Tunneled TLS for multi-factor authentication

D. Kirovski, Christopher Meek
{"title":"Tunneled TLS for multi-factor authentication","authors":"D. Kirovski, Christopher Meek","doi":"10.1145/2046631.2046639","DOIUrl":null,"url":null,"abstract":"When logging onto a remote server, <i>s</i>, from a distrusted terminal, <i>c</i>, one can leak secrets such as passwords and account data to malware. To address this problem, we rely on a trusted personal device, <i>p</i>, as the interface available to users for entering their login credentials. In our proposal, <i>p</i> would send the credentials to <i>s</i> using a tunneled TLS session routed via <i>c</i>. The tunneling would be done within an existing TLS session established between <i>c</i> and <i>s</i>. Upon validating the credentials, <i>s</i> would enable <i>c</i> to access the user account. Consequently, <i>c</i> would never see in plain-text user's credentials. As a powerful application, we show that <i>p</i> could use our protocol to execute a credit-card-like payment at a point-of-sale terminal, <i>c</i>, using an account managed by the card-issuing bank, <i>s</i>.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Digital Rights Management Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046631.2046639","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

When logging onto a remote server, s, from a distrusted terminal, c, one can leak secrets such as passwords and account data to malware. To address this problem, we rely on a trusted personal device, p, as the interface available to users for entering their login credentials. In our proposal, p would send the credentials to s using a tunneled TLS session routed via c. The tunneling would be done within an existing TLS session established between c and s. Upon validating the credentials, s would enable c to access the user account. Consequently, c would never see in plain-text user's credentials. As a powerful application, we show that p could use our protocol to execute a credit-card-like payment at a point-of-sale terminal, c, using an account managed by the card-issuing bank, s.
用于多因素身份验证的隧道TLS
当从不受信任的终端c登录到远程服务器s时,可以将密码和帐户数据等机密泄露给恶意软件。为了解决这个问题,我们依赖于一个受信任的个人设备p作为用户输入其登录凭据的可用接口。在我们的提议中,p将使用通过c路由的隧道TLS会话将凭证发送给s。隧道将在c和s之间建立的现有TLS会话中完成。在验证凭证后,s将使c能够访问用户帐户。因此,c永远不会看到纯文本用户的凭据。作为一个功能强大的应用程序,我们展示了p可以使用我们的协议在销售点终端c上执行类似信用卡的支付,使用的是发卡银行管理的帐户s。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信