Yeole, 2011 - Google Patents
Proposal for novel 3D password for providing authentication in critical web applicationsYeole, 2011
- Document ID
- 16010598261099089280
- Author
- Yeole A
- Publication year
- Publication venue
- Proceedings of the International Conference & Workshop on Emerging Trends in Technology
External Links
Snippet
The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric username and password. Choosing a strong password and protecting the chosen password has always been a popular topic among security …
- 238000000034 method 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Katsini et al. | Security and usability in knowledge-based user authentication: A review | |
US9117065B2 (en) | Dynamic interactive identity authentication method and system | |
US9684780B2 (en) | Dynamic interactive identity authentication method and system | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
US20090276839A1 (en) | Identity collection, verification and security access control system | |
Kim et al. | A new shoulder-surfing resistant password for mobile environments | |
Schlöglhofer et al. | Secure and usable authentication on mobile devices | |
CN111882719A (en) | Password anti-theft method and device based on dynamic password and intelligent lockset | |
CN101964792B (en) | Multimode mapping based strong authentication method | |
Arun Kumar et al. | A survey on graphical authentication system resisting shoulder surfing attack | |
Boonkrong | Security of passwords | |
Fatima et al. | A novel text-based user authentication scheme using pseudo-dynamic password | |
Alghathbar et al. | Noisy password scheme: A new one time password system | |
Aldwairi et al. | Multi-factor authentication system | |
Yeole | Proposal for novel 3D password for providing authentication in critical web applications | |
Usmani et al. | New text-based user authentication scheme using CAPTCHA | |
He et al. | On the security of an authentication scheme for multi-server architecture | |
Kumar et al. | PassPattern System (PPS): a pattern-based user authentication scheme | |
Sathish et al. | User Authentication Methods and Techniques by Graphical Password: A Survey | |
Ayaz et al. | Evaluation of Effective Password Generation Processes in Terms of Cyber Security | |
Khandelwal et al. | User authentication by secured graphical password implementation | |
Tangawar et al. | Graphical Password Authentication System In Terms of Usability and Security Attribute | |
Alghathbar et al. | Noisy password security technique | |
Park et al. | One touch logon: Replacing multiple passwords with single fingerprint recognition | |
Liou et al. | A study of biometric feature for a recall-based behavioral graphical mobile authentication |