Sunday, November 4, 2018



TECH



Sistema de código aberto promete gerenciar todas as suas senhasOpen source system promises to manage all your passwords

Credible security

The idea of ​​having a single application that takes care of all your passwords is not new and never won a lot of fans for a very simple question: Why would I trust your program to handle all my passwords?Since the idea is good, the European Union has decided to try to give it a good bit of credibility.To this end, researchers from various countries have gathered around the ReCRED project, an acronym for the consortium's long-term goal, which describes itself as "From real-world identities to privacy preservation with attribute-based credentials for device-centric access control. "In practice, it is an open source platform that ensures authentication for all user passwords. The platform runs on a mobile app."Adoption of the device-based authentication architecture is critical to the elimination of passwords as the primary method of web authentication," said project coordinator Christos Xenakis of the University of Piraeus in Greece.


Identity acquisition
Instead of adding yet another weak link in the cell phone chain, the team believes that the method improves end-user security on the internet by using the device as an authorization intermediary - as a proxy. "Authentication and authorization are simplified by the combined use of short biometric information (for example, voice, fingerprints or signature) and anonymous credentials (for example, a pseudonym)," explained Rubén Cuevas, a researcher at the Carlos III University in Madrid .
You can grant explicit authorization to ReCRED to access each of the information for each online account you have.For services requiring a higher level of security, a physical identity acquisition module has been developed that verifies all identification attributes included in the user's physical identity, such as a passport or identity document number, bank account number or Photograph."We prioritize an authentication that requires the use of only essential data, which function as anonymous credentials. It is not necessary to verify the email address, for example, since it would reveal the identity of the user," said Antonio Fernández Anta, of IMDEA Networks.


Identity Consolidator
What if you lose the cell phone that stores all your access information and passwords?ReCRED has foreseen this problem by creating additional security measures with information blocking and retrieval functions. An entity called "identity consolidator", along with physiological signatures and user behavior, prevents a third party from using their mobile phone to access their accounts."In the event a user loses the device, they can regain access to the services by providing two-factor authentication, such as personal attributes verified from physical characteristics or biometric behavioral data," said Xenakis.More information, including the repository for downloading the open source system, can be obtained from the ReCRED website at www.recred.eu.

No comments:

Post a Comment

TECH Sustainable cement: An electrochemical process to help neutralize cement industry CO₂ emissions Cement production is the second-largest...