[go: up one dir, main page]

Elftmann, 2006 - Google Patents

Secure alternatives to password-based authentication mechanisms

Elftmann, 2006

Document ID
3643945253101542593
Author
Elftmann P
Publication year
Publication venue
Lab. for Dependable Distributed Systems, RWTH Aachen Univ

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification

Similar Documents

Publication Publication Date Title
Dasgupta et al. Advances in user authentication
Van Nguyen et al. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
Furnell et al. Authentication and supervision: A survey of user attitudes
US20090276839A1 (en) Identity collection, verification and security access control system
US20130263240A1 (en) Method for authentication and verification of user identity
Marasco et al. Biometric multi‐factor authentication: On the usability of the FingerPIN scheme
Wahab et al. Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism.
Serwadda et al. Using global knowledge of users' typing traits to attack keystroke biometrics templates
Abiew et al. Design and implementation of cost effective multi-factor authentication framework for ATM systems
Nabi et al. Cybersecurity mechanism and user authentication security methods
Elftmann Secure alternatives to password-based authentication mechanisms
Haque et al. Authentication through keystrokes: What you type and how you type
Schiavone et al. Usability assessment in a multi-biometric continuous authentication system
Avasthi et al. Biometric authentication techniques: a study on keystroke dynamics
Pierce et al. A conceptual model for graphical authentication
van Oorschot User authentication—passwords, biometrics and alternatives
Schwab et al. Picture PassDoodle: usability study
Mansour et al. A new approach for textual password hardening using keystroke latency times.
Dunphy Usable, secure and deployable graphical passwords
Al Abdulwahid Federated authentication using the cloud (Cloud Aura)
Tangawar et al. Survey paper on graphical password authentication system in terms of usability and security attribute
Rundhaug Keystroke dynamics-Can attackers learn someone’s typing characteristics
Sanghi et al. Survey, applications and security of keystroke dynamics for user authentication
Katsriku et al. Enhancing Textual Password Authentication Using Typing Rhythm
Sungkur et al. An enhanced mechanism for the authentication of students taking online exams