To combat the rising threat of identity theft, various technologies exist, each with its own advantages and disadvantages, particularly regarding password authentication. The authors of this survey explore ways to integrate communication standards and protocols to enhance security. They propose innovative identity management systems that cater to diverse user roles and improve usability compared to existing systems. A key aspect of their approach involves analyzing user behavior through sensor data from mobile devices, such as smartphones, fitness trackers, and smartwatches. These devices can continuously monitor movement patterns, location data, and connected networks to compute a trust level indicating the likelihood that the current user is the legitimate owner. This trust level can be communicated to an identity provider, which can then relay it to various services for authentication. If the trust level falls below a certain threshold, access can be denied. This method requires no special hardware, relying instead on commonly used devices. Users no longer need to remember passwords; they simply approve the trust level. Changes in user behavior, such as unusual movement patterns, can trigger immediate access restrictions. The survey provides a thorough overview of digital identity management techniques, detailing attack methods, authentication strategies, and a summary of key protocols for communication among service provid
Christian Tietz Livres



