Client-based authentication technology: user-centric authentication using secure containers

  • Authors:
  • Conor P. Cahill;Jason Martin;Matthew W. Pagano;Vinay Phegade;Anand Rajan

  • Affiliations:
  • Intel Corporation, Hillsboro, OR, USA;Intel Corporation, Hillsboro, OR, USA;Johns Hopkins University, Baltimore, MD, USA;Intel Corporation, Hillsboro, OR, USA;Intel Corporation, Hillsboro, OR, USA

  • Venue:
  • Proceedings of the 7th ACM workshop on Digital identity management
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today's authentication suffers from unsolved problems in security and usability. Adversaries have multiple attack vectors with which to steal user credentials, including phishing, malware, and attacks on service providers. Current security practices such as password-complexity policies and idle timeouts often compromise usability. We propose our solution, Client-Based Authentication Technology (CBAT), to simultaneously improve security and usability in authentication. The main component of CBAT is our Trusted Identity Manager (TIM), which resides within a hardware-based secure container on the user's system. The TIM asserts the user's authentication to local and remote service providers without releasing the user's credentials. In addition, the TIM non-intrusively monitors the user's physical presence and locks the system if the user leaves. We provide architectural and implementation details of CBAT in hopes of improving current methods of authentication.