Featured Research

from universities, journals, and other organizations

Computer scientists develop a comfortable and secure login method

Date:
March 31, 2010
Source:
Universitaet Tuebingen
Summary:
Computer scientists in Germany have developed a new method that saves the users not only the trouble of memorizing the passwords and login names, but also of typing them. All of this is managed by the user's smartphone.

As most internet users know, it is often hard to remember or keep apart all the passwords and login names for one's different online accounts.

Related Articles


Dr. Bernd Borchert, together with students at the Computer Science Department of Tόbingen University, has tackled this issue. They developed a new method that saves the users not only the trouble of memorizing the passwords and login names, but also of typing them. All of this is managed by the user's smartphone.

Moreover, the new approach solves a common problem which many internet users choose to ignore: passwords can be tapped by so-called keyloggers, i.e. trojans on the computer a password is entered into, and could later be misused for criminal purposes. As Dr. Borchert's method does not rely on permanent passwords anymore, the problem of tap-ping becomes obsolete.

The new method was filed for patent application.

From the user's point of view, Borchert's approach works as follows: The user downloads the method's application software to his smartphone. For each account he wants to be managed by the app, he needs to go through a short initialization process on the smartphone. In order to access an account, the user can open the respective login page in a browser window on any computer. He will then be shown a 2D-code that he must scan with the smartphone's camera. After the data is processed by the app, the smartphone contacts the account server via internet. The server checks the data received, connects to the browser window on the computer and opens the user's account. Thus, the user gets into his account almost by magic -- he only has to scan the 2D-code. In order to prevent unauthorized persons from logging in to an account, e.g. in case the smartphone is stolen, the user may protect his most important accounts with an additional tap-proof password query.

A prototype of the new application software was programmed by computer science students -- the link below refers to the demonstration web page which also contains a short demo video. Appropriate apps already exist for some types of smartphone. The project team is currently looking for account providers willing to implement the method in order to offer it to their users.

Demonstration web page containing more information and links: http://www2-fs.informatik.uni-tuebingen.de/~borchert/Troja/Open-Sesame/index.php?lang=en


Story Source:

The above story is based on materials provided by Universitaet Tuebingen. Note: Materials may be edited for content and length.


Cite This Page:

Universitaet Tuebingen. "Computer scientists develop a comfortable and secure login method." ScienceDaily. ScienceDaily, 31 March 2010. <www.sciencedaily.com/releases/2010/03/100329081817.htm>.
Universitaet Tuebingen. (2010, March 31). Computer scientists develop a comfortable and secure login method. ScienceDaily. Retrieved December 20, 2014 from www.sciencedaily.com/releases/2010/03/100329081817.htm
Universitaet Tuebingen. "Computer scientists develop a comfortable and secure login method." ScienceDaily. www.sciencedaily.com/releases/2010/03/100329081817.htm (accessed December 20, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Saturday, December 20, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Building Google Into Cars

Building Google Into Cars

Reuters - Business Video Online (Dec. 19, 2014) — Google's next Android version could become the standard that'll power your vehicle's entertainment and navigation features, Reuters has learned. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com
After Sony Hack, What's Next?

After Sony Hack, What's Next?

Reuters - US Online Video (Dec. 19, 2014) — The hacking attack on Sony Pictures has U.S. government officials weighing their response to the cyber-attack. Linda So reports. Video provided by Reuters
Powered by NewsLook.com
Navy Unveils Robot Fish

Navy Unveils Robot Fish

Reuters - Light News Video Online (Dec. 18, 2014) — The U.S. Navy unveils an underwater device that mimics the movement of a fish. Tara Cleary reports. Video provided by Reuters
Powered by NewsLook.com
How 2014 Shaped The Future Of The Internet

How 2014 Shaped The Future Of The Internet

Newsy (Dec. 18, 2014) — It has been a long, busy year for Net Neutrality. The stage is set for an expected landmark FCC decision sometime in 2015. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:

Strange & Offbeat Stories

 

Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins