Research Article
Secure OpenID Authentication Model by Using Trusted Computing
Table 2
Feature comparison of existing approaches.
| Method | Login on any PC | Security | Price | Trust |
| My OpenID personal icon | Own | Safe | Inexpensive | Medium | VeriSign and IE | Any | Safe | Expensive | Low | VeriSign and Firefox | Own | Safe | Expensive | Medium | Videoop | Any | Not safe | Inexpensive | Low | Jobber’s by SMS | Any | Not safe | Inexpensive | Low | Feng’s proposed model | Any | safe | Inexpensive | medium | Secured OpenID model (our proposed model) | Any | Safe | Inexpensive | High |
|
|