Alfard et al., 2021 - Google Patents
IoTGazePass: A new password scheme for IoT applicationsAlfard et al., 2021
- Document ID
- 3759826393677472641
- Author
- Alfard F
- Keshlaf A
- Bouzid O
- Publication year
- Publication venue
- 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA
External Links
Snippet
Authentication is one of the most important security aspects to protect user privacy in computers, internet environments and IoT applications. In this regard, the traditional textual- based password type is the most common means of authentication. However, this type of …
- 239000003086 colorant 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Captcha as graphical passwords—A new security primitive based on hard AI problems | |
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
US8918849B2 (en) | Secure user credential control | |
Almuairfi et al. | A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices | |
Rao et al. | Novel shoulder-surfing resistant authentication schemes using text-graphical passwords | |
US20130139238A1 (en) | Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network | |
Almuairfi et al. | IPAS: Implicit password authentication system | |
KR20220123657A (en) | Privacy biometric authentication | |
Haque et al. | A new graphical password: combination of recall & recognition based approach | |
Ray et al. | GPOD: an efficient and secure graphical password authentication system by fast object detection | |
Islam et al. | A review on recognition-based graphical password techniques | |
Alfard et al. | IoTGazePass: A new password scheme for IoT applications | |
Awan et al. | A taxonomy of multimedia-based graphical user authentication for green Internet of Things | |
KR100927280B1 (en) | How to prevent secure string exposure using fake rounds | |
Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
Mihajlov et al. | ImagePass-Designing graphical authentication for security | |
Djeki et al. | Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification | |
Yesseyeva et al. | Tri-Pass: A new graphical user authentication scheme | |
Zhou et al. | PassGrid: towards graph-supplemented textual shoulder surfing resistant authentication | |
Maheshwari et al. | SPOSS: secure pin-based-authentication obviating shoulder surfing | |
van Oorschot | User authentication—passwords, biometrics and alternatives | |
Mihajlov et al. | Recognition-based graphical authentication with single-object images | |
LIM | Multi-grid background Pass-Go | |
Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
Rajavat et al. | Textual and graphical password authentication scheme resistant to shoulder surfing |