{"title":"基于数字令牌的远程管理","authors":"A. Pandey, B. Rajendran, B. Bindhumadhava","doi":"10.1109/PKIA.2017.8278962","DOIUrl":null,"url":null,"abstract":"Remote administration i.e. controlling a computer from remote location is becoming increasingly common. To avoid constant manual intervention in allowing access (voluntary) to the system and monitor the activities; token based access can be granted, however the tokens can be replayed and attackers may also extract the token and use it to impersonate as authentic users. In this paper we use concept of digital token for remote authentication of an authorized user without man-in-the-loop approach. The proposed method will not only mitigate replay attack, but also prevent impersonation attempts. It can also be attached to a user account, so as to control permissions and subsequent authorizations during the remote session. The integration of digital token in TLS layer is out of scope of this paper.","PeriodicalId":393622,"journal":{"name":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Digital token based remote administration\",\"authors\":\"A. Pandey, B. Rajendran, B. Bindhumadhava\",\"doi\":\"10.1109/PKIA.2017.8278962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Remote administration i.e. controlling a computer from remote location is becoming increasingly common. To avoid constant manual intervention in allowing access (voluntary) to the system and monitor the activities; token based access can be granted, however the tokens can be replayed and attackers may also extract the token and use it to impersonate as authentic users. In this paper we use concept of digital token for remote authentication of an authorized user without man-in-the-loop approach. The proposed method will not only mitigate replay attack, but also prevent impersonation attempts. It can also be attached to a user account, so as to control permissions and subsequent authorizations during the remote session. The integration of digital token in TLS layer is out of scope of this paper.\",\"PeriodicalId\":393622,\"journal\":{\"name\":\"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PKIA.2017.8278962\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PKIA.2017.8278962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Remote administration i.e. controlling a computer from remote location is becoming increasingly common. To avoid constant manual intervention in allowing access (voluntary) to the system and monitor the activities; token based access can be granted, however the tokens can be replayed and attackers may also extract the token and use it to impersonate as authentic users. In this paper we use concept of digital token for remote authentication of an authorized user without man-in-the-loop approach. The proposed method will not only mitigate replay attack, but also prevent impersonation attempts. It can also be attached to a user account, so as to control permissions and subsequent authorizations during the remote session. The integration of digital token in TLS layer is out of scope of this paper.