A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2

Size: px
Start display at page:

Download "A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2"

Transcription

1 International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) A Novel QR Code and mobile phone based Athentication protocol via Bletooth Sha Li *1, Shha Zh 2 *1 School of Information Science and Technology, Jinan University, Gangzho, China 2 Network & Edcational Technology Center, Jinan University, Gangzho, China [email protected] Keywords: List the keywords covered in yor paper. These keywords will also be sed by the pblisher to prodce a keyword index. For-party; QR Code; OTP; Bletooth; Athentication Abstract. Password based athentication schemes are widely sed in or daily life when we log into websites. However, there are varieties of problems with the simple methods, inclding ssceptibility to nintentional exposre via phishing and cross-sites password rese. We present a novel mobile phone based athentication scheme, which intends to provide secrity and sability greater than that of traditional two-factor athentication protocols. It contains for parties, i.e. the ser, the mobile phone, the crrent compter and the remote server. At first, a sers personal device-mobile phone-stores the key token by scanning QR code, which is sent from the server after ser completes the registration phase. Secondly, the crrent compter can se the Bletooth device address registered in remote server to lanch a connection reqest and then it can commnicate with the mobile phone via Bletooth. Thirdly, when ser wants to log into a website, server wold transmit an OTP(One time password )to sers mobile phone throgh the crrent compter in order to verify the ser. Finally, or scheme has achieved the mtal athentication via Bletooth. Or scheme only needs lower comptation. In terms of sers reqirements, or scheme provides reqest abot changing bind-phone for legal sers over the address registered dring registration phase. After sability and secrity analysis, we can demonstrate that the new scheme fits for the complicated network environment. Introdction The traditional ser athentication factors can be divided into three categories: what yo know, for example, sers name and password ; what yo have, sch as smart cards; what yo are, sch as fingerprint information. Password-based athentication, which is known as "one -factor athentication ", is one of the most widely sed and accepted athentication type. It has some natral and practical advantages, however, its disadvantages are also obvios: sers tend to se simple and easy-to-gess passwords, and often rese passwords across different websites[1][2]. Therefore, some attackers have chances to steal sers password by lanching off-line gessing attacks and phishing attacks. Meantime, server stores a lot of information as the form of plaintext, which can be easily stolen by attackers. As a reslt, sers personal information will be leaked which even wold endanger the property secrity of sers[3][4]. So some researchers made varios efforts and attempts to improve password secrity, and the idea of one-time password -based athentication was proposed later. As the name sggests, a one-time password athentication is the password only be effective in a limited time, and the server does not need to store the ser s password table. It can resist against password gessing and dictionary attacks and achieves a big improvement in secrity[5]. However, one-time password is generated related to the specific complex algorithms, which is often sed as an axiliary role to help complete the athentication process[6] [7]. So many researchers tend to focs on the two-factor athentication, which not only inherits the advantages of password-based athentication, bt also improves the secrity of this kind of athentication scheme. In recent years, two-factor athentication, especially the smart card -based athentication scheme, becase of its low comptation and high secrity, has been attracted more The athors - Pblished by Atlantis Press 41

2 and more attention from scholars[8][9][10][11][12][13], bt it also has some inevitable problems, sch as ser sability. Even thogh smart cards are small and easy-to-carry, many sers still not sed to carry an additional device when they need to login into system; In addition, secrity of sch schemes are qestionable. It is based on the premise that information stored on the smart card is secre, bt a growing nmber of researches have indicated that the secret information within the smart card can be extracted throgh some extraordinary measres, sch as forced electricity ct-off, so secrity of these scheme designed on this assmption cannot be garanteed. With the development of smart phones, their featres and applications become more perfect. To some extent, performance of some smart phones wold be able to compete with small compters. Smart phones have become a necessity of peoples daily life. So someone proposes a new form of two-factor athentication, password and phone, in accordance with this trend. It is a perfect soltion to meeting the ser practical considerations, while the amont of smart phones comptation and storage is mch larger than smart card[14][15]. In this paper, we adopt a variety of crrent mainstream techniqes and proposes an innovative QR-Code based for-party athentication protocol. There are for parties involved in the athentication process: ser, remote server, the crrent compter, and smart phone. New protocol ses two-factor athentication type: password& phone. The ser firstly needs to register with remote server by name, phones Bletooth device address and address. Then phone wold scan QR-Code that contains the token information generated by server, and store the token in the phone. In the athentication process, the crrent compter based on the Bletooth address sent by server to initiate a Bletooth connection with the sers smart phone, the crrent compter wold send one-time passwords and other information to the ser s smart phone via Bletooth. Or Contribtion Or protocol is novel and the state of art. The major innovations as the following:or protocol is a new two-factor based athentication involved for parties, based on or nderstanding of the field, we shold be the first one scheme to take the crrent ser s compter into consideration among the athentication phase, and regard the crrent compter as a trsted device and credible channel in or protocol. This can increase the safety and operability. Registration information in or protocol, inclding sers name and the phones Bletooth device address and address, as far as we know, we shold be the first one to adopt the Bletooth device address as part of registration information, previos stdies did not take into accont the se of sers Bletooth device address. The device athentication schemes even did not intend to consider a Bletooth connection. It can easily and qickly implement Bletooth connection between the crrent compter and sers smart phone in order to realize the commnication. Compared with the schemes based on SMS messages, It can avoid the secrity problems of information transmission and the fees paid to the operators. Or protocol also ses a crrently very poplar and commercial two-dimensional code, QR Code technology, as a visal OOB, transmitting the athentication tokens distribted by registration server and some secret information. It can avoid leakage and theft problems when the server sending messages to the phone, and it can also save the overhead and redce the latency. Or protocol draws on a self-verified timestamp techniqe[16] from the one who generates the original timestamp to verify the validity of the conterpart timestamp, which effectively solves the clock synchronization problems in most timestamp based athentication schemes, the timestamps can be also sed as nonce, which can save the overhead of generating random nmbers. Or protocol selects one-time password generation algorithm, sers can get the crrent password via Bletooth, which can improve the secrity of scheme. 42

3 Paper Organization The rest of the paper is organized as follows. Section 4 covers backgrond abot several technologies involved in or scheme. Then, we describes or new athentication in details in section 5.In section 6, we discss the sability and secrity of or scheme. Finally, in section 7, we make or conclsions. Related Work QR Code. QR Code (Qick Response Code) is a two-dimensional code standards, which was first by a Japanese company Denso proposed by the invention in 1994[17].In 2000, it sccessflly became an ISO International Standard. Initially, QR Code is designed to be applied in the control of atomated prodction processes and design, bt later it is widely sed in many other areas. QR Code is a matrix symbol, with high data capacity, high-speed data acqisition, high-density data printing and other featres. Compared to a linear one-dimensional codes, two-dimensional code can store more data and reqires a relatively longer time to read and process the data. OR Code Based Athentication. More and more people start to concern abot sch a small two-dimensional code, becase its really convenient, people can add friends, log into a website and even complete payment by scanning it. In terms of social networking and commercial prposes, it is already everywhere, and there are some people doing some researches abot athentication by adopting it. In 2006, McCne[18] proposed a two-dimensional code based device pairing athentication framework. This is the first instance of a detailed application of the two-dimensional code in the athentication scheme. In 2009, Genther et al [19]proposed a QR Code and mobile phone based two-factor " challenge - response" mechanism as athentication scheme,which contains "data + nonce" content called "QR-TAN". It was the first time that QR Code considered as the main technology to be sed in athentication scheme. Bt the scheme was based on pblic and private key system, and there were not good methods to solve the problem of generation and distribtion of keys, making it difficlt to promote this method in practical life-se. In 2010, Liao et al [20]proposed an innovative QR Code -based and one-time password athentication protocol. It ses timestamp techniqe replaced conventional random nmbers to achieve lower comptation and small storage featres. However, the protocol didnt take into accont that the need to address the timestamp network clock synchronization isses, and it demonstrated that the protocol still has secrity flaws. In 2013, Harini [21]proposed a two-factor athentication scheme called "2CA" that was based on pblic-private key system. It adopted mltiple technologies, sch as QR Code, one-time password, smart card, to achieve mtal athentication. However, the scheme faces the same problem with Liaos. Besides, there was an isse that sers need to carry on smart card, so the sability will be greatly redced. In the same year, Soondck et al[22] proposed a simple athentication scheme based on QR Code. This scheme sed ser name and password, and then verified the mobile phone to scan two-dimensional code to complete the two-way athentication process. Proposed Scheme There are for parties involved in or scheme,inclding a remote server( S ), the crrent compter(c ), ser(u ) and mobile phone( M ). Athentication process is divided into for phases as follows: the preliminary phase, the registration phase, the login phase, the athentication phase and change bind-phone phase. Notations of the symbols sed in scheme are as followings : Smart phones defined in or scheme shold have some featres: it is relatively moderate volme, with a high resoltion toch screen, and also has a high pixel camera, meaning that it has a 43

4 relatively strong compting power and can handle a relatively sophisticated athentication information. : User identification ; B _ Adds : Bletooth device address ; E _ Adds : address K : Long-term key remote server ; Token : The remote server to sers of tokens ; E (.) QR : QR Code encryption algorithms D (.) QR : QR Code decryption algorithms; OPW : Remote server -generated OTP password ; h (.) : Single-secre hash fnction ; T : Crrent timestamp ; User, Bletooth device address and PC, Bletooth device address and Server Message transmitting via bletooth 1.Connecting with ser s mobile phone via bletooth 2.Retransmitting message from server 1.Compting OTP passwod 2.Selecting a random nmber Mobile Phone QR Code decoding operation Sharing a key token Fig 1 For-party athentication scheme Preliminary phase. Dring the athentication process between U and M, U shold confirm the identity of M and M need also to check the identity of U by password and gestre. Registration phase: Step 1. U sbmits Fig 2 athentication between ser and mobile phone, B _ Adds and E _ Adds to S. Step 2. S check, and E _ Adds, if any information has been registered, S reqires U to reselect the new information. Otherwise, S comptes Token h( K T r) EQR ( Token ),. Step 3. U comptes D ( E ( Token )) Token, store it secrely on the phone. QR QR 44

5 User(U) B _ Adds and E _ Adds Compter(C) B _ Adds and E _ Adds Remote Server(S) Check identity Comptes Token h( K T ) r Token Token Mobile phone(m) Fig 3 Registration phase hysical channel Visal OOB channel Login phase. Step 1. U sends a login reqest, and inpts. S sends B _ Adds to C, then C initiates a Bletooth connection with M throgh B _ Adds. Step 2. S generates password OPW and transmits it to C, and C forwards it to the ser s mobile phone M via Bletooth, then the ser obtains OPW. Step 3. U sbmits {, h( OPW T1), T 1} to S. User(U) Compter(C) Remote Server(S) B _ Adds Check Bletooth connection OPW Generates OPW OPW {, h( OPW T ), T } 1 1 {, h( OPW T ), T } 1 1 Mobile phone(m) Physical channel Bletooth channel Fig 4 Login phase Athentication phase : Step 1. S athenticates {, h( OPW T1), T 1}, and generates a random nmber R. S comptes Token h( K T ), r A EToken ( T1 T2 R), B ht ( 1 R T2), T 2 is the crrent timestamp of S Step 2. S transmits EQR ( A ), B to U.. Step 3. After receiving the information from S, U calclates DQR ( EQR ( A )) A, DToken (A ) DToken ( EToken ( T1 T2 R)) T1 T2 R, 45

6 U checks verifies * T T T, T 1 is the crrent timestamp of U. If the ineqality holds, U B ht ( R T) B. If the eqality holds, U sccessflly athenticates S. Step 4. U calclates C E ( T3 T2 R) and D ht ( 3 R T2),then sends the message Token { C, D } via Bletooth, finally transfer to S. DQR ( EQR ( C )) C Step 5. When receiving the message from U, S comptes DToken ( C ) ( ( 3 2 )) 3 2 DToken E Token T T R T T R, S shold verify if R is eqal to the initial vale. Then S checks T T T, T 2 is the * crrent timestamp of U. If the ineqality holds, S shold verify D ht ( 3 R T2) D. If the eqality holds, S sccessflly athenticates U. So far, U and S completes the two-way athentication. Step 6. S calclates Token1 h( K T r Ta 1), EQR ( Token 1). T a1 is timestamp of S. Step 7. U comptes DQR ( EQR ( Token1)) Token1 and stores it on the phone instead of the old one. User(U) B _ Adds and E _ Adds Compter(C) B _ Adds and E _ Adds Remote Server(S) Mobile phone(m) A Generates R Comptes Token h( K T ) r A E ( T T R) Token 1 2 B ht ( R T) A B 1 2 B * verifies B ht ( R T)? B 1 2 calclates C E ( T T R) Token 3 2 D ht ( R T) { C, D } 3 2 { C, D } comptes D ( E ( C )) C QR QR Token 1 Token 1 verifies * D ht ( 3 R T2)? D comptes Token h( K T T ) 1 r a1 Bletooth channel hysical channel Visal OOB channel Fig 5 Athentication phase Change bind-phone phase If the previos ser s bind-phone has been lost or stolen by someone, sers can propose the reqest to the remote server for changing bind-phone. Step 1. U enters and sends the change reqest to S. A piece of the adio docment contains some random characters generated by S. And all of these are sent to the associated address registered by ser in registration phase, U shold download the adio docment and read it, then inpt the random characters AD. Step 2. U sbmits { h( AD T1), T1, NewB _ Add} to the S, T 1 is the crrent timestamp of U. Step 3. S checks T1 T1 T, T 1 is crrent timestamp of S, and verifies the validity of, NewB _ Add. 46

7 * Step 4. S checks A hm ( T1 ) A. If the eqation holds, S accepts the reqirements of changing bind-phone by U. Step 5. S recalclates Token h( K T T ), E ( Token ). c r c U ses a new mobile phone to read and compte D ( E ( Token )) Token, stores it on the new phone. QR c QR QR c Secrity and Performance Analysis Usability Analysis. 1. Calclation. Throghot the certification process, it involves only a one-way hash fnction arithmetic and QR Code for encryption and decryption operations. Therefore, it is clear that the entire load calclation of whole scheme is relatively lower, and the new scheme can be applied to many lightweight comptation based applications, while it is also very easy to implement it on devices to achieve promotion. 2. Technology. Or scheme draws on the self-verified timestamp technology. It not only solves the problem of clock synchronization, bt also avoids the resorce consmption from generation of random nmber. Compared to similar schemes, or scheme is more efficient and simple. The scheme also ses a one-time password, which combined with the time stamp technology has enhanced athentication secrity. For servers, or scheme has redced the overhead of storing password table and avoided the risk of being leaked passwords. To a certain extent, it has improved the efficiency of athentication. 3. Eqipment. Athentication scheme jst needs the sers mobile phone, which has regarded as a daily-life axiliary eqipment, withot any additional hardware. It is no dobt that or scheme cold eliminate extra brden to sers and improve the sability of t scheme. Secrity Analysis. 1 Attack Model. Assming that certified environmental is relatively closed, not inclding the more broader common areas, sch as train stations and the airports. In these places, there are many factors interfere with the athentication process that we cannot control. We assme that information transmitted over visal OOB channel, the program cannot be eavesdropped, blocked and modified, the message transmitted via Bletooth may be eavesdropped by attackers, in other words, an attacker cold reply and modify these information, which affects the certified process. 2 Secrity Featres. 1) Mobile Information Secrity. In or athentication scheme, the mobile phone as a token of long-term storage media plays a crcial role in the athentication, and ser shold store it safely. However, once mobile phone is lost or stolen by someone, ser can change the server bind-phone, and ser can rebind a new phone. So, even people who have get phone cant log in throgh the mobile phone directly and cant get the servers long-term key K from Token, becase of the secrity of one-way hash fnction, therefore or scheme cold ensre the information secrity. 2) Remote server secrity. From the previos section, attacker finds it difficlt to forge a legal ser by Token.Both server and ser know long-term key K, as the one-way hash fnction is not reversible. Meanwhile attacker cant impersonate the server, becase the attacker cant get one-time passwords and ser s phone Token. 3) The crrent compter secrity. The crrent compter has been regarded as a secre channel to transmit information between mobile phone and the server via Bletooth, it is sggested that ser shold do the login operation on own compter. When compter has connected with the sers phone over Bletooth connection, ser need to confirm that whether it is yor crrent compter. In the athentication process, messages are appended with a time stamp which are carried ot cryptographic operations before they are transmitted throgh crrent compter. This allows the server and ser to athenticate message whether it is original, which is largely avoiding man-in-the-middle attacks and replay attacks, so the crrent compter can be trsted. 4) User Secrity. If sers have always careflly keep their mobile phones, the attackers will not have chance to obtain sers phone. In the athentication process, the ser needs to se the mobile phone for Bletooth connection to transfer message, attacker cant get the sers mobile phone. The 47

8 commnication information all contain a timestamp and hash operations, ths ensring that information cant be eavesdropped by attacker. Conclsion In paper, a novel QR-Code based athentication scheme is presented. There are for parties participate in the scheme: a remote server( S ), the crrent compter(c ), ser(u ) and mobile phone( M ). The new scheme draws on a self-verified timestamp technology and QR Code technology to resist reply attacks and man-in-the-middle attacks. In addition, it adopts a onetime password to improve secrity of athentication. And it ses a mobile phone to connect with crrent compter via Bletooth, which redced the consmption and improved the efficiency. In or scheme, we select a one-way hash fnction and encryption and decryption operations for two-dimension code, which contains a lower compting. After sability analysis and secrity analysis, we can find that or scheme is more simple, secre and friendly compared with other similar type of schemes, and it extremely sits for practical applications. Acknowledgements This work is spported by the National Natral Science Fondation of China (Grant No , , ). It is also spported by the Science Program of Gangdong Province, China(Grant No.2012A ,2011B , 2011B , 2012B , 2012B , 2012B ),the Engineering Research Center Program of Gangdong University, China (Grant No. GCZX-A1103) and Technology Plan Program of Gangzho City, China (Grant No.2013Y ) Reference [1] Yan, J. J., Blackwell, A. F., Anderson, R. J., & Grant, A.. Password Memorability and Secrity: Empirical Reslts. IEEE Secrity & privacy, 2004, 2, (5), pp [2] Bonnea J. Measring password re-se empirically. Light Ble Tochpaper, [3] Bonnea J, Herley C, Van Oorschot P C, et al. The Qest to Replace Passwords: A Framework for Comparative Evalation of Web Athentication Schemes. In Proceedings of the 2012 IEEE Symposim on Secrity and Privacy, IEEE, May 2012, pp [4] National Cybersecrity Awareness Month Updates,. https: //www. facebook. com/ notes/ facebook-secrity/ national-cybersecrity-awareness-month-pdates/ accessed 2011 [5] Haller N, Metz C, Nesser P, et al. A one-time password system. RFC 1938, May, [6] Haller N. The S/KEY one-time password system [7] Liao I E, Lee C C, Hwang M S. A password athentication scheme over insecre networks[j]. Jornal of Compter and System Sciences, 2006, 72,(4), pp [8] Lamport L. Password athentication with insecre commnication. Commnications of the ACM, 1981, 24, (11), pp [9] Hang M S, Li L H. A new remote ser athentication scheme sing smart cards. IEEE Transactions on Consmer Electronics, 2000, 46, (1) pp [10] Das M L, Saxena A, Glati V P. A dynamic -based remote ser athentication scheme. IEEE Transactions on Consmer Electronics, 2004, 50, (2) pp [11] X J, Zh W T, Feng D G. An improved smart card based password athentication scheme with provable secrity. Compter Standards and Interface, 2009,31, (4), pp

9 [12] Song R. Advanced smart card based password athentication protocol. Compter Standards and Interfaces, 2010, 32, (5), pp [13] Li X, Ni J W, Khan M K, et al. An enhanced smart card based remote ser password athentication scheme. Jornal of Network and Compter Applications, 2013, 36, (5), pp [14] D. van Thanh, T. Jonvik, B. Feng and I. Jorstad. Simple Strong Athentication for Internet Applications sing Mobile Phone, in Global Telecommnication Conference(IEEE GLOBECOM), New Orleans, [15] Alol F, Zahidi S, El-Hajj W. Two factor athentication sing mobile phones ACS International Conference on Compter Systems and Applications, AICCSA IEEE, 2009, pp [16] Tsar W J, Li J H, Lee W B. An efficient and secre mlti-server athentication scheme with key agreement. Jornal of Systems and Software, 2012, 85, (4), pp [17] QR Code. com. http: // www. denso-wave.com/ qrcode/ index-e.html accessed: Sept 16, [18] McCne J M, Perrig A, Reiter M K. Seeing-is-believing: Using camera phones for hman-verifiable athentication. Secrity and privacy. Proceedings of the 2005 IEEE Symposim on Secrity and Privacy. IEEE, 2005, pp [19] Starnberger G, Froihofer L, Göschka K M. QR-TAN: Secre mobile transaction athentication International Conference on Reliability and Secrity, ARES09.. IEEE, 2009, pp [20] Liao K C, Lee W H. A novel ser athentication scheme based on QR-code. Jornal of Networks, 2010, 5, (8) pp [21] Harini N, Padmanabhan T R. 2CAth: A New Two Factor Athentication Scheme Using QR-Code. International Jornal of Engineering & Technology, 2013, 5,(2) pp [22] Yoo S, Shin S, Ry D. An effective Two Factor Athentication Method sing QR code

Designing an Authentication Strategy

Designing an Authentication Strategy C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,

More information

Deploying Network Load Balancing

Deploying Network Load Balancing C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft

More information

Planning a Managed Environment

Planning a Managed Environment C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the

More information

Planning a Smart Card Deployment

Planning a Smart Card Deployment C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive

More information

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03 EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information

More information

Enabling Advanced Windows Server 2003 Active Directory Features

Enabling Advanced Windows Server 2003 Active Directory Features C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment

More information

EMC VNX Series Setting Up a Unisphere Management Station

EMC VNX Series Setting Up a Unisphere Management Station EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre

More information

Planning an Active Directory Deployment Project

Planning an Active Directory Deployment Project C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,

More information

Introduction to HBase Schema Design

Introduction to HBase Schema Design Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior

More information

CRM Customer Relationship Management. Customer Relationship Management

CRM Customer Relationship Management. Customer Relationship Management CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2

More information

Using GPU to Compute Options and Derivatives

Using GPU to Compute Options and Derivatives Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation

More information

Designing a TCP/IP Network

Designing a TCP/IP Network C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation

More information

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks

More information

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct

More information

GUIDELINE. Guideline for the Selection of Engineering Services

GUIDELINE. Guideline for the Selection of Engineering Services GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by

More information

Anatomy of SIP Attacks

Anatomy of SIP Attacks Anatomy of SIP Attacks João M. Ceron, Klas Steding-Jessen, and Cristine Hoepers João Marcelo Ceron is a Secrity Analyst at CERT.br/NIC.br. He holds a master s degree from Federal University of Rio Grande

More information

Designing and Deploying File Servers

Designing and Deploying File Servers C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.

More information

9 Setting a Course: Goals for the Help Desk

9 Setting a Course: Goals for the Help Desk IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities

More information

CRM Customer Relationship Management. Customer Relationship Management

CRM Customer Relationship Management. Customer Relationship Management CRM Cstomer Relationship Management Kenneth W. Thorson Tax Commissioner Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging

More information

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg

More information

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,

More information

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic

More information

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader

More information

Planning and Implementing An Optimized Private Cloud

Planning and Implementing An Optimized Private Cloud W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod

More information

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists. Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so

More information

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction

More information

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris.

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris. Motorola Reinvents its Spplier Negotiation Process Using Emptoris and Saves $600 Million An Emptoris Case Stdy Emptoris, Inc. www.emptoris.com VIII-03/3/05 Exective Smmary With the disastros telecommnication

More information

An unbiased crawling strategy for directed social networks

An unbiased crawling strategy for directed social networks Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of

More information

7 Help Desk Tools. Key Findings. The Automated Help Desk

7 Help Desk Tools. Key Findings. The Automated Help Desk 7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part

More information

MSc and MA in Finance and Investment online Study an online MSc and MA in Finance and Investment awarded by UNINETTUNO and Geneva Business School

MSc and MA in Finance and Investment online Study an online MSc and MA in Finance and Investment awarded by UNINETTUNO and Geneva Business School MSc and MA in Finance and Investment online Stdy an online awarded by UNINETTUNO and Geneva Bsiness School Awarded by Geneva Bsiness School Geneva Barcelona Moscow Class profile The connects yo with stdents

More information

Galvin s All Things Enterprise

Galvin s All Things Enterprise Galvin s All Things Enterprise The State of the Clod, Part 2 PETER BAER GALVIN Peter Baer Galvin is the CTO for Corporate Technologies, a premier systems integrator and VAR (www.cptech. com). Before that,

More information

NAPA TRAINING PROGRAMS FOR:

NAPA TRAINING PROGRAMS FOR: NAPA TRAINING PROGRAMS FOR: Employees Otside Sales Store Managers Store Owners See NEW ecatalog Inside O V E R V I E W 2010_StoreTrainingBrochre_SinglePg.indd 1 5/25/10 12:39:32 PM Welcome 2010 Store Training

More information

Optimal Trust Network Analysis with Subjective Logic

Optimal Trust Network Analysis with Subjective Logic The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway

More information

Chapter 1. LAN Design

Chapter 1. LAN Design Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani

More information

EMC Storage Analytics

EMC Storage Analytics EMC Storage Analytics Version 2.1 Installation and User Gide 300-014-858 09 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes the information in

More information

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,

More information

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7 Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices

More information

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated

More information

TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings

TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings TrstSVD: Collaborative Filtering with Both the Explicit and Implicit Inflence of User Trst and of Item Ratings Gibing Go Jie Zhang Neil Yorke-Smith School of Compter Engineering Nanyang Technological University

More information

Facilities. Car Parking and Permit Allocation Policy

Facilities. Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application

More information

Kentucky Deferred Compensation (KDC) Program Summary

Kentucky Deferred Compensation (KDC) Program Summary Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth

More information

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements... PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring

More information

KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT

KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT 5 KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT by: John Barrett Personal assistants (PAs) and their ability to effectively provide essential spports at the workplace are extremely important

More information

Firewall Feature Overview

Firewall Feature Overview PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content

More information

Closer Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction

Closer Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012

More information

Social Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses

Social Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses Social Work Brsary: Academic year 2015/16 Application notes for stdents on ndergradate corses These notes are for ndergradate stdents who have previosly received a brsary. Please make sre yo complete the

More information

Isilon OneFS. Version 7.1. Backup and recovery guide

Isilon OneFS. Version 7.1. Backup and recovery guide Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate

More information

Evolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending

Evolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Evoltionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Abstract Xiaoyn Liao G. Gary Wang * Dept. of Mechanical & Indstrial Engineering, The University of Manitoba Winnipeg, MB,

More information

Our business is to help you take care of your business. Throgmorton Outsourcing Services. HR Services Payroll Immigration Health & Safety

Our business is to help you take care of your business. Throgmorton Outsourcing Services. HR Services Payroll Immigration Health & Safety Or bsiness is to help yo take care of yor bsiness Throgmorton Otsorcing Services HR Services Payroll Immigration Health & Safety Hman Resorces Throgmorton is dedicated to providing HR spport for bsinesses

More information

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1 The Botiqe Premim Do Botiqe Investment Managers Create Vale? AMG White Paper Jne 2015 1 Exective Smmary Botiqe active investment managers have otperformed both non-botiqe peers and indices over the last

More information

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000 Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed

More information

f.airnet DECT over IP System

f.airnet DECT over IP System The modlar IP commnication system for voice and messaging with the greatest mobility: flexible, easy to maintain, expandable. Fnkwerk Secrity Commnications For s, efficient commnication is vital. New:

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

Effective governance to support medical revalidation

Effective governance to support medical revalidation Effective governance to spport medical revalidation A handbook for boards and governing bodies This docment sets ot a view of the core elements of effective local governance of the systems that spport

More information

A Contemporary Approach

A Contemporary Approach BORICP01.doc - 1 Second Edition Edcational Psychology A Contemporary Approach Gary D. Borich The University of Texas at Astin Martin L. Tombari University of Denver (This pblication may be reprodced for

More information

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Regular Specifications of Resource Requirements for Embedded Control Software

Regular Specifications of Resource Requirements for Embedded Control Software Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces

More information

Purposefully Engineered High-Performing Income Protection

Purposefully Engineered High-Performing Income Protection The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits

More information

CONTACT US. The Financial ABCs for Raising a Family

CONTACT US. The Financial ABCs for Raising a Family The Financial ABCs for Raising a Family CONTACT US For more information abot any of the in this brochre, call 1-800-748-4302, visit or at www.mac.com or stop by the branch nearest yo. Federally insred

More information

Curriculum development

Curriculum development DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

Every manufacturer is confronted with the problem

Every manufacturer is confronted with the problem HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,

More information

BIS - Overview and basic package V2.5

BIS - Overview and basic package V2.5 Engineered Soltions BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management

More information

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc. FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional

More information

A taxonomy of knowledge management software tools: origins and applications

A taxonomy of knowledge management software tools: origins and applications Evalation and Program Planning 25 2002) 183±190 www.elsevier.com/locate/evalprogplan A taxonomy of knowledge management software tools: origins and applications Peter Tyndale* Kingston University Bsiness

More information

USA Funds Life Skills Course Summaries. Financial Aid and Paying for College. 101 How Will I Pay for My Higher Education?

USA Funds Life Skills Course Summaries. Financial Aid and Paying for College. 101 How Will I Pay for My Higher Education? USA Fnds Life Skills Corse Smmaries Financial Aid and Paying for College 101 How Will I Pay for My Higher Edcation? Teaches stdents how to find resorces and fnds to finance their higher edcation by examining

More information

The Good Governance Standard for Public Services

The Good Governance Standard for Public Services The Good Governance Standard for Pblic Services The Independent Commission for Good Governance in Pblic Services The Independent Commission for Good Governance in Pblic Services, chaired by Sir Alan Langlands,

More information

Opening the Door to Your New Home

Opening the Door to Your New Home Opening the Door to Yor New Home A Gide to Bying and Financing. Contents Navigating Yor Way to Home Ownership...1 Getting Started...3 Finding Yor Home...9 Finalizing Yor Financing...12 Final Closing...13

More information

WHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor

WHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor WHITE PAPER Filter andwidth Definition of the WaveShaper S-series 1 Introdction The WaveShaper family of s allow creation of ser-cstomized filter profiles over the C- or L- band, providing a flexible tool

More information

A guide to safety recalls in the used vehicle industry GUIDE

A guide to safety recalls in the used vehicle industry GUIDE A gide to safety recalls in the sed vehicle indstry GUIDE Definitions Aftermarket parts means any prodct manfactred to be fitted to a vehicle after it has left the vehicle manfactrer s prodction line.

More information

Practical Tips for Teaching Large Classes

Practical Tips for Teaching Large Classes Embracing Diversity: Toolkit for Creating Inclsive, Learning-Friendly Environments Specialized Booklet 2 Practical Tips for Teaching Large Classes A Teacher s Gide Practical Tips for Teaching Large Classes:

More information

Member of the NKT Group. We connect renewable energy sources. Onshore, offshore and photovoltaic

Member of the NKT Group. We connect renewable energy sources. Onshore, offshore and photovoltaic Member of the NKT Grop We connect renewable energy sorces Onshore, offshore and photovoltaic Completing the pictre www.nktcables.com We connect renewable energy sorces These days, renewable and clean energies

More information