{"title":"USB Key-Based Dual-Factor Dynamic Authentication Scheme","authors":"Lei Li, QUAN LIU, Xuemei Jiang","doi":"10.1109/CIS.2010.103","DOIUrl":null,"url":null,"abstract":"In the Digital Rights Management (DRM) platform, the weak security of user authentication online and the digital content usage offline are analyzed, and a dual-factor dynamic authentication scheme is designed, which is based on the Personal Identity Number (PIN) authentication and the hardware USB Key digital certificate authentication. On this basis, the architecture of the dynamic certification scheme is discussed mainly, and the dual-factor security authentication protocol is elaborated in detail. The feasibility of this scheme in the DRM platform is analyzed. The scheme not only strengthens the security and dynamic of the identity authentication, but also enhances reliability against offline proliferation.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the Digital Rights Management (DRM) platform, the weak security of user authentication online and the digital content usage offline are analyzed, and a dual-factor dynamic authentication scheme is designed, which is based on the Personal Identity Number (PIN) authentication and the hardware USB Key digital certificate authentication. On this basis, the architecture of the dynamic certification scheme is discussed mainly, and the dual-factor security authentication protocol is elaborated in detail. The feasibility of this scheme in the DRM platform is analyzed. The scheme not only strengthens the security and dynamic of the identity authentication, but also enhances reliability against offline proliferation.