Mahajan et al., 2019 - Google Patents
Cued Click Point Graphical AuthenticationMahajan et al., 2019
View PDF- Document ID
- 6667919596560754927
- Author
- Mahajan Y
- Chincholi S
- Tile G
- Thosar D
- Patil P
- Publication year
- Publication venue
- Vidyawarta®
External Links
Snippet
Standard human-computer-interaction approaches is not directly relevant. Security that are usable has exclusive usability challenges for the need of protection of data. Users choose password is the significant uses objective for authentication of the entire system. Most of the …
- 238000000034 method 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2689853C (en) | Secure access by a user to a resource | |
Sreelatha et al. | Authentication schemes for session passwords using color and images | |
US9684780B2 (en) | Dynamic interactive identity authentication method and system | |
US9117065B2 (en) | Dynamic interactive identity authentication method and system | |
US8539574B2 (en) | User authentication and access control system and method | |
US20100199100A1 (en) | Secure Access by a User to a Resource | |
US8327420B2 (en) | Authentication system and method | |
Alsaiari et al. | Secure graphical one time password (gotpass): an empirical study | |
Irfan et al. | Text based graphical password system to obscure shoulder surfing | |
Alghathbar et al. | Noisy password scheme: A new one time password system | |
Kenneth et al. | Web application authentication using visual cryptography and cued clicked point recall-based graphical password | |
Mahajan et al. | Cued Click Point Graphical Authentication | |
Wang et al. | Time evolving graphical password for securing mobile devices | |
Marco | Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems | |
Ahsan et al. | Graphical password authentication using images sequence | |
LIM | Multi-grid background Pass-Go | |
Rao et al. | Improved session based password security system | |
Hemamalini et al. | Graphical password authentication using hybrid pin keypad | |
Hassan et al. | Servers voice graphical authentication | |
Pawar et al. | A survey paper on authentication for shoulder surfing resistance for graphical password using cued click point (CCP) | |
Chaluvadi et al. | Improved Arbitrary Graphical Password Authentication for Web Application Safety | |
US20160306959A1 (en) | Method of authentication | |
Rajadnya et al. | Password Protection for Online and Offline Data | |
Yashaswini et al. | ABOPI: Authentication by bringing own picture/image | |
Khedkar et al. | A Comprehensive Survey of Graphical Passwords Authentication Systems that Provides Security |