[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [bias] BIAS use cases
Cathy, I have missed recent discussions on BIAS, but looking at the use-cases below, I believe that it would be very useful for the group to have a copy of X.tsm and X.tai. As far as I can see, there is a lot of overlap. John L Edward Clay wrote: > Cathy, > > Here are two use cases I put together. Please let me know if this is > the direction you want me to go with this. I will be on the call > tomorrow. However, I will only be able to be on for an hour. > > Have a good one, Ed. > > Use cases high level. > > > 1.User logs into his local client computer. The user then launches a > web browser and enters a url of a protected resource. The resource > requires user name, password, and biometrics (finger print) for > authentication. The resource does authentication locally or the > resource redirects the user to a authentication authority. User enters > user name and password for 1st factor of the authentication process. > Then the user is asked to pass biometric data: > > A. The biometric data is passed via a USB/serial device on the client > computer. > B. The biometric data is passed via a device with an IP address. > C. The biometric template is stored on local device, the user manusha > data is collected and both are passed for match. > > The requested resource uses the data for to authenticate or deny > authentication of the user. > > > 2.User logs into his local client computer. The user then launches a > web browser and enters a url of a protected resource. The resource > requires user name, password, and biometrics (finger print) for > authentication. The resource does authentication locally or the > resource redirects the user to a authentication authority. User enters > user name and password for 1st factor of the authentication process. > Then the user is asked to pass biometric data: > > A. The biometric data is passed via a USB/serial device on the client > computer. > B. The biometric data is passed via a device with an IP address. > C. The biometric template is stored on local device, the user manusha > (sp) data is collected and both are passed for match. > > The requested resource uses the data to authenticate the user. The user > now wants to authenticate to a resource on another domain. The user > points the web browser to the URL, the resource requires user name, > password and biometrics for authentication. The user data is passed > from the authenticated domain to the current resource for authentication > on that domain. The current domains authentication mechanism > authenticates or denies the users credentials. > > > > -- Prof John Larmouth Larmouth T&PDS Ltd (Training and Protocol Development Services Ltd) 1 Blueberry Road Bowdon j.larmouth@salford.ac.uk Cheshire WA14 3LS England Tel: +44 161 928 1605 Fax: +44 161 928 8069
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]