Van Nguyen et al., 2017 - Google Patents
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devicesVan Nguyen et al., 2017
View PDF- Document ID
- 3593414060235977871
- Author
- Van Nguyen T
- Sae-Bae N
- Memon N
- Publication year
- Publication venue
- computers & security
External Links
Snippet
This paper presents D raw-A-PIN, a user authentication system on a device with a touch interface that supports the use of PINs. In the proposed system, the user is asked to draw her PIN on the touch screen instead of typing it on a keypad. Consequently, D raw-A-PIN could …
- 230000003542 behavioural 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Van Nguyen et al. | DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices | |
Wang et al. | Attacks and defenses in user authentication systems: A survey | |
Dasgupta et al. | Advances in user authentication | |
De Luca et al. | Touch me once and i know it's you! implicit authentication based on touch screen patterns | |
Jain et al. | Biometrics: a tool for information security | |
Dahia et al. | Continuous authentication using biometrics: An advanced review | |
Nguyen et al. | Tap-based user authentication for smartwatches | |
Tolosana et al. | BioTouchPass: Handwritten passwords for touchscreen biometrics | |
Buriro et al. | Dialerauth: A motion-assisted touch-based smartphone user authentication scheme | |
Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
Sun et al. | A 3‐D hand gesture signature based biometric authentication system for smartphones | |
Putri et al. | A continuous fusion authentication for Android based on keystroke dynamics and touch gesture | |
Sadikan et al. | A survey paper on keystroke dynamics authentication for current applications | |
Lone et al. | A novel OTP based tripartite authentication scheme | |
Li et al. | Comparison of PIN-and pattern-based behavioral biometric authentication on mobile devices | |
Mondal et al. | A continuous combination of security & forensics for mobile devices | |
Siahaan et al. | Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded video | |
Rathgeb et al. | Biometric technologies for elearning: State-of-the-art, issues and challenges | |
Bock | Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication | |
Neha et al. | Continuous user authentication system: a risk analysis based approach | |
Gupta et al. | RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis | |
Teh | Using users' touch dynamics biometrics to enhance authentication on mobile devices | |
Elftmann | Secure alternatives to password-based authentication mechanisms | |
Sabater | Biometrics as password alternative | |
Mohamed et al. | Challenge-response behavioral mobile authentication: A comparative study of graphical patterns and cognitive games |