期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Sharing Smart Card Authenticated Sessions Using Proxies
1
作者 Kevin E. Foltz william r. simpson 《Computer Technology and Application》 2016年第1期28-45,共18页
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web... This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards. 展开更多
关键词 Smart CARD IT security authentication key management PROXY SSL TLS session stealing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部