Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mihajlov et al., 2011 - Google Patents

Recognition-based graphical authentication with single-object images

Mihajlov et al., 2011

View PDF
Document ID
6997794848777959693
Author
Mihajlov M
Jerman-Blazic B
Ilievski M
Publication year
Publication venue
2011 Developments in E-systems Engineering

External Links

Snippet

Getting users to abandon text-based passwords has been a rather difficult task. Several alternatives to textual passwords have been proposed including authentication based on images. Research shows that graphical authentication mechanisms have some advantages …
Continue reading at www.academia.edu (PDF) (other versions)
  • 238000000034 method 0 description 14

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job

Similar Documents

Publication Publication Date Title
US20090276839A1 (en) Identity collection, verification and security access control system
KR101719933B1 (en) Method for producing dynamic data structures for authentication and/or password identification
Almuairfi et al. A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
US10909230B2 (en) Methods for user authentication
US8539574B2 (en) User authentication and access control system and method
Mihajlov et al. On designing usable and secure recognition-based graphical authentication mechanisms
US20120291108A1 (en) Secure user credential control
JP2004213665A (en) Authentication system and device based on random partial pattern recognition
Almuairfi et al. IPAS: implicit password authentication system
Matta et al. TCpC: a graphical password scheme ensuring authentication for IoT resources
Eljetlawi et al. Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods
Moraskar et al. Cued click point technique for graphical password authentication
Mihajlov et al. ImagePass-Designing graphical authentication for security
Mihajlov et al. Recognition-based graphical authentication with single-object images
Jhawar et al. Make mine a quadruple: Strengthening the security of graphical one-time pin authentication
Iyanda et al. Development of two-factor authentication login system using dynamic password with SMS verification
Bindu Secure usable authentication using strong pass text passwords
KR20090007944A (en) Method for protecting exposure of private character string using fake round
Alfard et al. IoTGazePass: A new password scheme for IoT applications
Usmani et al. New text-based user authentication scheme using CAPTCHA
Skračić et al. Knowledge based authentication requirements
Sayed et al. Graphical Password based authentication system with sound sequence
Seksak et al. Choice-Based Graphical Password (CGP) Scheme for web applications
Sakpere et al. Usability Study on Textual and Graphical Passwords
Omotosho et al. Private key management scheme using image features