[go: up one dir, main page]

Sugumar et al., 2017 - Google Patents

Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors

Sugumar et al., 2017

Document ID
13996358078411956200
Author
Sugumar V
Soundararajan P
Publication year
Publication venue
2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB)

External Links

Snippet

Shoulder surfing refers to the act of obtaining personal or private information through direct observation. When the victim is oblivious, a malicious observer may acquire the user's password credentials. Observation of the cursor movements on screen is one of the simplest …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer

Similar Documents

Publication Publication Date Title
Sreelatha et al. Authentication schemes for session passwords using color and images
Gao et al. A survey on the use of graphical passwords in security.
Fang et al. THP: A novel authentication scheme to prevent multiple attacks in SDN-based IoT network
Gugenheimer et al. Colorsnakes: Using colored decoys to secure authentication in sensitive contexts
Haque et al. A new graphical password: combination of recall & recognition based approach
Lin et al. Graphical passwords using images with random tracks of geometric shapes
Guerar et al. Clickpattern: A pattern lock system resilient to smudge and side-channel attacks
KR20100095346A (en) Method of user authentication using the virtual keyboard and computer readable storage medium storing program for executing method thereof
Bianchi et al. Open sesame: Design guidelines for invisible passwords
Sugumar et al. Cursor masquerade: Masking of authentic cursor using random numeric keypad and spurious cursors
Kolekar et al. Click and session based—Captcha as graphical password authentication schemes for smart phone and web
Hasan et al. Multifactor pattern implicit authentication
Schwab et al. Picture PassDoodle: usability study
Gao et al. Usability and security of the recall-based graphical password schemes
Kosugi et al. Swipass: Image-based user authentication for touch screen devices
Rajavat et al. Textual and graphical password authentication scheme resistant to shoulder surfing
Farmand et al. Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4)
Walanjkar et al. User authentication using graphical password scheme: a more secure approach using Mobile Interface
Gokhale et al. Graphical password authentication techniques: a review
Thorawade et al. Authentication scheme resistant to shoulder surfing attack using image retrieval
Nazir et al. The Art of Deception: Novel Graphical User Authentication Scheme Using Illusion Images
Higashiyama et al. Revisiting authentication with shoulder-surfing resistance for smartphones
Malempati et al. User authentication using native language passwords
Karode et al. Graphical password authentication system
Binbeshr et al. Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks