intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

lesson 7: Authentication

Chia sẻ: Gacon | Ngày: | Loại File: PPT | Số trang:38

69
lượt xem
6
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Successful client-side authentication with the password invokes the token to generate a stored or generated passcode, which is sent to the serverside for authentication.

Chủ đề:
Lưu

Nội dung Text: lesson 7: Authentication

  1. LESSON 7 Authentication
  2. User management ♦ Authentication - Xác nhận người sử dụng ♦ Authorization - Kiểm soát quyền của người sử dụng ♦ Accounting - Theo dõi thống kê hành động
  3. What is authentication? ♦ Identification – Dấu hiệu, công cụ nhận dạng, nhận biết. ♦ Quá trình kiểm tra dấu hiệu nhận biết gọi là xác thực - Authentication. ♦ 3 Categories: – What you know – What you have – Who you are
  4. What you know ♦ Password ♦ Passphrase ♦ PIN ♦ Challenge/Response
  5. PASSWORD ♦ Ưu điểm - Đơn giản - Dễ sử dụng và quản lý ♦ Nhược điểm - Phải nhớ - Không an toàn
  6. Độ an toàn của Password ♦ Alphabet ♦ Recommend - Độ dài không nhỏ hơn 8 - Tổ hợp chữ hoa, chữ thường, số, các ký tự đặc biệt ♦ Các phương pháp tấn công - Từ điển - Lựa chọn - Vét cạn
  7. What you have ♦ One time password ♦ Keys Exchange ♦ Digital authentication – physical devices to aid authentication ♦ Common examples: – eToken – smart cards – RFID
  8. One Time Password ♦ Pseudo-random Generator ♦ Session time ♦ Synchronization
  9. eToken ♦ Can be implemented on a USB key fob or a smart card ♦ Data physically protected on the device itself ♦ On the client side, the token is accessed via password ♦ Successful client-side authentication with the password invokes the token to generate a stored or generated passcode, which is sent to the server- side for authentication.
  10. eToken ♦ May store credentials such as passwords, digital signatures and certificates, and private keys ♦ Can offer on-board authentication and digital signing
  11. Smart cards ♦ Size of a credit card ♦ Usually an embedded microprocessor with computational and storage capabilities ♦ Programmable platforms: – C/C++ – Visual Basic – Java – .Net (beta)
  12. Smart Cards cont’d ♦ Contact vs. contactless ♦ Memory vs. microprocessor
  13. RFID ♦ RFID - Radio Frequency IDentification ♦ Integrated circuit(s) with an antenna that can respond to an RF signal with identity information ♦ No power supply necessary—IC uses the RF signal to power itself ♦ Susceptible to replay attacks and theft ♦ Examples: – Smart Tag, EZPass – Garage parking permits
  14. RFID ♦ 13.56Mhz read/write support ♦ May communicate with a variety of transponders (ISO15693, ISO14443 Type A & B, TagIt, Icode, etc.) ♦ Reader is controlled via PCMCIA interface using an ASCII protocol
  15. Who you are ♦ Biometric authentication – Use of a biometric reading to confirm that a person is who he/she claims to be ♦ Biometric reading – A recording of some physical or behavioral attribute of a person
  16. Physical Biometrics ♦ Fingerprint • Smell ♦ Iris • Thermal Face ♦ Hand Geometry • Hand Vein ♦ Finger Geometry • Nail Bed ♦ Face Geometry • DNA ♦ Ear Shape • Palm Print ♦ Retina
  17. Behavioral Biometrics ♦ Signature ♦ Voice ♦ Keystroke ♦ Gait
  18. Fingerprints ♦ Vast amount of data available on fingerprint pattern matching ♦ Data originally from forensics ♦ Over 100 years of data to draw on – Thus far all prints obtained have been unique
  19. Fingerprint Basics ♦ Global features – Features that can be seen with the naked eye – Basic ridge patterns ♦ Local features – Minutia points – Tiny unique characteristics of fingerprint ridges used for positive identification
  20. Basic Ridge Patterns • Loop • 65% of all fingerprints • Arch • Plain and tented arch • Whorl • 30% of all fingerprints • One complete circle
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2