Research Article

Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild

Figure 5

Detailed protocol flow: application login with Windows Hello. The user and the device are authenticated to obtain the access token () for use by the service provider.