{"title":"利用智能卡和生物识别技术的多级认证方案","authors":"Mücahit Mutlugün, I. Sogukpinar","doi":"10.1109/SECURWARE.2009.22","DOIUrl":null,"url":null,"abstract":"Authentication is an important part of security area. Smart Cards and Biometrics are widely used in authentication schemes. In this work, we propose a novel architecture and scheme for remote authentication. In this architecture, authentication level is decided by a policy server. The scheme provides an ability to use three authentication factors within different levels. Additional credentials are requested from user upon the authentication level determined by the policy server. The proposed scheme is designed to resist well-known attacks like replay and forgery attacks. At the same time, it fulfills many requirements expected from authentication schemes like mutual authentication and not to keep verification table. We also compared our scheme with well known schemes in the literature.","PeriodicalId":382947,"journal":{"name":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics\",\"authors\":\"Mücahit Mutlugün, I. Sogukpinar\",\"doi\":\"10.1109/SECURWARE.2009.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication is an important part of security area. Smart Cards and Biometrics are widely used in authentication schemes. In this work, we propose a novel architecture and scheme for remote authentication. In this architecture, authentication level is decided by a policy server. The scheme provides an ability to use three authentication factors within different levels. Additional credentials are requested from user upon the authentication level determined by the policy server. The proposed scheme is designed to resist well-known attacks like replay and forgery attacks. At the same time, it fulfills many requirements expected from authentication schemes like mutual authentication and not to keep verification table. We also compared our scheme with well known schemes in the literature.\",\"PeriodicalId\":382947,\"journal\":{\"name\":\"2009 Third International Conference on Emerging Security Information, Systems and Technologies\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Third International Conference on Emerging Security Information, Systems and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECURWARE.2009.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECURWARE.2009.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics
Authentication is an important part of security area. Smart Cards and Biometrics are widely used in authentication schemes. In this work, we propose a novel architecture and scheme for remote authentication. In this architecture, authentication level is decided by a policy server. The scheme provides an ability to use three authentication factors within different levels. Additional credentials are requested from user upon the authentication level determined by the policy server. The proposed scheme is designed to resist well-known attacks like replay and forgery attacks. At the same time, it fulfills many requirements expected from authentication schemes like mutual authentication and not to keep verification table. We also compared our scheme with well known schemes in the literature.