Schaub et al., 2013 - Google Patents
Exploring the design space of graphical passwords on smartphonesSchaub et al., 2013
View PDF- Document ID
- 18077299290085703067
- Author
- Schaub F
- Walch M
- Könings B
- Weber M
- Publication year
- Publication venue
- Proceedings of the Ninth Symposium on Usable Privacy and security
External Links
Snippet
Smartphones have emerged as a likely application area for graphical passwords, because they are easier to input on touchscreens than text passwords. Extensive research on graphical passwords and the capabilities of modern smartphones result in a complex design …
- 238000000034 method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Schaub et al. | Exploring the design space of graphical passwords on smartphones | |
Wang et al. | User authentication on mobile devices: Approaches, threats and trends | |
US11055394B2 (en) | Password pattern recognition authentication method | |
De Luca et al. | Back-of-device authentication on smartphones | |
Sun et al. | Dissecting pattern unlock: The effect of pattern strength meter on pattern selection | |
Kim et al. | Multi-touch authentication on tabletops | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
Khan et al. | Augmented reality-based mimicry attacks on behaviour-based smartphone authentication | |
Khot et al. | WYSWYE: shoulder surfing defense for recognition based graphical passwords | |
Malek et al. | Novel shoulder-surfing resistant haptic-based graphical password | |
Anwar et al. | A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication. | |
Kwon et al. | Drag-and-Type: A new method for typing with virtual keyboards on small touchscreens | |
Løge | Tell me who you are and i will tell you your unlock pattern | |
Biddle et al. | Graphical passwords: Learning from the first generation | |
Cain et al. | Usability comparison of over-the-shoulder attack resistant authentication schemes. | |
Dunphy et al. | Gaze-contingent passwords at the ATM | |
Yang | Development status and prospects of graphical password authentication system in Korea | |
Varma et al. | VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks | |
Arif et al. | The use of pseudo pressure in authenticating smartphone users | |
Zhou et al. | A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication | |
Suo | A design and analysis of graphical password | |
Yang et al. | TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords | |
Alsaiari | Graphical one-time password authentication | |
US20120023549A1 (en) | CAPTCHA AND reCAPTCHA WITH SINOGRAPHS | |
Rajarajan et al. | GRAMAP: Three stage graphical password authentication scheme. |