Boonkrong, 2020 - Google Patents
Password-based authenticationBoonkrong, 2020
- Document ID
- 4542160722343217661
- Author
- Boonkrong S
- Publication year
- Publication venue
- Authentication and Access Control: Practical Cryptography Methods and Tools
External Links
Snippet
Among today's factors and methods of authentication, the something-you-know factor, more specifically password, is the most commonly used. It remains the main method for proving user's identity for email accounts, Internet banking accounts, and other online services. This …
- 238000000034 method 0 abstract description 65
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9740849B2 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US11468157B2 (en) | Method for authenticating a user by user identifier and associated graphical password | |
US8918849B2 (en) | Secure user credential control | |
US6901145B1 (en) | Generation of repeatable cryptographic key based on varying parameters | |
CN106161006B (en) | Digital encryption algorithm | |
US20090276839A1 (en) | Identity collection, verification and security access control system | |
US8539574B2 (en) | User authentication and access control system and method | |
CN109075972A (en) | Password anti-theft authentication and encryption system and method | |
Dhanalakshmi et al. | Password Manager with Multi-Factor Authentication | |
Baseer et al. | Multi-factor authentication: A user experience study | |
Boonkrong | Password-based authentication | |
Abbas et al. | Pass point selection of automatic graphical password authentication technique based on histogram method | |
Joshi et al. | Authentication using text and graphical password | |
KR101039909B1 (en) | Hacking user authentication system and method | |
Mohamad et al. | Image based authentication using zero-knowledge protocol | |
Matelski | Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication | |
Gharbi et al. | Honey Encryption Security Techniques: A Review Paper | |
Mihajlov et al. | Recognition-based graphical authentication with single-object images | |
Varghese et al. | 3-Level Password Authentication System | |
Chhetri | Novel approach towards authentication using multi level password system | |
Naik et al. | Advancements in User Security: Enhancing Usability with Graphical Password Authentication | |
EP2523140B1 (en) | Secure user credential control | |
Chakraborty et al. | On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries | |
Matelski | Universal Key to Authentication Authority with Human-Computable OTP Generator | |
Chakravarthy et al. | A Probabilistic Approach For Authenticating Text Or Graphical Passwords Using Back Propagation |