Research Article

Secure OpenID Authentication Model by Using Trusted Computing

Table 2

Feature comparison of existing approaches.

MethodLogin on any PCSecurityPriceTrust

My OpenID personal iconOwnSafeInexpensiveMedium
VeriSign and IEAnySafeExpensiveLow
VeriSign and FirefoxOwnSafeExpensiveMedium
VideoopAnyNot safeInexpensiveLow
Jobber’s by SMSAnyNot safeInexpensiveLow
Feng’s proposed modelAnysafeInexpensivemedium
Secured OpenID model (our proposed model)AnySafeInexpensiveHigh