Mihajlov et al., 2011 - Google Patents
Recognition-based graphical authentication with single-object imagesMihajlov et al., 2011
View PDF- Document ID
- 6997794848777959693
- Author
- Mihajlov M
- Jerman-Blazic B
- Ilievski M
- Publication year
- Publication venue
- 2011 Developments in E-systems Engineering
External Links
Snippet
Getting users to abandon text-based passwords has been a rather difficult task. Several alternatives to textual passwords have been proposed including authentication based on images. Research shows that graphical authentication mechanisms have some advantages …
- 238000000034 method 0 description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090276839A1 (en) | Identity collection, verification and security access control system | |
KR101719933B1 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
US10909230B2 (en) | Methods for user authentication | |
US8539574B2 (en) | User authentication and access control system and method | |
Mihajlov et al. | On designing usable and secure recognition-based graphical authentication mechanisms | |
US20120291108A1 (en) | Secure user credential control | |
JP2004213665A (en) | Authentication system and device based on random partial pattern recognition | |
Almuairfi et al. | IPAS: implicit password authentication system | |
Matta et al. | TCpC: a graphical password scheme ensuring authentication for IoT resources | |
Eljetlawi et al. | Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods | |
Moraskar et al. | Cued click point technique for graphical password authentication | |
Mihajlov et al. | ImagePass-Designing graphical authentication for security | |
Mihajlov et al. | Recognition-based graphical authentication with single-object images | |
Jhawar et al. | Make mine a quadruple: Strengthening the security of graphical one-time pin authentication | |
Iyanda et al. | Development of two-factor authentication login system using dynamic password with SMS verification | |
Bindu | Secure usable authentication using strong pass text passwords | |
KR20090007944A (en) | Method for protecting exposure of private character string using fake round | |
Alfard et al. | IoTGazePass: A new password scheme for IoT applications | |
Usmani et al. | New text-based user authentication scheme using CAPTCHA | |
Skračić et al. | Knowledge based authentication requirements | |
Sayed et al. | Graphical Password based authentication system with sound sequence | |
Seksak et al. | Choice-Based Graphical Password (CGP) Scheme for web applications | |
Sakpere et al. | Usability Study on Textual and Graphical Passwords | |
Omotosho et al. | Private key management scheme using image features |