Proof of Device: a research by Golem
Proof of Device: a research by Golem
Security

Proof of Device: a research by Golem

By Alfredo de Candia - 5 Jun 2020

Chevron down
Listen this article
download

The team behind the Golem (GNT) blockchain has published research on the Proof of Device concept.

We are talking about PoD, which is an authentication system through which users can validate the hardware used by them, providing proof of their identity in a secure way.

Proof of Device is especially useful for online services that need to authenticate users’ logins.

Most online platforms that require a high level of security, such as crypto exchanges, use a multi-step system to confirm access to the platform and prevent unauthorized logins, in case criminals have stolen, for example, the credentials of users.

In this case, a first measure is provided by 2-factor authentication (2FA) so that access from automatic systems, such as BOTs, that would clog the platform would be blocked, also through the use of the classic CAPTCHA.

What is Proof of Device?

Proof of Device does not replace the previous authentication methods, as pointed out by the Golem team, but serves as an additional level of protection: in fact, with this system the user is required to sign access to the platform with private keys that are stored inside the user’s device hardware.

The system is managed by the SGX enclave, which is a system that runs exclusively with the help of a CPU and therefore needs hardware that can manage the information.

The hardware, in this case, can also be a normal smartphone.

Moreover, the Proof of Device system has the potential to be run by other TEE (Trusted Execution Environment).

It is very useful for different purposes as PoD can be applied to several sectors, such as banking and home banking services.

Clearly what Golem is presenting at the moment is only a PoC (Proof of Concept) but it has interesting prospects because security is a fundamental aspect for every sector, especially for the crypto world: consider for example the Metamorfo malware that manages to steal bank data from infected devices.

Hardware solutions in the security sector are not new, there are also USB sticks and security keys, which allow users to authenticate on various platforms, such as the one provided by Yubico that can be used on the Binance exchange. The EOS blockchain will also be able to use this type of key, which was announced by Yubico’s CPO during last year’s EOS event.

Alfredo de Candia

Android developer for over 8 years with a dozen of developed apps, Alfredo at age 21 has climbed Mount Fuji following the saying: "He who climbs Mount Fuji once in his life is a wise man, who climbs him twice is a Crazy". Among his app we find a Japanese database, a spam and virus database, the most complete database on Anime and Manga series birthdays and a shitcoin database. Sunday Miner, Alfredo has a passion for crypto and is a fan of EOS.

We use cookies to make sure you can have the best experience on our site. If you continue to use this site we will assume that you are happy with it.