Research Article
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild
Figure 5
Detailed protocol flow: application login with Windows Hello. The user and the device are authenticated to obtain the access token () for use by the service provider.