[go: up one dir, main page]

Mali et al., 2015 - Google Patents

Advanced pin entry method by resisting shoulder surfing attacks

Mali et al., 2015

View PDF
Document ID
13939364115358916105
Author
Mali Y
Mohanpurkar A
Publication year
Publication venue
2015 International Conference on Information Processing (ICIP)

External Links

Snippet

The individual distinguishing proof number or (PIN) and Passwords are the remarkable well known verification strategy used in different gadgets, for example, Atms, cell phones, and electronic gateway locks. Unfortunately, the traditional PIN-entrance technique is helpless …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Mali et al. Advanced pin entry method by resisting shoulder surfing attacks
Barkadehi et al. Authentication systems: A literature review and classification
US8997177B2 (en) Graphical encryption and display of codes and text
AU2010306408B2 (en) System and method for improving security of user account access
Schlöglhofer et al. Secure and usable authentication on mobile devices
CN115396139B (en) Password theft prevention authentication and encryption system and method
Imran et al. Advance secure login
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Valarmathi et al. Shoulder surfing attack trusted verification–a survey
US7966649B1 (en) System and method for login resistant to compromise
Arun Kumar et al. A survey on graphical authentication system resisting shoulder surfing attack
Alghathbar et al. Noisy password scheme: A new one time password system
Al-Husainy et al. A smooth textual password authentication scheme against shoulder surfing attack
LIM Multi-grid background Pass-Go
Neenu On screen randomized blank keyboard
Rajavat et al. Textual and graphical password authentication scheme resistant to shoulder surfing
Kumar et al. A novel approach to prevent hijacking of accounts in the cloud
Rao et al. Improved session based password security system
Rani et al. A novel session password security technique using textual color and images
Hemamalini et al. Graphical password authentication using hybrid pin keypad
Divya et al. Visual authentication using QR code to prevent keylogging
Farmand et al. Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4)
HARUNA A CASCADE MULTI-STAGE ONE-TIME PASSWORD, TEXTUAL AND RECALL-BASED GRAPHICAL PASSWORD FOR ONLINE AUTHENTICATION B
Majdalawieh et al. Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking
Vaz et al. Authentication technique for security using ensemble graphical password