An authentication system using smart phones as secure storage

Katsuyuki Umezawa, Satoru Tezuka, Shigeichi Hirasawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The smart phone penetration rate has increased recently. There are also many commercial terminals for receiving network services. When a service is received by a smart phone or PC, user authentication is very important for ensuring secure and safe use. Currently, authentication is required each time a user changes the terminal on which a service is received. We propose a system that uses a smart phone as a storage device for authentication information, such as ID, password, and cookie information. With this system, the smart phone and various terminals cooperate through short distance wireless telecommunications technologies such as Bluetooth. We evaluate performance of our proposed system. As a result, the user can input authentication information to and receive a service on a terminal by simply swiping the smart phone over the terminal.

Original languageEnglish
Title of host publication2011 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2011 - Conference Digest
Pages415-420
Number of pages6
DOIs
Publication statusPublished - 2011 Dec 23
Externally publishedYes
Event2011 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2011 - Anchorage, AK, United States
Duration: 2011 Oct 92011 Oct 12

Publication series

NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
ISSN (Print)1062-922X

Other

Other2011 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2011
Country/TerritoryUnited States
CityAnchorage, AK
Period11/10/911/10/12

Keywords

  • Authentication
  • Bluetooth
  • ID Federation
  • Mobile Terminal
  • Secure Device
  • Smart Phone

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Control and Systems Engineering
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'An authentication system using smart phones as secure storage'. Together they form a unique fingerprint.

Cite this