Challenge Token-Based Authentication - CTA

A new technique for highly securing the wired and wireless local area network using a Challenge Token-based Authentication as a second authentication factor is presented. This technique is based on two authentication factors, which is in addition to the first factor "User name and password", it also uses the client soft token that will be stored in a mobile phone or USB. The soft token will be obtained during registration and will never be transmitted during the authentication process. This token will be used by a mobile Client Program to generate a secure Authentication Server (AS) public key in order to respond to the AS's challenge.

Provided by: IARIA Topic: Mobility Date Added: Jul 2011 Format: PDF

Find By Topic