{"title":"新的认证因素:你处理的东西","authors":"S. Shah, Fazl-e-Hadi Riphah, A. A. Minhas","doi":"10.1109/ICFCC.2009.79","DOIUrl":null,"url":null,"abstract":"In traditional computing system, user Authentication is dependent on four authentication factors i.e., Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint), and Something You know (e.g., a password/PIN code) and Somebody You know. In this paper we explore new factor of Authentication, that is, Something You process. Valid user identification is the demand of computing society and it plays a very key role in the arena of security. This study explores a new factor of authentication, human cognitive level of authentication for access control, and proposes new model of multilevel security. This study explores its usage in providing primary mode of authentication in a new and simplified way and discusses its pros and cons.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"59 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"New Factor of Authentication: Something You Process\",\"authors\":\"S. Shah, Fazl-e-Hadi Riphah, A. A. Minhas\",\"doi\":\"10.1109/ICFCC.2009.79\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In traditional computing system, user Authentication is dependent on four authentication factors i.e., Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint), and Something You know (e.g., a password/PIN code) and Somebody You know. In this paper we explore new factor of Authentication, that is, Something You process. Valid user identification is the demand of computing society and it plays a very key role in the arena of security. This study explores a new factor of authentication, human cognitive level of authentication for access control, and proposes new model of multilevel security. This study explores its usage in providing primary mode of authentication in a new and simplified way and discusses its pros and cons.\",\"PeriodicalId\":338489,\"journal\":{\"name\":\"2009 International Conference on Future Computer and Communication\",\"volume\":\"59 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Future Computer and Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFCC.2009.79\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Future Computer and Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFCC.2009.79","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
New Factor of Authentication: Something You Process
In traditional computing system, user Authentication is dependent on four authentication factors i.e., Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint), and Something You know (e.g., a password/PIN code) and Somebody You know. In this paper we explore new factor of Authentication, that is, Something You process. Valid user identification is the demand of computing society and it plays a very key role in the arena of security. This study explores a new factor of authentication, human cognitive level of authentication for access control, and proposes new model of multilevel security. This study explores its usage in providing primary mode of authentication in a new and simplified way and discusses its pros and cons.