Auflistung nach Autor:in "Feldmann, Florian"
1 - 4 von 4
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragHow to authenticate mobile devices in a web environment – The SIM-ID approach(Open Identity Summit 2013, 2013) Feldmann, Florian; Schwenk, JörgWith the advent of the iPhone AppStore and Google Play, the 'walled garden' approach of telecommunication companies to supply content to their customers using standard GSM/UMTS/LTE authentication has failed: Neither Google nor Apple, nor any other content provider on the mobile internet, uses the SIM card for authentication. This is mainly due to the fact that mobile telecommunication and internet architectures differ substantially. In this paper, we propose several bridging technologies to fill this gap. We exemplarily show how to use SIM authentication for web-based Single-Sign-On protocols. Starting from simple password replacement in the authentication between User Agent (UA) and Identity Provider (IdP), we show how we can achieve strong channel bindings between all TLS channels and SIM based authentication.
- KonferenzbeitragLearning by Tagging – Supporting Constructive Learning in Video-Based Environments(DeLFI 2018 - Die 16. E-Learning Fachtagung Informatik, 2018) Harbarth, Lydia; Delsing, Svea; Richtscheid, Florian; Yücepur, Volkan; Feldmann, Florian; Akhavanfarm, Milad; Manske, Sven; Othlinghaus, Julia; Hoppe, H. UlrichUsing video-based learning materials is a common practice in online learning scenarios today. However, the passive consumption of educational video resources tends to go with low engagement of the learners. Adding interactive features to videos might have the potential to overcome this deficit and might lead to more active learning. We have developed an integrated learning flow that incorporates four interactive features supporting constructive learning: video tagging, flashcards, concept maps, and in-video quizzes. We integrated these features into an exisiting blended learning course and evaluated their respective adoption and acceptance in a user study to gain first insights into the general motivation to use the employed features for individual learning.
- KonferenzbeitragOn the design and implementation of the Open eCard App(SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit, 2012) Hühnlein, Detlef; Petrautzki, Dirk; Schmölz, Johannes; Wich, Tobias; Horsch, Moritz; Wieland, Thomas; Eichholz, Jan; Wiesmaier, Alexander; Braun, Johannes; Feldmann, Florian; Potzernheim, Simon; Schwenk, Jörg; Kahlo, Christian; Kühne, Andreas; Veit, HeikoThe paper at hand discusses the design and implementation of the “Open eCard App”, which is a lightweight and open eID client, which integrates major international standards. It supports strong authentication and electronic signatures with numerous common electronic identity cards in desktop as well as mobile environments. The Open eCard App is designed to be as lightweight, usable and modular as possible to support a variety of popular platforms including Android for example. It will be distributed under a suitable open source license and hence may provide an interesting alternative to existing eID clients.
- KonferenzbeitragStrengthening Web Authentication through TLS - Beyond TLS Client Certificates(Open Identity Summit 2014, 2014) Mayer, Andreas; Mladenov, Vladislav; Schwenk, Jörg; Feldmann, Florian; Meyer, ChristopherEven though novel identification techniques like Single Sign-On (SSO) are on the rise, stealing the credentials used for the authentication is still possible. This situation can only be changed if we make novel use of the single cryptographic functionality a web browser offers, namely TLS. Although the use of client certificates for initial login has a long history, only two approaches to integrate TLS in the session cookie mechanism have been proposed so far: Origin Bound Client Certificates in [DCBW12], and the Strong Locked Same Origin Policy (SLSOP) in [KSTW07]. In this paper, we propose a third method based on the TLS-unique API proposed in RFC 5929 [AWZ10]: A single TLS session is uniquely identified through each of the two Finished messages exchanged during the TLS handshake, and RFC 5929 proposes to make the first Finished message available to higher layer protocols through a novel browser API. We show how this API can be used to strengthen all commonly used types of authentication, ranging from simple password based authentication and SSO to session cookie binding.