two different distinctions need to be made regarding biometrics:
منابع مشابه
Various Authentication Tecniques for Security Enhancement
Authentication is the art of confirming the truth of an attribute of an entity. Entity may be a person. If a entity is a person it can authenticate with the help of its traits such as his facial attribute, fingerprinting attribute, retina attribute, palm attribute, signature of a person, password, token attributes etc. There are so many attacks to which these techniques are vulnerable. So, toda...
متن کاملA Multi-factor Authentication Scheme including Biometric Characteristics as One Factor
Multi-factor authentication schemes have been proved to be very useful in many authentication systems including biometric ones. In this paper we have proposed a multi-factor authentication scheme, in which one of the main components is represented by the generation of a token and a password (known as the kernel of the multi-factor scheme) and another component is represented by a module which w...
متن کاملA Secure Certificate for Secure Group Communication
Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...
متن کاملUser perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
This paper describes an experiment to investigate user perceptions of the usability and security of single-factor and two-factor authentication methods in automated telephone banking. In a controlled experiment with 62 banking customers a knowledge-based, single-factor authentication procedure, based on those commonly used in the financial services industry, was compared with a two-factor appro...
متن کاملGenerate Context Metadata Based on Biometric System
This paper presents the design and the architecure implementation of a system, which provides an user access control framework by means of multiple authentication methods. The user description is provided according to the semantic web standard architecture, based on two different kind of metadata: profile and context. Biometric technology guarantees the maximal level of security, and it allows ...
متن کاملAn Improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm
Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually exclusive manner. This paper presents fully distributed improved token based mutual exclusion algorithm for distributed system. In this algorithm, a process which...
متن کامل