International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

Download
294 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_7,
        author={Yazhe Wang and Mingming Hu and Chen Li},
        title={UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Authentication Mobile terminal Multi-accounts},
        doi={10.1007/978-3-319-23829-6_7}
    }
    
  • Yazhe Wang
    Mingming Hu
    Chen Li
    Year: 2015
    UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_7
Yazhe Wang1,*, Mingming Hu1,*, Chen Li1,*
  • 1: Chinese Academy of Sciences
*Contact email: wangyazhe@iie.ac.cn, humingming@iie.ac.cn, leec402@sina.com

Abstract

In this paper we present UAuth, a two-layer authentication framework that provides more security assurances than two-factor authentication while offering a simpler authentication experience. When authenticating, users first verified their static credentials (such as password, fingerprint, etc.) in the local layer, then submit the OTP-signed response generated by their device to the server to complete the server-layer authentication. We also propose the three-level account association mechanism, which completes the association of devices, users and services, establishing a mapping from a user’s device to the user’s accounts in the Internet. Users can easily gain access to different service via a single personal device. Our goal is to provide a quick and convenient SSO-like login process on the basis of security authentication. To meet the goal, we implement our UAuth, and evaluate our designs.