On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking

نویسندگان

  • P. C. van Oorschot
  • Stuart G. Stubblebine
چکیده

We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen or forged credentials, we propose an authentication architecture and system combining a physical location cross-check, a method for assuring uniqueness of location claims, and a centralized verification process. We provide two example protocol implementations of this system, for two representative applications. We believe that this system merits consideration for practical use, and will stimulate further technical solutions to the broad problem of identity theft.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling

One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identity-corroborating information. It is exacerbated by the availability of personal information on the Internet. Published research proposing technical solutions is sparse. In this paper, we identify some underlying problems facilitating identity theft. To address the proble...

متن کامل

Infrared Counter-Countermeasure Efficient Techniques using Neural Network, Fuzzy System and Kalman Filter

This paper presents design and implementation of three new Infrared Counter-Countermeasure (IRCCM) efficient methods using Neural Network (NN), Fuzzy System (FS), and Kalman Filter (KF). The proposed algorithms estimate tracking error or correction signal when jamming occurs. An experimental test setup is designed and implemented for performance evaluation of the proposed methods. The methods v...

متن کامل

The Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students

Background. Today, online shopping has become one of the most important components of modern marketing that had both positive and negative consequences for customers. Objectives. The purpose of present research was to study the consequences of fear of identity theft in sport products online shopping from the perspective of physical education students. Methods. The present study is a descripti...

متن کامل

The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond

Executive Summary " Crimeware " is software that performs illegal actions unanticipated by a user running the software, which are intended to yield financial benefits to the distributor of the software. Crimeware is a ubiquitous fact of life in modern online interactions. It is distributed via many mechanisms, including: • Social engineering attacks convincing users to open a malicious email at...

متن کامل

Protocols and Systems for Privacy Preserving Protection of Digital Identity

Bhargav-Spantzel, Abhilasha Ph.D., Purdue University, December, 2007. Protocols and Systems for Privacy Preserving Protection of Digital Identity. Major Professor: Elisa Bertino. To support emerging online activities within the digital information infrastructure, such as commerce, healthcare, entertainment and scientific collaboration, it is increasingly important to verify and protect the digi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005