My password is here! An investigation into visuo-spatial authentication mechanisms

نویسندگان

  • Karen Renaud
  • Antonella De Angeli
چکیده

Passwords are the almost universal authentication mechanism, even though they are basically flawed and cause problems for users due to poor memorability. Graphical methods of authentication have recently excited some interest but little is known about their actual efficacy. There are basically two types of graphical authentication mechanisms: recognition-based and location-based—also called visuo-spatial mechanisms. Whereas some kinds of recognition-based graphical authentication mechanisms have been evaluated by various researchers, there is still a need to investigate locationbased graphical authentication mechanisms in a more rigorous fashion to determine whether they could be a viable alternative to traditional passwords for web usage. This paper discusses graphical authentication mechanisms in general and reports on the evaluation of one particular visuo-spatial mechanism, aimed at augmenting the password paradigm by providing a way to record passwords securely. Results and findings are presented, and conclusions drawn, some of which can also be applied to other types of visuo-spatial mechanisms. We also propose a set of metrics which can be used to measure the quality of web authentication mechanisms and apply these to a range of existing authentication mechanisms. q 2004 Published by Elsevier B.V.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

You only live twice or "the years we wasted caring about shoulder-surfing"

Passwords are a good idea, in theory. They have the potential to act as a fairly strong gateway. In practice though, passwords are plagued with problems. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when forgotten. While alternatives to passwords have been proposed, none, as yet, have been adopted widely. There seems to be a reluctance to switch from tried and ...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Evolution of Authentication Mechanisms

This paper presents an evolution of authentication mechanisms from textual passwords to graphical authentication mechanisms. For security concerns password must be protected from the unauthorized users. Authentication and authorization is necessary for essential data, this requires authentication mechanisms. An important goal for authentication is user has easy to memorize their passwords and r...

متن کامل

An Enhanced One-Time Password Implementation

We propose here a number of enhancements to the RFC 2289 One Time Password System (or S/KeyTM). The enhancements take into account the vulnerabilities of RFC 2289 as well as the practical usage issues in deploying this standard for modern day 2-factor authentication. More significantly, with the introduction of a user-originated “bias”, the enhancements allow for various user-end implementation...

متن کامل

Sensor Based Authentication Using Accelerometer Sensor

In Some Application or Web services Password offer their users lots of possibilities and a feeling of freedom. Eventually, this cause some new security threats like Sensitive data might be stolen and abused, person who is not authorized can gets access to such password. In that case, user authentication mechanisms is coming into the picture. So far authentication mechanisms like PINs and passwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Interacting with Computers

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2004