Cognitive OTP - Novel Technique to Establish Identity of a Person (Human) in Cyber Space
SpeakerAnil Rawat
TrackLightning Talks -- Main Conference Auditorium
SessionLightning Talks
DescriptionConventionally photograph, fingerprint, IRIS, DNA or hand geometry is used for establishing identity of a person in physical world, but they all need additional infrastructure for capturing and comparison of bio-metric parameter. Id and password based technique is the most popular method for user identification, but these password based schemes are not truly capable of ascertaining persons identity, since passwords are breakable and are also vulnerable to theft. One Time Password(OTP), Session Password, Transaction Password, Time Window Based Passwords etc. are some more techniques designed to enhance security of the systems and applications. All these techniques are inadequate to establish person’s identity in cyber space.
The proposed technique is based on assimilation of CAPTCHA, OTP and a human provided and controlled function. The user is provided with OTP through a CAPTCHA and the user applies a function on the OTP, manipulating its digits/ characters and returns the ‘Cognitive OTP’ to the Authentication Server. CAPTCHA is a standard technique to ensure that a human is interpreting the contained information, OTP ensures randomization and application of a function by the user (person being identified) using his brain (neurons!) adds a bio-metric equivalent dimension, thus producing ‘Cognitive OTP’. The Authentication Server(AS) needs to know the human applied function before hand for the purpose of verification.
The user will have the liberty to chose type of OTP (digits and / or characters) from AS and also for the function for manipulation of OTP to produce ‘Cognitive OTP’. Using number based input for the user controlled function may enhance possible options for manipulations, since mathematical jargons are possible with numbers. There are certain extensions to this novel technique to complete the logical flow for authenticated verification of a person in cyber space, which I shall be covering in the proposed talk.
The proposed technique is based on assimilation of CAPTCHA, OTP and a human provided and controlled function. The user is provided with OTP through a CAPTCHA and the user applies a function on the OTP, manipulating its digits/ characters and returns the ‘Cognitive OTP’ to the Authentication Server. CAPTCHA is a standard technique to ensure that a human is interpreting the contained information, OTP ensures randomization and application of a function by the user (person being identified) using his brain (neurons!) adds a bio-metric equivalent dimension, thus producing ‘Cognitive OTP’. The Authentication Server(AS) needs to know the human applied function before hand for the purpose of verification.
The user will have the liberty to chose type of OTP (digits and / or characters) from AS and also for the function for manipulation of OTP to produce ‘Cognitive OTP’. Using number based input for the user controlled function may enhance possible options for manipulations, since mathematical jargons are possible with numbers. There are certain extensions to this novel technique to complete the logical flow for authenticated verification of a person in cyber space, which I shall be covering in the proposed talk.
Presentation documents
All talks
- Introducing 100G Transmission & OTN in the Nordics
- "UH-sky" - A Community Cloud for the Norwegian Research and Education Community
- A Green ICT Maturity Model for Higher Education.
- Automatic Provisioning of Networking Resources in Foreign Domain
- Bring-your-own-device Exam System for Campuses
- Building a Distributed Cloud Storage System for Researchers is Not as Hard as You Think....Or is it?
- COmanage: Identity Management and Collaboration Services for Virtual Organizations
- Censoring Other People's Metadata
- Challenges and Opportunities Building a Wireless Campus Network
- Cloud-storage with Box.com on a Nordic Level - From Tenders to Implemented Services
- Cognitive OTP - Novel Technique to Establish Identity of a Person (Human) in Cyber Space
- Data Analysis as a Service
- Data Driven Wind Business
- Data Practices in the Solid Earth Science: An Example from Seismological Community
- Deploying Standards-based, Multi-domain Bandwidth-on-Demand Services
- Digital Assessment with Students' Own Device: Challenges and Solutions
- Digital Assessments, on Campus and Networks
- ERAI - EUNIS Research and Analysis Initiative
- Enlighten Your Research Global: An International Competition to Support Global Scientific Collaboration
- European Rosetta Mission to Comet 67P - A Challenge for Virtual Observatory Approach
- Fostering Aggregated Public Sector Procurement on a European Scale – The Legislation and Practical Application
- From NSI Demonstrations to Production Services: The NSI-CONTEST Conformance Test Suite
- Future Network Architectures
- GÉANT, Other e-Infrastructures and the Future Internet – Driving European Innovation
- GÉANT2020 - Towards the European Communications Commons
- How to Build Trust on the Internet
- How to Succeed in ISO 27001 Information Security Certification
- Hybrid Clouds and Open Source Technologies as Key to Competitive Differentiation
- Innovation Platform 2.0
- Invitation to NDN2016
- Large-scale Campus Wireless Networks: Development, Opportunities and Strategy
- Layer 1 Encryption in WDM Transport Systems
- MOOC as Disruptive Innovation
- Making Mobile Data Consumption Affordable for Higher Education Students in Netherlands, Portugal, Spain and Sweden.
- Managing Audio-Visual Cultural Data
- Managing Big Multidimensional Data - For Energy And Beyond
- Methods for Improving Multimedia Streaming Throughput to Mobile Nodes in Heterogeneous Wireless Environments
- Multi-Domain VPN, a New Network Service in Europe
- Nordic Collaboration on e-Infrastructures: Challenges and Opportunities
- Numbering All the Bones
- OPEX Savings Based on Energy Efficient Strategies in NREN Core Optical Networks
- Open Cloud Service Hubs
- Organising a Customer Survey - Case Funet
- Packet-Optical and SDN Evolution for Transport Agility
- Panel of Nordic NREN CEOs
- Panel of Video Experts
- People in Glass Houses Shouldn't Throw Stones
- SUNET eduID - An Open IdP for Higher Education in Sweden
- Secure Cloud Management
- Secure Data Storage and Sync Despite the Heartbleeds and Snowdens
- Shared Lecture Capture Services in Norwegian Higher Education
- Standing on Giants: The Relationship between Research Infrastructures with e-Infrastructures
- The Danish National Strategy on Data Management
- The Global Context for 2020
- The Missing Link - Obstacles to Global Integration
- UNINETT CBP activities
- UNINETT Feide Connect
- UNINETT's Network Monitoring Toolkit
- User Managed Access
- Using Commodity Hardware for Large Scale 10Gbps Passive Monitoring
- Videoconferencing Without the Worry - An NREN Service
- Web-RTC: A Proposed Roadmap for Higher Education & Research
- Welcome from SUNET
- Welcome to Uppsala University
- cryptech.is