Kumar et al., 2008 - Google Patents
PassPattern System (PPS): a pattern-based user authentication schemeKumar et al., 2008
View PDF- Document ID
- 4477004884917283362
- Author
- Kumar T
- Raghavan S
- Publication year
- Publication venue
- NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet: 7th International IFIP-TC6 Networking Conference Singapore, May 5-9, 2008 Proceedings 7
External Links
Snippet
Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) choose very simple passwords which are often easy to …
- 230000003044 adaptive 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bonneau et al. | Passwords and the evolution of imperfect authentication | |
US8191126B2 (en) | Methods and devices for pattern-based user authentication | |
Gao et al. | A survey on the use of graphical passwords in security. | |
Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
Mali et al. | Advanced pin entry method by resisting shoulder surfing attacks | |
Zhu et al. | Captcha as graphical passwords—A new security primitive based on hard AI problems | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
US20150317469A1 (en) | Dynamic interactive identity authentication method and system | |
Haque et al. | A new graphical password: combination of recall & recognition based approach | |
Lin et al. | Graphical passwords using images with random tracks of geometric shapes | |
Binbeshr et al. | Secure pin-entry method using one-time pin (OTP) | |
US7966649B1 (en) | System and method for login resistant to compromise | |
Nandi et al. | Graphical password authentication system | |
Jhawar et al. | Make mine a quadruple: Strengthening the security of graphical one-time pin authentication | |
KR100927280B1 (en) | How to prevent secure string exposure using fake rounds | |
Alghathbar et al. | Noisy password scheme: A new one time password system | |
Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
Chowdhury et al. | Salty Secret: Let us secretly salt the secret | |
LIM | Multi-grid background Pass-Go | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
Yeole | Proposal for novel 3D password for providing authentication in critical web applications | |
Haque et al. | A concept of captcha based dynamic password | |
Shakir et al. | S3TFPAS: Scalable shoulder surfing resistant textual-formula base password authentication system | |
Vikas | Authentication Scheme for Passwords using Color and Text | |
Akif et al. | Protecting a sensitive dataset using a time based password in big data |