Summary: | 碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 103 === To provide seamless Internet services, most public buildings, including coffee shops, airports, and libraries, temporary personal computers are offered to users for network access. This has led to a potential risk that the secret information of the user may be leaked out once these temporary computers have been affected by Trojans. Generally, the service provider checks the authority of a user according to a series of authentication procedure. While a user enters the verification token into the public computers, an attacker can apply a key-logger to steal the password or personal information. In this thesis, we have introduced the visual secret sharing technique to design an authorization transfer protocol, in which a smart phone has been used to help the access transferring. Therefore, users can have the access to network services without keying any secret information into the public computers.
|