An Authorization Transfer Mechanism for Preserving Personal Information Based on Image Secret Sharing

碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 103 === To provide seamless Internet services, most public buildings, including coffee shops, airports, and libraries, temporary personal computers are offered to users for network access. This has led to a potential risk that the secret information of the user may b...

Full description

Bibliographic Details
Main Authors: Jyun-Hong Lin, 林君鴻
Other Authors: Jung-San Lee
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/42096604376021100152
Description
Summary:碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 103 === To provide seamless Internet services, most public buildings, including coffee shops, airports, and libraries, temporary personal computers are offered to users for network access. This has led to a potential risk that the secret information of the user may be leaked out once these temporary computers have been affected by Trojans. Generally, the service provider checks the authority of a user according to a series of authentication procedure. While a user enters the verification token into the public computers, an attacker can apply a key-logger to steal the password or personal information. In this thesis, we have introduced the visual secret sharing technique to design an authorization transfer protocol, in which a smart phone has been used to help the access transferring. Therefore, users can have the access to network services without keying any secret information into the public computers.