IDall and PASSCON Blue Paper, Abstract

IDall & PASSCON
2 min readJan 8, 2020

--

One ID service and PASSCON Authentication Security Technology

Abstract

Human life is becoming more convenient thanks to high technology. Internet services are rapidly expanding in number and quantity and are entering our daily lives. Therefore, securing security in the cyber world is particularly demanding. Recently, cybercrime, such as hacking, is on the rise.It is common for a user to access an online service through a computer device. Verifying that you are eligible to use the service in this process is essential to protect your assets and privacy. It is also important to maintain the safety of the data being sent or received in the process. The former is called authentication technology and the latter is called encryption technology. Therefore, authentication and encryption are the most important security elements of any online system.

The start of authentication is the identification of the requestor. The most widely used method of identification is ID. Once you identify the other party by ID, you must verify that you are eligible to use that ID. This process of identification and verification is called authentication. Given that authentication consists of identification and verification, data for identification has an attribute that must be made public. Therefore, the security in the authentication process is naturally focused on the verification method or technology.

The most widely used verification method is to check the “password” that matches each ID. There is also 2 Factor Authentication (2FA), which additionally validates OTP or SMS elements due to incomplete security of passwords. Furthermore, PKI digital signature method for verifying possession of private key is also spreading. Recently, biometric authentication has been actively used, which is also a kind of PIK digital signature method.

This paper examines the overview of existing authentication technologies and attempts to develop new ones that can overcome the limitations and problems.

#PASSCON #IDall #OTP #SMS #2FA #Blockchain #Authentication #ID #oneID #Password

#PASSCON is the truelys perfect #passwordless authentication technology. #IDall is the very platform for #DID empowered by #PASSCON.

Youtube: https://lnkd.in/fVyHipS
Medium: https://medium.com/@idall
Brunch: https://lnkd.in/fhNmwWT
Telegram user community: https://t.me/idalluser
Telegram news channel: https://t.me/idalluser
GCODInnovation Home: http://www.gcod.co.kr
IDall Service Home : http://www.idall.io

IDall and Passcon oneID crypto ecosystem GCODInnovation

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

IDall & PASSCON
IDall & PASSCON

Written by IDall & PASSCON

Passwordless one ID secure world

No responses yet

Write a response