[go: up one dir, main page]

Mahajan et al., 2019 - Google Patents

Cued Click Point Graphical Authentication

Mahajan et al., 2019

View PDF
Document ID
6667919596560754927
Author
Mahajan Y
Chincholi S
Tile G
Thosar D
Patil P
Publication year
Publication venue
Vidyawarta®

External Links

Snippet

Standard human-computer-interaction approaches is not directly relevant. Security that are usable has exclusive usability challenges for the need of protection of data. Users choose password is the significant uses objective for authentication of the entire system. Most of the …
Continue reading at www.vidyawarta.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
CA2689853C (en) Secure access by a user to a resource
Sreelatha et al. Authentication schemes for session passwords using color and images
US9684780B2 (en) Dynamic interactive identity authentication method and system
US9117065B2 (en) Dynamic interactive identity authentication method and system
US8539574B2 (en) User authentication and access control system and method
US20100199100A1 (en) Secure Access by a User to a Resource
US8327420B2 (en) Authentication system and method
Alsaiari et al. Secure graphical one time password (gotpass): an empirical study
Irfan et al. Text based graphical password system to obscure shoulder surfing
Alghathbar et al. Noisy password scheme: A new one time password system
Kenneth et al. Web application authentication using visual cryptography and cued clicked point recall-based graphical password
Mahajan et al. Cued Click Point Graphical Authentication
Wang et al. Time evolving graphical password for securing mobile devices
Marco Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems
Ahsan et al. Graphical password authentication using images sequence
LIM Multi-grid background Pass-Go
Rao et al. Improved session based password security system
Hemamalini et al. Graphical password authentication using hybrid pin keypad
Hassan et al. Servers voice graphical authentication
Pawar et al. A survey paper on authentication for shoulder surfing resistance for graphical password using cued click point (CCP)
Chaluvadi et al. Improved Arbitrary Graphical Password Authentication for Web Application Safety
US20160306959A1 (en) Method of authentication
Rajadnya et al. Password Protection for Online and Offline Data
Yashaswini et al. ABOPI: Authentication by bringing own picture/image
Khedkar et al. A Comprehensive Survey of Graphical Passwords Authentication Systems that Provides Security