scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Single sign on using bluetooth device

01 Aug 2016-pp 1-5
TL;DR: In this paper, a project made use of IBM Security Access Manager Enterprise Single Sign-On (ISAMESSO) and smartphone of the user to automate the above, and enhanced this by integrating the single sign on feature of ISAMESSo with Bluetooth proximity functionality.
Abstract: In today's world, an enterprise user uses quite a number of applications or IT resources which have their own set of credentials. These credentials differ from system to system or applications to applications and needs to be remembered by the particular user. Also, user has to enter the different credentials too again and again whenever re-login to any application is needed. This consumes time and requires unnecessary efforts. This project made use of IBM Security Access Manager Enterprise Single Sign-On (ISAMESSO) and smartphone of the user to automate the above. ISAM ESSO securely manages each user's application credentials and automatically delivers these credentials to the logon screens of various applications when a user launches them. We have enhanced this by integrating the single sign on feature of ISAMESSO with Bluetooth proximity functionality. ISAM ESSO client is installed on laptop. Client's workstation and smartphone communicates via Bluetooth in such a way that, whenever the Bluetooth enabled phone of the user is within the laptop's Bluetooth range and unlock command is send via app, not only the OS get unlocked but using the single sign on feature of ISAMESSO, the different applications which the user was using also gets unlocked. Further, when the user moves out of the vicinity of the laptop/desktop it will get locked automatically together with all the applications. The locking/unlocking facility is made automatic as well as manual.
References
More filters
Journal ArticleDOI
TL;DR: This work proposes a secure single sign-on mechanism that is efficient, secure, and suitable for mobile devices in distributed computer networks.
Abstract: User identification is an important access control mechanism for client-server networking architectures. The concept of single sign-on can allow legal users to use the unitary token to access different service providers in distributed computer networks. Recently, some user identification schemes have been proposed for distributed computer networks. Unfortunately, most existing schemes cannot preserve user anonymity when possible attacks occur. Also, the additional time-synchronized mechanisms they use may cause extensive overhead costs. To overcome these drawbacks, we propose a secure single sign-on mechanism that is efficient, secure, and suitable for mobile devices in distributed computer networks.

65 citations

Journal ArticleDOI
Tian-Fu Lee1
TL;DR: This investigation proposes an efficient and secure single-sign-on authentication scheme that uses extended chaotic maps, exhibits operations that satisfy the semigroup property and commutative under composition, and has a higher efficiency than modular exponential computations and scalar multiplications on the elliptic curve.
Abstract: Single-sign-on authentication mechanisms enable a legal user to access various service providers efficiently and conveniently by using a unitary token. These mechanisms are widely used in distributed computer networks. This investigation proposes an efficient and secure single-sign-on authentication scheme that uses extended chaotic maps, exhibits operations that satisfy the semigroup property and commutative under composition, and has a higher efficiency than modular exponential computations and scalar multiplications on the elliptic curve. The session key security of the proposed scheme is based on Chebyshev chaotic-map-based assumptions, and the scheme is proven to be secure using the real-or-random model. The proposed authentication scheme retains the security properties of earlier schemes, requires fewer transmissions, has a lower computational cost, and uses fewer variables; it is therefore efficient in computation and communication.

42 citations

Proceedings ArticleDOI
30 Aug 2011
TL;DR: The proposed design model named as PKI and password protected card-based single sign-on system (3PC-SSO), which combines the advantages of Kerberos and PKI-basedsingle sign- on system.
Abstract: To design a more secure and efficient single sign-on system, this paper analyzed the popular single sign-on systems and then introduced the original design model of SSO, due to the limitation of the original design model, we present the proposed design model named as PKI and password protected card-based single sign-on system (3PC-SSO), which combines the advantages of Kerberos and PKI-based single sign-on system. Finally, we analyze two problems of 3PC-SSO and discuss the future work.

1 citations