Elftmann, 2006 - Google Patents
Secure alternatives to password-based authentication mechanismsElftmann, 2006
- Document ID
- 3643945253101542593
- Author
- Elftmann P
- Publication year
- Publication venue
- Lab. for Dependable Distributed Systems, RWTH Aachen Univ
External Links
- 238000000034 method 0 abstract description 99
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dasgupta et al. | Advances in user authentication | |
Van Nguyen et al. | DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices | |
Furnell et al. | Authentication and supervision: A survey of user attitudes | |
US20090276839A1 (en) | Identity collection, verification and security access control system | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
Marasco et al. | Biometric multi‐factor authentication: On the usability of the FingerPIN scheme | |
Wahab et al. | Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism. | |
Serwadda et al. | Using global knowledge of users' typing traits to attack keystroke biometrics templates | |
Abiew et al. | Design and implementation of cost effective multi-factor authentication framework for ATM systems | |
Nabi et al. | Cybersecurity mechanism and user authentication security methods | |
Elftmann | Secure alternatives to password-based authentication mechanisms | |
Haque et al. | Authentication through keystrokes: What you type and how you type | |
Schiavone et al. | Usability assessment in a multi-biometric continuous authentication system | |
Avasthi et al. | Biometric authentication techniques: a study on keystroke dynamics | |
Pierce et al. | A conceptual model for graphical authentication | |
van Oorschot | User authentication—passwords, biometrics and alternatives | |
Schwab et al. | Picture PassDoodle: usability study | |
Mansour et al. | A new approach for textual password hardening using keystroke latency times. | |
Dunphy | Usable, secure and deployable graphical passwords | |
Al Abdulwahid | Federated authentication using the cloud (Cloud Aura) | |
Tangawar et al. | Survey paper on graphical password authentication system in terms of usability and security attribute | |
Rundhaug | Keystroke dynamics-Can attackers learn someone’s typing characteristics | |
Sanghi et al. | Survey, applications and security of keystroke dynamics for user authentication | |
Katsriku et al. | Enhancing Textual Password Authentication Using Typing Rhythm | |
Sungkur et al. | An enhanced mechanism for the authentication of students taking online exams |