scispace - formally typeset
J

Jon Oberheide

Researcher at University of Michigan

Publications -  33
Citations -  3119

Jon Oberheide is an academic researcher from University of Michigan. The author has contributed to research in topics: Authentication protocol & Authentication. The author has an hindex of 20, co-authored 33 publications receiving 3068 citations.

Papers
More filters
Patent

System and method for an integrity focused authentication service

TL;DR: In this article, the authentication service provides a signed authentication response to the authentication request and signed by using the private key, and the service provider verifies the authenticated response using the public key.
Patent

System and method for determining component version compatibility across a device ecosystem

TL;DR: In this paper, a system and method that include collecting device version profiles from a plurality of device sources, classifying the device versions profiles into a device profile repository, receiving a component version query request, querying the device profiles repository according to the component query request; and responding to the query request with results of the query.
Patent

System and method for converting one-time passcodes to app-based authentication

TL;DR: In this paper, a method comprising of detecting, in response to a user access attempt on an electronic access device, a one-time passcode authentication event, receiving, at an electronic authenticating device, notification of the authentication event; retrieving and transmitting the one time passcode from the authenticated device to a facilitator software instance operating on the access device.

If it ain't broke, don't fix it: challenges and new directions for inferring the impact of software patches

TL;DR: PatchAdvisor is proposed, a technique to improve the manageability of the patching process for administrators by automatically inferring the impact of a patch or upgrade by automatically inspecting a software system and its patch.
Patent

System and method for delivering a challenge response in an authentication protocol

TL;DR: In this paper, a system and method for authenticating a user that includes receiving an access request of a network protocol at a challenge response server, determining if an access-challenge message is required, delivering an active script component through a parameter of an access challenge message of the network protocol, receiving a challengeresponse of a user, validating the challenge response, and selectively sending an access accept response for a valid challenge-response and sending an accesseddenied response for an invalid challengeresponse.