Mali et al., 2015 - Google Patents
Advanced pin entry method by resisting shoulder surfing attacksMali et al., 2015
View PDF- Document ID
- 13939364115358916105
- Author
- Mali Y
- Mohanpurkar A
- Publication year
- Publication venue
- 2015 International Conference on Information Processing (ICIP)
External Links
Snippet
The individual distinguishing proof number or (PIN) and Passwords are the remarkable well known verification strategy used in different gadgets, for example, Atms, cell phones, and electronic gateway locks. Unfortunately, the traditional PIN-entrance technique is helpless …
- 238000000034 method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
Barkadehi et al. | Authentication systems: A literature review and classification | |
US8997177B2 (en) | Graphical encryption and display of codes and text | |
AU2010306408B2 (en) | System and method for improving security of user account access | |
Schlöglhofer et al. | Secure and usable authentication on mobile devices | |
CN115396139B (en) | Password theft prevention authentication and encryption system and method | |
Imran et al. | Advance secure login | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Valarmathi et al. | Shoulder surfing attack trusted verification–a survey | |
US7966649B1 (en) | System and method for login resistant to compromise | |
Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
Alghathbar et al. | Noisy password scheme: A new one time password system | |
Al-Husainy et al. | A smooth textual password authentication scheme against shoulder surfing attack | |
LIM | Multi-grid background Pass-Go | |
Neenu | On screen randomized blank keyboard | |
Rajavat et al. | Textual and graphical password authentication scheme resistant to shoulder surfing | |
Kumar et al. | A novel approach to prevent hijacking of accounts in the cloud | |
Rao et al. | Improved session based password security system | |
Rani et al. | A novel session password security technique using textual color and images | |
Hemamalini et al. | Graphical password authentication using hybrid pin keypad | |
Divya et al. | Visual authentication using QR code to prevent keylogging | |
Farmand et al. | Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4) | |
HARUNA | A CASCADE MULTI-STAGE ONE-TIME PASSWORD, TEXTUAL AND RECALL-BASED GRAPHICAL PASSWORD FOR ONLINE AUTHENTICATION B | |
Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
Vaz et al. | Authentication technique for security using ensemble graphical password |