Work item:
|
X.accsadlt
|
Subject/title:
|
Access security authentication based on DLT
|
Status:
|
Under study [Issued from previous study period]
|
Approval process:
|
TAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
2025-04 (Medium priority)
|
Liaison:
|
-
|
Supporting members:
|
Malaysia, Luxembourg, FNS Malaysia
|
Summary:
|
This draft new Recommendation proposes the access security authentication requirements that leverages on distributed ledger technology (DLT) to enable secure, fast, and convenient distributed authentication and verification of user and device access to digital services. DLT based access security authentication enable secure identification, validation and verification services that can be designed to meet the organizations access security and controls requirements.
Access security authentication based on DLT protects user credentials against fraudulent activities with distributed method of authentication and verification. DLT also enable a passwordless distributed ledger verification services with MFA systems to protect user account from being taken over (ATO), fraudulent transactions, unauthorized account access, account hijacking, credential frauds and ransomware.
This draft new Recommendation supports the ITU-T X.1400, X.1401, X.1402 Recommendations and ISO 22739:2020 as the references and as a use case for DLT systems. This draft new Recommendation should benefit DLT system researchers, designers, developers, and users to design, and implement access security authentication system based on DLT.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2023-10-04 11:33:48
|
Last update:
2024-09-17 14:39:41
|