Van Nguyen et al., 2017 - Google Patents

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices

Van Nguyen et al., 2017

View PDF
Document ID
3593414060235977871
Author
Van Nguyen T
Sae-Bae N
Memon N
Publication year
Publication venue
computers & security

External Links

Snippet

This paper presents D raw-A-PIN, a user authentication system on a device with a touch interface that supports the use of PINs. In the proposed system, the user is asked to draw her PIN on the touch screen instead of typing it on a keypad. Consequently, D raw-A-PIN could …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Van Nguyen et al. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
Wang et al. Attacks and defenses in user authentication systems: A survey
Dasgupta et al. Advances in user authentication
De Luca et al. Touch me once and i know it's you! implicit authentication based on touch screen patterns
Jain et al. Biometrics: a tool for information security
Dahia et al. Continuous authentication using biometrics: An advanced review
Nguyen et al. Tap-based user authentication for smartwatches
Tolosana et al. BioTouchPass: Handwritten passwords for touchscreen biometrics
Buriro et al. Dialerauth: A motion-assisted touch-based smartphone user authentication scheme
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Sun et al. A 3‐D hand gesture signature based biometric authentication system for smartphones
Putri et al. A continuous fusion authentication for Android based on keystroke dynamics and touch gesture
Sadikan et al. A survey paper on keystroke dynamics authentication for current applications
Lone et al. A novel OTP based tripartite authentication scheme
Li et al. Comparison of PIN-and pattern-based behavioral biometric authentication on mobile devices
Mondal et al. A continuous combination of security & forensics for mobile devices
Siahaan et al. Spoofing keystroke dynamics authentication through synthetic typing pattern extracted from screen-recorded video
Rathgeb et al. Biometric technologies for elearning: State-of-the-art, issues and challenges
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Neha et al. Continuous user authentication system: a risk analysis based approach
Gupta et al. RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis
Teh Using users' touch dynamics biometrics to enhance authentication on mobile devices
Elftmann Secure alternatives to password-based authentication mechanisms
Sabater Biometrics as password alternative
Mohamed et al. Challenge-response behavioral mobile authentication: A comparative study of graphical patterns and cognitive games