[go: up one dir, main page]

Yeole, 2011 - Google Patents

Proposal for novel 3D password for providing authentication in critical web applications

Yeole, 2011

Document ID
16010598261099089280
Author
Yeole A
Publication year
Publication venue
Proceedings of the International Conference & Workshop on Emerging Trends in Technology

External Links

Snippet

The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric username and password. Choosing a strong password and protecting the chosen password has always been a popular topic among security …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Katsini et al. Security and usability in knowledge-based user authentication: A review
US9117065B2 (en) Dynamic interactive identity authentication method and system
US9684780B2 (en) Dynamic interactive identity authentication method and system
US20130263240A1 (en) Method for authentication and verification of user identity
US20090276839A1 (en) Identity collection, verification and security access control system
Kim et al. A new shoulder-surfing resistant password for mobile environments
Schlöglhofer et al. Secure and usable authentication on mobile devices
CN111882719A (en) Password anti-theft method and device based on dynamic password and intelligent lockset
CN101964792B (en) Multimode mapping based strong authentication method
Arun Kumar et al. A survey on graphical authentication system resisting shoulder surfing attack
Boonkrong Security of passwords
Fatima et al. A novel text-based user authentication scheme using pseudo-dynamic password
Alghathbar et al. Noisy password scheme: A new one time password system
Aldwairi et al. Multi-factor authentication system
Yeole Proposal for novel 3D password for providing authentication in critical web applications
Usmani et al. New text-based user authentication scheme using CAPTCHA
He et al. On the security of an authentication scheme for multi-server architecture
Kumar et al. PassPattern System (PPS): a pattern-based user authentication scheme
Sathish et al. User Authentication Methods and Techniques by Graphical Password: A Survey
Ayaz et al. Evaluation of Effective Password Generation Processes in Terms of Cyber Security
Khandelwal et al. User authentication by secured graphical password implementation
Tangawar et al. Graphical Password Authentication System In Terms of Usability and Security Attribute
Alghathbar et al. Noisy password security technique
Park et al. One touch logon: Replacing multiple passwords with single fingerprint recognition
Liou et al. A study of biometric feature for a recall-based behavioral graphical mobile authentication