Universal Multi-Factor Authentication Using Graphical Passwords

被引:26
|
作者
Sabzevar, Alireza Pirayesh [1 ]
Stavrou, Angelos [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
关键词
D O I
10.1109/SITIS.2008.92
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user's personal handheld device as the password decoder and the second factor of authentication. In our methods, a service provider challenges the user with an image password. To determine the appropriate click points and their order, the user needs some hint information transmitted only to her handheld device. We show that our method can overcome threats such as key-loggers, weak password, and shoulder surfing. With the increasing popularity, of handheld devices such as cell phones, our approach can be leveraged by many organizations without forcing the user to memorize different passwords or carrying around different tokens.
引用
收藏
页码:625 / 632
页数:8
相关论文
共 50 条
  • [41] Enhanced secure data backup scheme using multi-factor authentication
    Hu, Huidan
    Lin, Changlu
    Chang, Chin-Chen
    Chen, Lanxiang
    [J]. IET INFORMATION SECURITY, 2019, 13 (06) : 649 - 658
  • [42] Mouse Behaviour Based Multi-Factor Authentication using Neural Networks
    Hema, D.
    Bhanumathi, S.
    [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [43] Multi-factor combination authentication using fuzzy graph domination model
    Shao, Zehui
    Li, Zepeng
    Wu, Pu
    Chen, Lanxiang
    Zhang, Xiaosong
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (04) : 4979 - 4985
  • [44] Two Factor Authentication using EEG Augmented Passwords
    Svogor, Ivan
    Kisasondi, Tonimir
    [J]. PROCEEDINGS OF THE ITI 2012 34TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES (ITI), 2012, : 373 - 378
  • [45] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [46] TwoStep: An Authentication Method Combining Text and Graphical Passwords
    van Oorschot, P. C.
    Wan, Tao
    [J]. E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 233 - 239
  • [47] A Multi-Factor Authentication Framework for Secure Access to Blockchain
    Sahan, Sercan
    Ekici, Adil Furkan
    Bahtiyar, Serif
    [J]. PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA 2019), 2019, : 160 - 164
  • [48] A survey on multi-factor authentication for online banking in the wild
    Sinigaglia, Federico
    Carbone, Roberto
    Costa, Gabriele
    Zannone, Nicola
    [J]. COMPUTERS & SECURITY, 2020, 95 (95)
  • [49] CCTV-Based Multi-Factor Authentication System
    Kwon, Byoung-Wook
    Sharma, Pradip Kumar
    Park, Jong-Hyuk
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (04): : 904 - 919
  • [50] A PATTERN-BASED MULTI-FACTOR AUTHENTICATION SYSTEM
    Pankhuri
    Sinha, Akash
    Shrivastava, Gulshan
    Kumar, Prabhat
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 101 - 112