Haque et al., 2014 - Google Patents
A new graphical password: combination of recall & recognition based approachHaque et al., 2014
View PDF- Document ID
- 11988193307357988054
- Author
- Haque M
- Imam B
- Publication year
- Publication venue
- International Journal of Computer, Electrical, Automation, Control and Information Engineering
External Links
Snippet
Information Security is the most describing problem in present times. To cop up with the security of the information, the passwords were introduced. The alphanumeric passwords are the most popular authentication method and still used up to now. However, text based …
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Gao et al. | A survey on the use of graphical passwords in security. | |
Khan et al. | A graphical password based system for small mobile devices | |
Zhu et al. | Captcha as graphical passwords—A new security primitive based on hard AI problems | |
Wu et al. | Shoulder-surfing-proof graphical password authentication scheme | |
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
Haque et al. | A new graphical password: combination of recall & recognition based approach | |
Rao et al. | Novel shoulder-surfing resistant authentication schemes using text-graphical passwords | |
Ray | Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices | |
Almuairfi et al. | IPAS: Implicit password authentication system | |
Shammee et al. | A systematic literature review of graphical password schemes | |
Jadhao et al. | Survey on authentication password techniques | |
Lai et al. | A shoulder-surfing resistant scheme embedded in traditional passwords | |
Hu et al. | The security analysis of graphical passwords | |
Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
Tabrez et al. | Pass-matrix authentication a solution to shoulder surfing attacks with the assistance of graphical password authentication system | |
Sunil et al. | Cued click points: Graphical password authentication technique for security | |
Por et al. | The design and implementation of background Pass-Go scheme towards security threats | |
Yesseyeva et al. | Tri-Pass: A new graphical user authentication scheme | |
Mohamad et al. | Image based authentication using zero-knowledge protocol | |
Sreelatha et al. | Intrusion prevention by image based authentication techniques | |
Rajavat et al. | Textual and graphical password authentication scheme resistant to shoulder surfing | |
Dabeer et al. | A novel hybrid user authentication scheme using cognitive ambiguous illusion images | |
Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
Sugumar et al. | Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors |