Srividya et al., 2018 - Google Patents
Practical Authentication Mechanism using PassText and OTP.Srividya et al., 2018
- Document ID
- 2291492046372694238
- Author
- Srividya V
- Swarnalatha P
- Thirupathi L
- Publication year
- Publication venue
- Grenze International Journal of Engineering & Technology (GIJET)
External Links
Snippet
Nowadays, especially with technology's fast development, password authentication mechanism is not enough anymore to provide complete security. This paper aims to implement a strong authentication mechanism with a practical reauthentication technique …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
US8689001B1 (en) | Method and system for protecting user identification information | |
Tirfe et al. | A survey on trends of two-factor authentication | |
Pagar et al. | Strengthening password security through honeyword and Honeyencryption technique | |
Choi et al. | A secure OTP algorithm using a smartphone application | |
Srividya et al. | Practical Authentication Mechanism using PassText and OTP. | |
Kushwaha et al. | A brief survey of challenge–response authentication mechanisms | |
Al Abdulwahid et al. | The current use of authentication technologies: an investigative review | |
Khairnar et al. | Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment | |
Chakraborty et al. | A Study on Password Protection and Encryption in the era of Cyber Attacks | |
CN101964792B (en) | Multimode mapping based strong authentication method | |
Kushwaha | An approach for user authentication one time password (numeric and graphical) scheme | |
Nandi et al. | Graphical password authentication system | |
Balfanz et al. | The future of authentication | |
Gupta et al. | Implementing high grade security in cloud application using multifactor authentication and cryptography | |
Khande et al. | An effective mechanism for securing and managing password using AES-256 encryption & PBKDF2 | |
Walters et al. | Assessing password threats: Implications for formulating university password policies | |
Gugała et al. | Protecting web applications from authentication attacks | |
Persson et al. | A Theoretical Proposal of Two-Factor Authentication in Smartphones | |
Waheed et al. | Secure login protocols: An analysis on modern attacks and solutions | |
Mahbod et al. | Cybersecurity Challenges and Application within the Army National Guard. | |
Patil et al. | Effective authentication for restricing unauthorized user | |
Ibrahim et al. | Client Authentication By Selected Secure Password-Based On Image Using Challenge Handshake Authentication Protocol. | |
Dinesha et al. | Evaluation of secure cloud transmission protocol | |
ALRUWAILI et al. | Improved multi-layer authentication scheme by merging one-time password with voice biometric factor |