Authenticating Mobile Device Users Through Image Selection

نویسنده

  • Wayne Jansen
چکیده

Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorized individual. However, motivating users to enable simple PIN or password mechanisms and periodically update their authentication information is difficult at best. This paper describes a general-purpose mechanism for authenticating users through image selection. The underlying rationale is that image recall is an easy and natural way for users to authenticate, removing a serious barrier to users’ compliance with corporate policy. The approach described distinguishes itself from other attempts in this area in several ways, including style dependent image selection, password reuse, and embedded salting, which collectively overcome a number of problems in employing knowledge-based authentication on mobile devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticating Mobile Device Users through Image Selection

Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only fr...

متن کامل

Implicit Authentication through Learning User Behavior

Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication authenticating users based on behavior patterns. We describe our model for perfor...

متن کامل

A Survey: Login with Image Based Password Authentication

An important usability goal for knowledge based authentication systems is to support users in selecting passwords of higher security. We use persuasion to influence user choice in click based graphical passwords, encouraging users to select more random and hence more difficult to guess, click points. Passwords theft can happen on daily basis, so we need to protect them. A distributed system pro...

متن کامل

The Impact of Cooperative Learning and Mobile Learning through Bluetooth Device on Vocabulary Learning of Iranian EFL Learners

Cooperative learning has been found to affect different aspects of language learning by many researchers (e.g., Kagan, 1995; Kagan, 1999; Kessler, 1992; McGroarty, 1993). Likewise, mobile assisted language learning (MALL) has revealed significant impacts on the improvement of different language skills and components (e.g., Comas-Quinn et al. 2009; Divitini & Chabert, 2009; Motallebzadeh & Ganja...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004