Title :
Log-in authentication based on locating centers of a triangle
Author :
Wang, Shiuh Jeng ; Chen, Patrick S. ; Lin, Ya-Chi
Author_Institution :
Dept. of Inf. Manage., Central Police Univ., Taoyuan, Taiwan
Abstract :
In this paper a mechanism is proposed to realize log-in authentication with a stored table of user registrations in a remote network system. The stored table, called the generating key table, exists in a remote server, whose work is to validate whether the requesting user is legitimate or not. Although there have been many papers addressing the issue of log-in authentication with table-store scheme, until now, there was not a rule to point out the principle of devising a log-in authentication scheme. In this paper, we define a primitive function to sketch the principle. Then an example based on locating the centers on a triangle is illustrated to fulfill our idea. In our scheme, the stored keys are generated in geometric ways, and are used for user authentication later. In such a way, attacks based on penetrating the stored table are prevented. Without loss of generality, the password can be chosen freely by the registering user, the dynamic operations for a user´s insertion, deletion and password change are conducted, and the verification process can be carried out efficiently.
Keywords :
authorisation; computer operating procedures; generating key table; log-in authentication; remote network system; remote server; security analysis; stored table; triangle center location; user authentication; user registrations; verification process; Authentication; Computer networks; Data security; Electronic mail; Information management; Information resources; Information retrieval; Information security; Network servers; Protection;
Conference_Titel :
TENCON '02. Proceedings. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering
Print_ISBN :
0-7803-7490-8
DOI :
10.1109/TENCON.2002.1181230