Client-Side Biometric Verification Based on Trusted Computing

Abstract : Traditionally, a user requires substantial trust in a workstation for correctly handling her credentials (e.g. password/login). Unfortunately, malware and compromised software makes them unsuitable for secure credential management. Credentials are easily stolen and the user cannot trust what is being displayed on her workstation, obstructing informed consent.This paper presents a new solution that addresses these issues. Credentials are bound to the owner using biometrics, effectively impeding abuse through credential sharing and theft. The biometric verification is performed on the client side, preserving the privacy of the user. The solution ensures that the user is correctly informed about the pending authentication, preventing abuse by malware. To demonstrate the feasibility of our approach, a prototype was implemented.
Type de document :
Communication dans un congrès
Bart Decker; Jana Dittmann; Christian Kraetzer; Claus Vielhauer. 14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. Springer, Lecture Notes in Computer Science, LNCS-8099, pp.34-49, 2013, Communications and Multimedia Security. 〈10.1007/978-3-642-40779-6_3〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01492832
Contributeur : Hal Ifip <>
Soumis le : lundi 20 mars 2017 - 15:51:48
Dernière modification le : lundi 20 mars 2017 - 15:55:41
Document(s) archivé(s) le : mercredi 21 juin 2017 - 13:44:26

Fichier

978-3-642-40779-6_3_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Jan Vossaert, Jorn Lapon, Bart Decker, Vincent Naessens. Client-Side Biometric Verification Based on Trusted Computing. Bart Decker; Jana Dittmann; Christian Kraetzer; Claus Vielhauer. 14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. Springer, Lecture Notes in Computer Science, LNCS-8099, pp.34-49, 2013, Communications and Multimedia Security. 〈10.1007/978-3-642-40779-6_3〉. 〈hal-01492832〉

Partager

Métriques

Consultations de la notice

62

Téléchargements de fichiers

78