[go: up one dir, main page]

Schaub et al., 2013 - Google Patents

Exploring the design space of graphical passwords on smartphones

Schaub et al., 2013

View PDF
Document ID
18077299290085703067
Author
Schaub F
Walch M
Könings B
Weber M
Publication year
Publication venue
Proceedings of the Ninth Symposium on Usable Privacy and security

External Links

Snippet

Smartphones have emerged as a likely application area for graphical passwords, because they are easier to input on touchscreens than text passwords. Extensive research on graphical passwords and the capabilities of modern smartphones result in a complex design …
Continue reading at cups.cs.cmu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Schaub et al. Exploring the design space of graphical passwords on smartphones
Wang et al. User authentication on mobile devices: Approaches, threats and trends
US11055394B2 (en) Password pattern recognition authentication method
De Luca et al. Back-of-device authentication on smartphones
Sun et al. Dissecting pattern unlock: The effect of pattern strength meter on pattern selection
Kim et al. Multi-touch authentication on tabletops
Sreelatha et al. Authentication schemes for session passwords using color and images
Khan et al. Augmented reality-based mimicry attacks on behaviour-based smartphone authentication
Khot et al. WYSWYE: shoulder surfing defense for recognition based graphical passwords
Malek et al. Novel shoulder-surfing resistant haptic-based graphical password
Anwar et al. A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.
Kwon et al. Drag-and-Type: A new method for typing with virtual keyboards on small touchscreens
Løge Tell me who you are and i will tell you your unlock pattern
Biddle et al. Graphical passwords: Learning from the first generation
Cain et al. Usability comparison of over-the-shoulder attack resistant authentication schemes.
Dunphy et al. Gaze-contingent passwords at the ATM
Yang Development status and prospects of graphical password authentication system in Korea
Varma et al. VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks
Arif et al. The use of pseudo pressure in authenticating smartphone users
Zhou et al. A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication
Suo A design and analysis of graphical password
Yang et al. TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords
Alsaiari Graphical one-time password authentication
US20120023549A1 (en) CAPTCHA AND reCAPTCHA WITH SINOGRAPHS
Rajarajan et al. GRAMAP: Three stage graphical password authentication scheme.