SlideShare a Scribd company logo
HARDWARE AUTHENTICATION
Name: Punit Kumar Pandey
Class: MCA-3rd Year
ABSTRACT
From the user perspective, security and efficiency are key to the idea of
authentication. It’s application in multi-server architecture authentication
protocol. user’s login many servers with only one password and one identity. In
2018, We find that above idea could not resist password guessing attack, user
impersonation attack and do not have anonymity. For these concerns, we propose
a multiserver authentication idea based on two-factor, which can raise efficiency
of communication and calculation by reducing unnecessary steps of keys
exchange. In addition, the scheme has higher security which makes up for above-
mentioned security flaws.
THEORETICAL FRAMEWORK
SECURITY THREATENS IN DEVICE CAN BE ROUGHLY CATEGORIZED INTO FOUR SECTIONS:
• THIS VULNERABILITY EXPOSES THE THREAT IS GROWING AS AN OPEN PLATFORM.
• DEPENDING ON THE APPLICATION DISTRIBUTION THROUGH THE INTERNET WORLD MALICIOUS VIRUSES
AND OPPORTUNITIES ARE EXPANDING.
• IT SUPPORTS A VARIETY OF NETWORK CONNECTIVITY ENVIRONMENT PROVIDING A MULTIPLICITY OF
INFECTION.
• A RISE OF PRIVATE AND CORPORATE INFORMATION LEAK THREATENS FROM MOBILITY CONVENIENCE
AND MOBILE OFFICE PROGRAM.
There are some security Devices which is available for providing a security:
1. USB authentication token
2. Biometric Device
USB SECURITY KEYS
Universal Serial Bus (USB) security keys, also called security tokens, are
small devices that plug into a computer's USB port for authentication. This
adds an extra layer of security, as the user not only must know the system
password, but also must be in possession of the security key.
FIDO U2F
FIDO U2F
U2F is an open authentication standard that enables internet users to
securely access any number of online services with one single security key
instantly and with no drivers or client software needed.
U2F ADVANTAGES
• Strong security — Strong two-factor authentication using public key crypto that protects against phishing, session
hijacking, man-in-the-middle, and malware attacks.
• Easy to use — Works out-of-the-box thanks to native support in platforms and browsers including Chrome, Opera,
and Mozilla, enabling instant authentication to any number of services. No codes to type or drivers to install.
• High privacy — Allows users to choose, own, and control their online identity. Each user can also opt to have
multiple identities, including anonymous, with no personal information associated with the identity. A U2F Security
Key generates a new pair of keys for every service, and only the service stores the public key. With this approach, no
secrets are shared between service providers, and an affordable U2F Security Key can support any number of
services.
• Multiple choices — Open standards provide flexibility and product choice. Designed for existing phones and
computers, for many authentication modalities, and with different communication methods (USB and NFC).
• Cost-efficient — Users can choose from a range of affordable devices online. Yubico offers free and open source
server software for back-end integration through the Yubico Developer Program.
• Electronic identity — Identity proofing is offered for organizations requiring a higher level of identity assurance.
Through service providers it is possible to bind your U2F Security Key to your real government issued identity.
BIOMETRIC AUTHENTICATION
Biometric authentication methods include retina, iris, fingerprint and
finger vein scans, facial and voice recognition, and hand or even earlobe
geometry. The latest phones are adding hardware support for biometrics,
such as Touch ID on the iPhone. Biometric factors may demand an explicit
operation by the user (e.g., scanning a fingerprint), or they may be implicit
(e.g., analyzing the user's voice as they interact with the help desk).
FINGER SWIPES
Another common type of hardware authentication involves a device that
reads a user's fingerprint. These devices generally consist of a pad
connected to a computer's USB port via a cable. The user swipes his or her
finger over the pad, which matches the user's fingerprint to an image
stored within the system to grant access.
SWIPE TECHNOLOGY THE FUTURE OF
AUTHENTICATION
Authentication might be getting easier for users and harder for
intruders. Because standard text passwords are easy to crack, researchers
have been looking to biometrics such as fingerprints and even gestures to
authenticate users.
OPTICAL RECOGNITION
Optical recognition devices are similar to finger swipe devices in that they
add a layer of security based on stored biometric data. These devices
basically are cameras that connect to a computer and scan a user's retina;
the image then is matched to a stored retinal image for authentication.
Thank You
Ad

More Related Content

What's hot (20)

Hyperledger Fabric
Hyperledger FabricHyperledger Fabric
Hyperledger Fabric
Murughan Palaniachari
 
Asynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with NettyAsynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with Netty
Ersin Er
 
エンジニアのキャリアパスを考える 高嶋
エンジニアのキャリアパスを考える 高嶋エンジニアのキャリアパスを考える 高嶋
エンジニアのキャリアパスを考える 高嶋
wakamonog
 
Blockchain smart cities
Blockchain smart citiesBlockchain smart cities
Blockchain smart cities
Charles Sahoo
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
クラウドにおける Windows Azure Active Directory の役割
クラウドにおける Windows Azure Active Directory の役割クラウドにおける Windows Azure Active Directory の役割
クラウドにおける Windows Azure Active Directory の役割
junichi anno
 
총판계약(초안)
총판계약(초안)총판계약(초안)
총판계약(초안)
Yeonmoon Jeong
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618
Arnaud Le Hors
 
Crypto Wallet Types Explained
Crypto Wallet Types ExplainedCrypto Wallet Types Explained
Crypto Wallet Types Explained
101 Blockchains
 
MESSARI - Crypto_Theses_2023.pdf
MESSARI - Crypto_Theses_2023.pdfMESSARI - Crypto_Theses_2023.pdf
MESSARI - Crypto_Theses_2023.pdf
digitalinasia
 
BitCoin Protocol
BitCoin ProtocolBitCoin Protocol
BitCoin Protocol
Consulthinkspa
 
Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-
Claire Calmejane
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
Clare Nelson, CISSP, CIPP-E
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
Big data in fintech ecosystem
Big data in fintech ecosystemBig data in fintech ecosystem
Big data in fintech ecosystem
BBVA API Market
 
Introduction to Proof of Stake (PoS) in Crypto
Introduction to Proof of Stake (PoS) in CryptoIntroduction to Proof of Stake (PoS) in Crypto
Introduction to Proof of Stake (PoS) in Crypto
Intelisync
 
Asynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with NettyAsynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with Netty
Ersin Er
 
エンジニアのキャリアパスを考える 高嶋
エンジニアのキャリアパスを考える 高嶋エンジニアのキャリアパスを考える 高嶋
エンジニアのキャリアパスを考える 高嶋
wakamonog
 
Blockchain smart cities
Blockchain smart citiesBlockchain smart cities
Blockchain smart cities
Charles Sahoo
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
クラウドにおける Windows Azure Active Directory の役割
クラウドにおける Windows Azure Active Directory の役割クラウドにおける Windows Azure Active Directory の役割
クラウドにおける Windows Azure Active Directory の役割
junichi anno
 
총판계약(초안)
총판계약(초안)총판계약(초안)
총판계약(초안)
Yeonmoon Jeong
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618
Arnaud Le Hors
 
Crypto Wallet Types Explained
Crypto Wallet Types ExplainedCrypto Wallet Types Explained
Crypto Wallet Types Explained
101 Blockchains
 
MESSARI - Crypto_Theses_2023.pdf
MESSARI - Crypto_Theses_2023.pdfMESSARI - Crypto_Theses_2023.pdf
MESSARI - Crypto_Theses_2023.pdf
digitalinasia
 
Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-Mit cc turn into action - digital strategies banking v march2012-
Mit cc turn into action - digital strategies banking v march2012-
Claire Calmejane
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
Clare Nelson, CISSP, CIPP-E
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
Big data in fintech ecosystem
Big data in fintech ecosystemBig data in fintech ecosystem
Big data in fintech ecosystem
BBVA API Market
 
Introduction to Proof of Stake (PoS) in Crypto
Introduction to Proof of Stake (PoS) in CryptoIntroduction to Proof of Stake (PoS) in Crypto
Introduction to Proof of Stake (PoS) in Crypto
Intelisync
 

Similar to Hardware Authentication (20)

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
Tatyana Arnaudova
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
This paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docxThis paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docx
herthalearmont
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
Solus
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
andreeabrodo
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
koushikichakraborty3
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
Hai Nguyen
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
Sitamarhi Institute of Technology
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
Sitamarhi Institute of Technology
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
This paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docxThis paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docx
herthalearmont
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
Solus
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
koushikichakraborty3
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
Hai Nguyen
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Ad

More from Coder Tech (9)

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 
HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 
Ad

Recently uploaded (20)

Multilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion systemMultilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion system
Himabindu905359
 
CCTV Camera Installation guide of .pdf
CCTV Camera Installation guide   of .pdfCCTV Camera Installation guide   of .pdf
CCTV Camera Installation guide of .pdf
Ebba6
 
hufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppthufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppt
alvishi254
 
Adobe Illustrator CC Crack Version 2025?
Adobe Illustrator CC Crack Version 2025?Adobe Illustrator CC Crack Version 2025?
Adobe Illustrator CC Crack Version 2025?
yousfhashmi786
 
pharmacology.pdffffffffffffffffffffffffff
pharmacology.pdffffffffffffffffffffffffffpharmacology.pdffffffffffffffffffffffffff
pharmacology.pdffffffffffffffffffffffffff
anooshaazam312
 
ppt untuk seminar proposal dan persiapannya
ppt untuk seminar proposal dan persiapannyappt untuk seminar proposal dan persiapannya
ppt untuk seminar proposal dan persiapannya
Rasidinmamakidin
 
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptxchapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
vvghgjgf
 
C.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptx
C.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptxC.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptx
C.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptx
quliyevlogman4
 
Oxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine EquipmentOxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine Equipment
blueredblue74
 
Wondershare Filmora Crack Free Download Latest 2025
Wondershare Filmora Crack Free Download Latest 2025Wondershare Filmora Crack Free Download Latest 2025
Wondershare Filmora Crack Free Download Latest 2025
yousfhashmi786
 
the-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.pptthe-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.ppt
LipicaJasujaWadhwa
 
>parallel desktop Crack Latest Free 2025 | PPT
>parallel desktop Crack Latest Free 2025 | PPT>parallel desktop Crack Latest Free 2025 | PPT
>parallel desktop Crack Latest Free 2025 | PPT
yousfhashmi786
 
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKINGOSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
ritikghw
 
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPTDownload Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
yousfhashmi786
 
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu  hionsbb 9hniosParsing.pptxNeed of t the thw stuf iobyu  hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
ParitoshShukla11
 
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
hkrishna9495
 
Mischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptxMischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptx
YashitaAhuja
 
Spectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptxSpectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptx
muthulakshmitc
 
Introduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).ppt
Introduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).pptIntroduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).ppt
Introduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).ppt
AshaManjhi
 
linearly separable and therefore a set of weights exist that are consistent ...
linearly separable and therefore a set of weights exist that are consistent  ...linearly separable and therefore a set of weights exist that are consistent  ...
linearly separable and therefore a set of weights exist that are consistent ...
mebibek_hu
 
Multilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion systemMultilingual hand gesture to speech conversion system
Multilingual hand gesture to speech conversion system
Himabindu905359
 
CCTV Camera Installation guide of .pdf
CCTV Camera Installation guide   of .pdfCCTV Camera Installation guide   of .pdf
CCTV Camera Installation guide of .pdf
Ebba6
 
hufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppthufman coding for compression algorithm.ppt
hufman coding for compression algorithm.ppt
alvishi254
 
Adobe Illustrator CC Crack Version 2025?
Adobe Illustrator CC Crack Version 2025?Adobe Illustrator CC Crack Version 2025?
Adobe Illustrator CC Crack Version 2025?
yousfhashmi786
 
pharmacology.pdffffffffffffffffffffffffff
pharmacology.pdffffffffffffffffffffffffffpharmacology.pdffffffffffffffffffffffffff
pharmacology.pdffffffffffffffffffffffffff
anooshaazam312
 
ppt untuk seminar proposal dan persiapannya
ppt untuk seminar proposal dan persiapannyappt untuk seminar proposal dan persiapannya
ppt untuk seminar proposal dan persiapannya
Rasidinmamakidin
 
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptxchapter hshs jsjshs sjjsjs kenshs kensh.pptx
chapter hshs jsjshs sjjsjs kenshs kensh.pptx
vvghgjgf
 
C.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptx
C.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptxC.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptx
C.Mehrac_Englisjdjdjdjdjdjdjsjsjsjsjdh.pptx
quliyevlogman4
 
Oxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine EquipmentOxygen Concentrators | Medical Machine Equipment
Oxygen Concentrators | Medical Machine Equipment
blueredblue74
 
Wondershare Filmora Crack Free Download Latest 2025
Wondershare Filmora Crack Free Download Latest 2025Wondershare Filmora Crack Free Download Latest 2025
Wondershare Filmora Crack Free Download Latest 2025
yousfhashmi786
 
the-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.pptthe-importance-of-learning-french-140722055824-phpapp01.ppt
the-importance-of-learning-french-140722055824-phpapp01.ppt
LipicaJasujaWadhwa
 
>parallel desktop Crack Latest Free 2025 | PPT
>parallel desktop Crack Latest Free 2025 | PPT>parallel desktop Crack Latest Free 2025 | PPT
>parallel desktop Crack Latest Free 2025 | PPT
yousfhashmi786
 
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKINGOSPF & DHCP PPT.pptx it is relATED TO NETWORKING
OSPF & DHCP PPT.pptx it is relATED TO NETWORKING
ritikghw
 
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPTDownload Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
Download Capcut Pro 5.7.1.2152 Crack Latest Version | PPT
yousfhashmi786
 
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu  hionsbb 9hniosParsing.pptxNeed of t the thw stuf iobyu  hionsbb 9hniosParsing.pptx
Need of t the thw stuf iobyu hionsbb 9hniosParsing.pptx
ParitoshShukla11
 
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
Mutation-Breeding (1).pdf.pptxcoucy9f9yf69f9
hkrishna9495
 
Mischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptxMischief and cheating - yashita (2405230008).pptx
Mischief and cheating - yashita (2405230008).pptx
YashitaAhuja
 
Spectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptxSpectrophotometer instrument basics -.pptx
Spectrophotometer instrument basics -.pptx
muthulakshmitc
 
Introduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).ppt
Introduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).pptIntroduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).ppt
Introduction-to-Robotics-PowerPoint-Presentation-on-Robotics (1).ppt
AshaManjhi
 
linearly separable and therefore a set of weights exist that are consistent ...
linearly separable and therefore a set of weights exist that are consistent  ...linearly separable and therefore a set of weights exist that are consistent  ...
linearly separable and therefore a set of weights exist that are consistent ...
mebibek_hu
 

Hardware Authentication

  • 1. HARDWARE AUTHENTICATION Name: Punit Kumar Pandey Class: MCA-3rd Year
  • 2. ABSTRACT From the user perspective, security and efficiency are key to the idea of authentication. It’s application in multi-server architecture authentication protocol. user’s login many servers with only one password and one identity. In 2018, We find that above idea could not resist password guessing attack, user impersonation attack and do not have anonymity. For these concerns, we propose a multiserver authentication idea based on two-factor, which can raise efficiency of communication and calculation by reducing unnecessary steps of keys exchange. In addition, the scheme has higher security which makes up for above- mentioned security flaws.
  • 3. THEORETICAL FRAMEWORK SECURITY THREATENS IN DEVICE CAN BE ROUGHLY CATEGORIZED INTO FOUR SECTIONS: • THIS VULNERABILITY EXPOSES THE THREAT IS GROWING AS AN OPEN PLATFORM. • DEPENDING ON THE APPLICATION DISTRIBUTION THROUGH THE INTERNET WORLD MALICIOUS VIRUSES AND OPPORTUNITIES ARE EXPANDING. • IT SUPPORTS A VARIETY OF NETWORK CONNECTIVITY ENVIRONMENT PROVIDING A MULTIPLICITY OF INFECTION. • A RISE OF PRIVATE AND CORPORATE INFORMATION LEAK THREATENS FROM MOBILITY CONVENIENCE AND MOBILE OFFICE PROGRAM. There are some security Devices which is available for providing a security: 1. USB authentication token 2. Biometric Device
  • 4. USB SECURITY KEYS Universal Serial Bus (USB) security keys, also called security tokens, are small devices that plug into a computer's USB port for authentication. This adds an extra layer of security, as the user not only must know the system password, but also must be in possession of the security key. FIDO U2F
  • 5. FIDO U2F U2F is an open authentication standard that enables internet users to securely access any number of online services with one single security key instantly and with no drivers or client software needed.
  • 6. U2F ADVANTAGES • Strong security — Strong two-factor authentication using public key crypto that protects against phishing, session hijacking, man-in-the-middle, and malware attacks. • Easy to use — Works out-of-the-box thanks to native support in platforms and browsers including Chrome, Opera, and Mozilla, enabling instant authentication to any number of services. No codes to type or drivers to install. • High privacy — Allows users to choose, own, and control their online identity. Each user can also opt to have multiple identities, including anonymous, with no personal information associated with the identity. A U2F Security Key generates a new pair of keys for every service, and only the service stores the public key. With this approach, no secrets are shared between service providers, and an affordable U2F Security Key can support any number of services. • Multiple choices — Open standards provide flexibility and product choice. Designed for existing phones and computers, for many authentication modalities, and with different communication methods (USB and NFC). • Cost-efficient — Users can choose from a range of affordable devices online. Yubico offers free and open source server software for back-end integration through the Yubico Developer Program. • Electronic identity — Identity proofing is offered for organizations requiring a higher level of identity assurance. Through service providers it is possible to bind your U2F Security Key to your real government issued identity.
  • 7. BIOMETRIC AUTHENTICATION Biometric authentication methods include retina, iris, fingerprint and finger vein scans, facial and voice recognition, and hand or even earlobe geometry. The latest phones are adding hardware support for biometrics, such as Touch ID on the iPhone. Biometric factors may demand an explicit operation by the user (e.g., scanning a fingerprint), or they may be implicit (e.g., analyzing the user's voice as they interact with the help desk).
  • 8. FINGER SWIPES Another common type of hardware authentication involves a device that reads a user's fingerprint. These devices generally consist of a pad connected to a computer's USB port via a cable. The user swipes his or her finger over the pad, which matches the user's fingerprint to an image stored within the system to grant access.
  • 9. SWIPE TECHNOLOGY THE FUTURE OF AUTHENTICATION Authentication might be getting easier for users and harder for intruders. Because standard text passwords are easy to crack, researchers have been looking to biometrics such as fingerprints and even gestures to authenticate users.
  • 10. OPTICAL RECOGNITION Optical recognition devices are similar to finger swipe devices in that they add a layer of security based on stored biometric data. These devices basically are cameras that connect to a computer and scan a user's retina; the image then is matched to a stored retinal image for authentication.