Peer-reviewed articles 17,970 +



Title: USING THE UNIVERSAL TWO FACTOR AUTHENTICATION METHOD IN WEB APPLICATIONS BY SOFTWARE EMULATED DEVICE

USING THE UNIVERSAL TWO FACTOR AUTHENTICATION METHOD IN WEB APPLICATIONS BY SOFTWARE EMULATED DEVICE
P. Petrov;P. Dimitrov; S.Stoev; G.Dimitrov;F. Bulut
1314-2704
English
20
2.1
The use of a qualified electronic signature has become more widespread in recent years,
and one of the main prerequisites for this is the development of electronic services using
a qualified electronic signature for authentication. Some of the services require
additional entry of a username and password and they show that a qualified electronic
signature complements the security of authentication by becoming the so-called
"Second factor". All services provided by a qualified electronic signature in the browser
are in fact web applications which used java applets or additional plug-ins. All of these
are normally inconvenient for the end users.
Electronic signatures, like the Universal Two Factor authentication method (U2F),
implement the principle of asymmetric encryption when signing documents. In theory, a
U2F device can be used for similar purposes if, instead of a random string of characters,
the hash value of a file is encrypted. Although this cannot be done in practice, the
Universal Two Factor authentication method is currently being developed and it is
possible that in a future version the signing of documents is quite possible as a
procedure.
Technologies such as the Universal Two Factor authentication method meet the
requirements of the modern user and could offer, in addition to the previously
established USB interface, support for Near-Field Communication (NFC) - a protocol
for wireless communication, often used for contactless payments or even data exchange.
Only few of the manufacturers of U2F devices have built NFC support, and
unfortunately, NFC support is limited to some modern mobile devices, so some
manufacturers are turning to another wireless technology - Bluetooth. However, this is
considered by many developers as a step backwards because Bluetooth technology
requires device pairing, which adds another step to the authentication process. Another
potential problem would be the range of the Bluetooth protocol, which often exceeds 50
meters - unacceptable for a U2F device, the main essence of which is to be extremely
close to its owner. Unlike USB and NFC connectivity, Bluetooth technology also
requires power.
conference
20th International Multidisciplinary Scientific GeoConference SGEM 2020
20th International Multidisciplinary Scientific GeoConference SGEM 2020, 18 - 24 August, 2020
Proceedings Paper
STEF92 Technology
International Multidisciplinary Scientific GeoConference-SGEM
SWS Scholarly Society; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci & Arts; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; European Acad Sci, Arts & Letters; Acad Fine Arts Zagreb Croatia; C
403-410
18 - 24 August, 2020
website
cdrom
7013
electronic signature; universal two factor; U2F; authentication; web
applications

25th SGEM International Conference on Earth & Planetary Sciences


International GeoConference SGEM2025
27 June - 6 July, 2025 / Albena, Bulgaria

Read More
   

SGEM Vienna GREEN "Green Science for Green Life"


Extended Scientific Sessions SGEM Vienna GREEN
3 -6 December, 2025 / Vienna, Austria

Read More
   

A scientific platform for Art-Inspired Scientists!


The Magical World Where Science meets Art
Vienna, Austria

Read More