Alnfiai et al., 2019 - Google Patents
BraillePassword: accessible web authentication technique on touchscreen devicesAlnfiai et al., 2019
View PDF- Document ID
- 12459241158554899529
- Author
- Alnfiai M
- Sampalli S
- Publication year
- Publication venue
- Journal of Ambient Intelligence and Humanized Computing
External Links
Snippet
Blind people use smartphone devices to perform many daily activities like mobile banking, social media, shopping, health care, etc. While smartphone devices are essential tools for many people who are blind and visually impaired, these devices pose significant security …
- 238000000034 method 0 title abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alnfiai et al. | BraillePassword: accessible web authentication technique on touchscreen devices | |
Yadav et al. | Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass | |
US9430144B1 (en) | Unlocking electronic devices with touchscreen input gestures | |
Khan et al. | Augmented reality-based mimicry attacks on behaviour-based smartphone authentication | |
Zimmermann et al. | “If it wasn’t secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies | |
Li et al. | Designing leakage-resilient password entry on head-mounted smart wearable glass devices | |
Düzgün et al. | Shoulder-surfing resistant authentication for augmented reality | |
Kwon et al. | SteganoPIN: Two-faced human–machine interface for practical enforcement of PIN entry security | |
Varma et al. | VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks | |
Riyadh et al. | Usable authentication in virtual reality: Exploring the usability of pins and gestures | |
Lai et al. | A shoulder-surfing resistant scheme embedded in traditional passwords | |
Hasan et al. | A Review on Secure Authentication Mechanisms for Mobile Security | |
US11132432B2 (en) | Tactile challenge-response testing for electronic devices | |
Bhole et al. | Haptic2FA: haptics-based accessible two-factor authentication for blind and low vision people | |
Holland et al. | Dynamic keypad–digit shuffling for secure pin entry in a virtual world | |
Alsaiari | Graphical one-time password authentication | |
Faustino et al. | Bend or PIN: studying bend password authentication with people with vision impairment | |
Bianchi et al. | Open sesame: Design guidelines for invisible passwords | |
Ali et al. | Developing and evaluating a gestural and tactile mobile interface to support user authentication | |
Lobo et al. | Coping with accessibility challenges for security-a user study with blind smartphone users | |
Kharrufa et al. | Using IMUs to identify supervisors on touch devices | |
Cain et al. | A rapid serial visual presentation method for graphical authentication | |
Yang et al. | Cue-based two factor authentication | |
Furuberg et al. | From password to passwordless: Exploring user experience obstacles to the adoption of FIDO2 authentication | |
US10691833B2 (en) | Method and an apparatus for activating a predetermined function |