作者: James A. Roskind
DOI:
关键词: Computer security 、 Business 、 Trusted client 、 Financial services 、 User authentication 、 Statement (computer science) 、 Authentication server 、 Conflict resolution 、 Authentication 、 World Wide Web 、 Computer hardware 、 Password
摘要: Establishing trust according to historical usage of selected hardware involves providing a history for client device; and extending user based on the user's device. The is embodied as signed statements issued by third party or an authentication server. statement stored either device, updated every time authenticated from By combining with conventional authentication, enhanced level readily established. enhanced, hardware-based provided logging trusted may eliminate necessity requiring secondary e-commerce financial services transactions, also be used facilitate password recovery conflict resolution in case stolen passwords.