Using Mobile Devices for User Authentication

被引:1
作者
Lach, Jacek [1 ]
机构
[1] Silesian Tech Univ, PL-44100 Gliwice, Poland
来源
COMPUTER NETWORKS | 2010年 / 79卷
关键词
security; user authentication; mobile devices;
D O I
10.1007/978-3-642-13861-4_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most common methods of user authentication utilizes passwords. This technique is widely spread and well known. Its main drawback is that it stresses human memory to allow for successful authentication and still remains in the domain which is called weak authentication. This paper presents a solution to this problem by introducing a form of two factor authentication by utilization of smartphones. The idea of such system is presented as well as a sample implementation, called MOTH (an acronym for MObile auTHentication), which allows for user authentication. The discussion of the system's security and its limitations is also presented.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 9 条