Abbas et al., 2023 - Google Patents
Pass point selection of automatic graphical password authentication technique based on histogram methodAbbas et al., 2023
View PDF- Document ID
- 12496546838575015202
- Author
- Abbas S
- Jawad L
- Publication year
- Publication venue
- Iraqi Journal of Information and Communication Technology
External Links
Snippet
Graphical passwords, as opposed to textual passwords, require the user to pick pictures or draw symbols rather than input written letters. They are an option that may be explored in order to get over the issues that are caused by the system of passwords that are based on …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11468157B2 (en) | Method for authenticating a user by user identifier and associated graphical password | |
US8918849B2 (en) | Secure user credential control | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Gao et al. | Design and analysis of a graphical password scheme | |
US20150067786A1 (en) | Visual image authentication and transaction authorization using non-determinism | |
US11693944B2 (en) | Visual image authentication | |
Ogiela et al. | Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security | |
Zangooei et al. | A hybrid recognition and recall based approach in graphical passwords | |
Abbas et al. | Pass point selection of automatic graphical password authentication technique based on histogram method | |
Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
Yadav et al. | Adding Persuasive features in Graphical Password to increase the capacity of KBAM | |
Ghiyamipour | Secure graphical password based on cued click points using fuzzy logic | |
Joshi et al. | Authentication using text and graphical password | |
Abraheem et al. | Survey of various graphical password techniques and their schemes | |
Alfard et al. | IoTGazePass: A new password scheme for IoT applications | |
Lashkari et al. | A survey on usability and security features in graphical user authentication algorithms | |
Wang et al. | Time evolving graphical password for securing mobile devices | |
Mohamad et al. | Image based authentication using zero-knowledge protocol | |
LIM | Multi-grid background Pass-Go | |
Hanif et al. | A new shoulder surfing and mobile key-logging resistant graphical password scheme for smart-held devices | |
Potey et al. | Secure authentication for data protection in cloud computing using color schemes | |
Boonkrong | Password-based authentication | |
Al-Shqeerat | Securing a question-based multi-factor authentication system using LSB steganography technique | |
Khedkar et al. | A Comprehensive Survey of Graphical Passwords Authentication Systems that Provides Security | |
Zarif et al. | A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs. |