Download presentation
Presentation is loading. Please wait.
Published byVirginia Denson Modified over 10 years ago
5
Single Sign-On (SSO)
6
Single Sign-On (SSO) Strong Authentication
7
Single Sign-On (SSO) Strong Authentication KNOW *******
8
Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE
9
Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE ARE
10
Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE
11
Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE
12
Strong Mobile Authentication in Single Sign-On Systems André Andrade andre.andrade@tkk.fi
13
Overview Objectives Protocol arquitecture and description Prototype overview Demo Conclusion André Andrade andre.andrade@tkk.fi
14
Objectives Strong Authentication protocol for SSO systems using the mobile phone as a security token – Security, usability, flexibility, cost-efficiency André Andrade andre.andrade@tkk.fi Implmentation prototype – Proof-of-concept – Usable strong authentication method using the mobile phone as an alternative in SSO authentication
15
Protocol - Arquitecture André Andrade andre.andrade@tkk.fi
16
Protocol - Arquitecture André Andrade andre.andrade@tkk.fi
17
Protocol - Description André Andrade andre.andrade@tkk.fi
18
Prototype - Overview André Andrade andre.andrade@tkk.fi
19
Prototype - Demo André Andrade andre.andrade@tkk.fi
20
Conclusion André Andrade andre.andrade@tkk.fi SSO and strong authentication complement each other Mobile phone is a beneficial option as a security token and there are secure mechanisms that enhance it Protocol enables the creation of secure, usable, flexible and cost-efficient strong authentication methods Implementation prototype
21
André Andrade andre.andrade@tkk.fi Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.