{"title":"商业环境中基于问题的用户身份验证","authors":"K. Skracic, P. Pale, B. Jeren","doi":"10.1109/MIPRO.2014.6859790","DOIUrl":null,"url":null,"abstract":"The aim of this paper is to analyze question based user authentication methods with regard to their potential use in commercial environments and the limitations they impose. We provide an overview of current work related to question based authentication and describe the difference between static and dynamic questions in user authentication. Additionally, we give an introduction into some common practices used in user authentication in commercial environments. Based on existing research we suggest that only dynamic questions should be used in commercial environments and propose a set of requirements a data source used for creating authentication challenges should meet. Also, we categorize the types of data that can be leveraged for authenticating users.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Question based user authentication in commercial environments\",\"authors\":\"K. Skracic, P. Pale, B. Jeren\",\"doi\":\"10.1109/MIPRO.2014.6859790\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this paper is to analyze question based user authentication methods with regard to their potential use in commercial environments and the limitations they impose. We provide an overview of current work related to question based authentication and describe the difference between static and dynamic questions in user authentication. Additionally, we give an introduction into some common practices used in user authentication in commercial environments. Based on existing research we suggest that only dynamic questions should be used in commercial environments and propose a set of requirements a data source used for creating authentication challenges should meet. Also, we categorize the types of data that can be leveraged for authenticating users.\",\"PeriodicalId\":299409,\"journal\":{\"name\":\"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MIPRO.2014.6859790\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MIPRO.2014.6859790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Question based user authentication in commercial environments
The aim of this paper is to analyze question based user authentication methods with regard to their potential use in commercial environments and the limitations they impose. We provide an overview of current work related to question based authentication and describe the difference between static and dynamic questions in user authentication. Additionally, we give an introduction into some common practices used in user authentication in commercial environments. Based on existing research we suggest that only dynamic questions should be used in commercial environments and propose a set of requirements a data source used for creating authentication challenges should meet. Also, we categorize the types of data that can be leveraged for authenticating users.