Establishing historical usage-based hardware trust

作者: James A. Roskind

DOI:

关键词: Computer securityBusinessTrusted clientFinancial servicesUser authenticationStatement (computer science)Authentication serverConflict resolutionAuthenticationWorld Wide WebComputer hardwarePassword

摘要: Establishing trust according to historical usage of selected hardware involves providing a history for client device; and extending user based on the user's device. The is embodied as signed statements issued by third party or an authentication server. statement stored either device, updated every time authenticated from By combining with conventional authentication, enhanced level readily established. enhanced, hardware-based provided logging trusted may eliminate necessity requiring secondary e-commerce financial services transactions, also be used facilitate password recovery conflict resolution in case stolen passwords.

参考文章(79)
B. A. Cross, BT Trustwise — Enabling eCommerce Through Trust Bt Technology Journal. ,vol. 17, pp. 44- 49 ,(1999) , 10.1023/A:1009620202237
Terran Lane, Carla E Brodley, An Application of Machine Learning to Anomaly Detection ,(1999)
Oded Kafri, File encryption method ,(1996)
Kim Guenther, Pass the Cookies and Uphold the Privacy. Computers in libraries. ,vol. 21, pp. 56- 58 ,(2001)
Eric Pouyoul, Michael Duigou, Jean-Christophe Hugly, Mohamed Abdelaziz, Bernard Traversat, Peer-to-peer presence detection ,(2002)
Eugene H. Spafford, Mark Crosbie, Active Defense of a Computer System using Autonomous Agents ,(1995)
Thomas Drennan Selgas, John Everett Gmuender, Michael Brian, Method and apparatus for providing connections over a network ,(1998)
Matthew Muyres, Joel Rigler, James Williams, Harold Peterson, Behavior tracking and user profiling system ,(2001)