[go: up one dir, main page]

Zimmermann et al., 2011 - Google Patents

“If it wasn't Secure, They Would Not Use it in the

Zimmermann et al., 2011

View PDF
Document ID
17489765143609584839
Author
Zimmermann V
Gerber N
Publication year

External Links

Snippet

Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are well-acknowledged within the research community. A plurality of alternatives such as other knowledge-based, token-based or biometric authentication schemes have been developed …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints

Similar Documents

Publication Publication Date Title
Zimmermann et al. “If it wasn’t secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies
Dasgupta et al. Advances in user authentication
US11023754B2 (en) Systems and methods for high fidelity multi-modal out-of-band biometric authentication
US9721175B2 (en) Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage
Zhao et al. Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation
Yadav et al. Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass
Crawford et al. Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics
Khan et al. A graphical password based system for small mobile devices
Moallem Human-Computer Interaction and cybersecurity handbook
Kaczmarek et al. Assentication: user de-authentication and lunchtime attack mitigation with seated posture biometric
Sae-Bae et al. Emerging NUI-based methods for user authentication: A new taxonomy and survey
Blanco-Gonzalo et al. Biometric systems interaction assessment: the state of the art
Tiwari et al. Emerging biometric modalities and integration challenges
Kadena et al. Behavioral Biometrics for more (dis) trust and security
Levy et al. Comparing intentions to use university‐provided vs vendor‐provided multibiometric authentication in online exams
Furnell Authenticating ourselves: will we ever escape the password?
Kroeze et al. User authentication based on continuous touch biometrics
Fallahi et al. On the usability of next-generation authentication: A study on eye movement and brainwave-based mechanisms
Malik Biometric Authentication-Risks and advancements in biometric security systems
Ragozin et al. Eyemove-towards mobile authentication using eog glasses
Alsaiari Graphical one-time password authentication
Olorunsola et al. Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions
Kuppusamy PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences
Zabidi et al. A usability evaluation of image and emojis in graphical password
Zimmermann et al. “If it wasn’t Secure, They Would Not Use it in the