Explore chapters and articles related to this topic
Single Server Authentication
Published in Chintan Patel, Nishant Doshi, Internet of Things Security, 2018
As shown in Figure 4.10, in this phase there are three major entities that are involved, user, smart card reader and gateway. We have considered smart card availability in the authentication scheme. In some of the schemes, it may be possible that smart card based security schemes are not available, and the author shows mutual authentications. In this phase, message transmission will be as follows: User will enter user id and password in the smart card application. In figure, password is shown in curly braces, which indicates there can be any type of password. Password can be either plain text or biometric traits or attributes.Now smart card will generate any other random data and make a message to communicate with gateway(server) and sends it.Gateway receives this message and performs necessary computations and generates the smart card parameters. It makes use of message sent by smart card reader, which is generated based on user id and password. Gateway generates smart card, stores it and forwards it to the smart card reader.Smart card reader receives smart card from gateway(server) and stores any other relevant parameters in the smart card if required and sends smart card to the user or device.User receives smart card and stores it with other relevant parameters required.
‘Rehabilitation aids for the blind’: disability and technological knowledge in Canada, 1947-1985
Published in History and Technology, 2020
The Spellex program could be installed in a variety of devices, the only requirement being that a device had to be equipped with American Standard Code Information Interchange (ASCII), which by that time was ‘readily available from most computer terminals’, as Suen and Swail reported. As this requirement indicates, the primary purpose of Spellex was to facilitate the use of computers and related appliances by individuals who were blind, to read and write materials, communicate and receive information, as well as for programming purposes. Installing the system in Swail’s electronic punched-card reader was a logical step forward, and once installed served as the primary audio output for the machine. The technology of computing was evolving towards a more visually-oriented, and thus much less accessible, interface in this period, and thus Spellex and other systems like it became an important set of innovations as people with disabilities, and particularly people who were blind or partially sighted, navigated the increasingly important technology.58
Advanced multi-factor user authentication scheme for E-governance applications in smart cities
Published in International Journal of Computers and Applications, 2019
An authorized session is developed to validate the authenticity and validity of parameters such as identity and password.After inserting smart card into card reader, the user inputs his identity Idt and password PSt.Smart card Sm computes = Ct ⊕ H (Idt || PSt), = H(Idt || ), = H(PSt || ), = H(Idt ⊕ ), = At ⊕ H( || Idt).). It then verifies the stored Bt in the smart card Sm matches with computed . If verification does not hold, the Sm rejects the user Ut and terminates the phase. Otherwise, Sm asks for a new password . Smart card Sm performs the change in password.The user sends new password to the Sm.Smart card computes = H( || ), = ⊕ H( || Idt), = H(Idt ⊕ ) and = ⊕ H(Idt || ). Sm replaces stored parameters At with , Bt with and Ct with .