Yeole, 2011 - Google Patents
Proposal for novel 3D password for providing authentication in critical web applicationsYeole, 2011
View PDF- Document ID
- 16010598261099089280
- Author
- Yeole A
- Publication year
- Publication venue
- Proceedings of the International Conference & Workshop on Emerging Trends in Technology
External Links
Snippet
The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric username and password. Choosing a strong password and protecting the chosen password has always been a popular topic among security …
- 238000000034 method 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
| US9117065B2 (en) | Dynamic interactive identity authentication method and system | |
| US9684780B2 (en) | Dynamic interactive identity authentication method and system | |
| US20130263240A1 (en) | Method for authentication and verification of user identity | |
| US20090276839A1 (en) | Identity collection, verification and security access control system | |
| Schlöglhofer et al. | Secure and usable authentication on mobile devices | |
| Kim et al. | A new shoulder-surfing resistant password for mobile environments | |
| CN111882719A (en) | Password anti-theft method and device based on dynamic password and intelligent lockset | |
| CN101964792B (en) | Multimode mapping based strong authentication method | |
| Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
| Alghathbar et al. | Noisy password scheme: A new one time password system | |
| Fatima et al. | A novel text-based user authentication scheme using pseudo-dynamic password | |
| Aldwairi et al. | Multi-factor authentication system | |
| Yeole | Proposal for novel 3D password for providing authentication in critical web applications | |
| Boonkrong | Security of passwords | |
| He et al. | On the security of an authentication scheme for multi-server architecture | |
| Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
| Bazeer Ahamed et al. | Image captcha blended with OTP for secured authentication | |
| Sathish et al. | User Authentication Methods and Techniques by Graphical Password: A Survey | |
| CN103650411B (en) | Dynamic interactive identity authentication method and system | |
| Ayaz et al. | Evaluation of Effective Password Generation Processes in Terms of Cyber Security | |
| Liou et al. | A study of biometric feature for a recall-based behavioral graphical mobile authentication | |
| Khandelwal et al. | User authentication by secured graphical password implementation | |
| Tangawar et al. | Graphical Password Authentication System In Terms of Usability and Security Attribute | |
| Alghathbar et al. | Noisy password security technique |