Zimmermann et al., 2011 - Google Patents
“If it wasn't Secure, They Would Not Use it in theZimmermann et al., 2011
View PDF- Document ID
- 17489765143609584839
- Author
- Zimmermann V
- Gerber N
- Publication year
External Links
Snippet
Whereas the text password is still ubiquitous as authentication scheme, its shortcomings are well-acknowledged within the research community. A plurality of alternatives such as other knowledge-based, token-based or biometric authentication schemes have been developed …
- 210000000554 Iris 0 abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zimmermann et al. | “If it wasn’t secure, they would not use it in the movies”–security perceptions and user acceptance of authentication technologies | |
| Dasgupta et al. | Advances in user authentication | |
| US11023754B2 (en) | Systems and methods for high fidelity multi-modal out-of-band biometric authentication | |
| US9721175B2 (en) | Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage | |
| Zhao et al. | Picture gesture authentication: Empirical analysis, automated attacks, and scheme evaluation | |
| Yadav et al. | Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass | |
| Crawford et al. | Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics | |
| Khan et al. | A graphical password based system for small mobile devices | |
| Moallem | Human-Computer Interaction and cybersecurity handbook | |
| Kaczmarek et al. | Assentication: user de-authentication and lunchtime attack mitigation with seated posture biometric | |
| Sae-Bae et al. | Emerging NUI-based methods for user authentication: A new taxonomy and survey | |
| Blanco-Gonzalo et al. | Biometric systems interaction assessment: the state of the art | |
| Tiwari et al. | Emerging biometric modalities and integration challenges | |
| Kadena et al. | Behavioral Biometrics for more (dis) trust and security | |
| Levy et al. | Comparing intentions to use university‐provided vs vendor‐provided multibiometric authentication in online exams | |
| Furnell | Authenticating ourselves: will we ever escape the password? | |
| Kroeze et al. | User authentication based on continuous touch biometrics | |
| Fallahi et al. | On the usability of next-generation authentication: A study on eye movement and brainwave-based mechanisms | |
| Malik | Biometric Authentication-Risks and advancements in biometric security systems | |
| Ragozin et al. | Eyemove-towards mobile authentication using eog glasses | |
| Alsaiari | Graphical one-time password authentication | |
| Olorunsola et al. | Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions | |
| Kuppusamy | PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences | |
| Zabidi et al. | A usability evaluation of image and emojis in graphical password | |
| Zimmermann et al. | “If it wasn’t Secure, They Would Not Use it in the |