[go: up one dir, main page]

Kumar et al., 2008 - Google Patents

PassPattern System (PPS): a pattern-based user authentication scheme

Kumar et al., 2008

View PDF
Document ID
4477004884917283362
Author
Kumar T
Raghavan S
Publication year
Publication venue
NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet: 7th International IFIP-TC6 Networking Conference Singapore, May 5-9, 2008 Proceedings 7

External Links

Snippet

Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) choose very simple passwords which are often easy to …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Similar Documents

Publication Publication Date Title
Bonneau et al. Passwords and the evolution of imperfect authentication
US8191126B2 (en) Methods and devices for pattern-based user authentication
Gao et al. A survey on the use of graphical passwords in security.
Katsini et al. Security and usability in knowledge-based user authentication: A review
Mali et al. Advanced pin entry method by resisting shoulder surfing attacks
Zhu et al. Captcha as graphical passwords—A new security primitive based on hard AI problems
US20130263240A1 (en) Method for authentication and verification of user identity
US20150317469A1 (en) Dynamic interactive identity authentication method and system
Haque et al. A new graphical password: combination of recall & recognition based approach
Lin et al. Graphical passwords using images with random tracks of geometric shapes
Binbeshr et al. Secure pin-entry method using one-time pin (OTP)
US7966649B1 (en) System and method for login resistant to compromise
Nandi et al. Graphical password authentication system
Jhawar et al. Make mine a quadruple: Strengthening the security of graphical one-time pin authentication
KR100927280B1 (en) How to prevent secure string exposure using fake rounds
Alghathbar et al. Noisy password scheme: A new one time password system
Kumar et al. PassPattern System (PPS): a pattern-based user authentication scheme
Chowdhury et al. Salty Secret: Let us secretly salt the secret
LIM Multi-grid background Pass-Go
Gao et al. Usability and security of the recall-based graphical password schemes
Yeole Proposal for novel 3D password for providing authentication in critical web applications
Haque et al. A concept of captcha based dynamic password
Shakir et al. S3TFPAS: Scalable shoulder surfing resistant textual-formula base password authentication system
Vikas Authentication Scheme for Passwords using Color and Text
Akif et al. Protecting a sensitive dataset using a time based password in big data