Trustware: A Device-based Protocol for Verifying Client Legitimacy

نویسندگان

  • Ben Doyle
  • Patrick Korth
  • Kyle Nekritz
  • Zane Salem
چکیده

Online services commonly attempt to verify the legitimacy of users with CAPTCHAs. However, CAPTCHAs are annoying for users, often difficult for users to solve, and can be defeated using cheap labor or, increasingly, with improved algorithms. We propose a new protocol for clients to prove their legitimacy, allowing the client’s devices to vouch for the client. The client’s devices, and those in close proximity, provide a one-time passcode that is verified by the device manufacturer. This verification proves that the client has physical access to expensive and trusted devices, vouching for the client’s legitimacy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model-based quality assurance of protocol documentation: tools and methodology

Microsoft is producing high-quality documentation for Windows client-server and server-server protocols. The Protocol Engineering Team in the Windows organization is responsible for verifying the documentation to ensure it is of the highest quality. Various test-driven methods are being applied, including when appropriate, a model-based approach. This paper describes core aspects of the quality...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Towards Verification of the PANA Authentication and Authorisation Protocol using Coloured Petri Nets

The Extensible Authentication Protocol (EAP) allows a server to request authentication information from a client. In order to transport EAP messages over an IP network, the Protocol for Carrying Authentication for Network Access (PANA) has been developed. This paper applies a protocol engineering methodology using Coloured Petri nets (CPNs) as a step towards formally verifying the design of PAN...

متن کامل

A Smart Card-based Authentication Scheme Using User Identify Cryptography

The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy o...

متن کامل

Incremental Composition of Software Components

In component-based systems, two interacting components are compatible if all sequences of services requested by one components can be provided by the other component. In the case of several components interacting with a single provider, as is typically the case in client–server computing, the requests from different components can be interleaved and therefore verifying component compatibility m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1711.01625  شماره 

صفحات  -

تاریخ انتشار 2017