DocumentCode :
3417356
Title :
In-the-wire authentication: Protecting client-side critical data fields in secure network transactions
Author :
Currie, Mark William
Author_Institution :
Ziliant Syst., Durban, South Africa
fYear :
2009
fDate :
14-16 Jan. 2009
Firstpage :
232
Lastpage :
237
Abstract :
Secure Internet services like online banking require a "trusted terminal" on the client-side. However, even where strong client-side security is employed, the client PC is often used for input and output of sensitive information like PINs/passwords, amounts, account numbers, etc. These transactions are therefore vulnerable to manipulation by malware. A method is presented here allowing web users to share small amounts of secret information including passwords and account numbers with a large number of existing Internet services by creating a cryptographically secure trusted path between the web user and the service. The trusted path is created with the support of a hand-held user terminal device "in-the-wire" between the user\´s PC and the service thus preventing malware on the user\´s PC from manipulating login and other sensitive data. A key feature is that the trusted terminal device can be retrofitted on the client-side and require no changes to the server-side. This creates a new class of client-centric communications security hardware allowing web users to protect their transactions using strong hardware security without relying on service providers. It offers the industry an alternative to the current service-centric approach which is often hamstrung by a chicken-and-egg problem of critical mass adoption.
Keywords :
Internet; computer network security; invasive software; Internet services security; client centric communications security; critical mass adoption; cryptographically security; in-the-wire authentication; malware manipulation; password sensitive information; pins sensitive information; protecting client side critical data fields; secret information; secure network transactions; trusted terminal; trusted terminal device; Authentication; Computer security; Cryptography; Data security; IP networks; Information security; Network servers; Protection; Web and internet services; Web server; Computer network security; Internet security; Man-in-the-middle; Password security; TLS security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Adaptive Science & Technology, 2009. ICAST 2009. 2nd International Conference on
Conference_Location :
Accra
ISSN :
0855-8906
Print_ISBN :
978-1-4244-3522-7
Electronic_ISBN :
0855-8906
Type :
conf
DOI :
10.1109/ICASTECH.2009.5409720
Filename :
5409720
Link To Document :
بازگشت