Axborot texnologiyalari, tarmoqlar va telekommunikatsiyalar


graphical password authentication



Download 5,02 Mb.
Pdf ko'rish
bet161/222
Sana15.11.2022
Hajmi5,02 Mb.
#866857
1   ...   157   158   159   160   161   162   163   164   ...   222
graphical password authentication 
system, the user has to select 
from images, in a specific order, presented to them in a graphical user interface 
(GUI). According to a study, the human brain has a greater capability of 
remembering what they see(pictures) rather than alphanumeric characters. 
Therefore, graphical passwords overcome the disadvantage of alphanumeric 
passwords. Graphical Password Authentication has 
three major categories 
based 
on the activity they use for authentication of the password[6]: 
Recognition based Authentication: 
A user is given a set of images and he 
has to identify the image he selected during registration. 
For example, 
Passfaces 
is a graphical password scheme based on recognizing 
human faces. During password creation, users are given a large set of images 
to select from. To log in, users have to identify the pre-selected image from 
the several images presented to him. 
Recall based Authentication: 
A user is asked to reproduce something that he 
created or selected at the registration stage. For example, in 
the 
Passpoint 
scheme, a user can click any point in an image to create the 
password and a tolerance around each pixel is calculated. During 
authentication, the user has to select the points within the tolerance in the 
correct sequence to login. 
Cued Recall: 
Cued Click Points (CCP) is an alternative to the PassPoints 
technique. In CCP, users click one point on each image rather than on five 
points on one image (unlike PassPoints). It offers cued-recall and instantly 
alerts the users if they make a mistake while entering their latest click-point. 
Advantages: 
It is user-friendly. 
It provides higher security than other traditional password schemes. 
Dictionary attacks are infeasible. 
CCP makes attacks based on hotspot analysis more challenging. 
Disadvantages: 
Registration and login take too long. 
It requires more storage space because of images. 
Shoulder surfing(Watching over people’s shoulders as they process 
information). 
3.
Microsoft Vista: Securing User Access In Microsoft Vista for IT Security 
Professionals, 2007 Biometrics Authentication Biometrics authentication devices 


International scientific conference "INFORMATION TECHNOLOGIES, NETWORKS AND 
TELECOMMUNICATIONS" ITN&T-2022 Urgench, 2022y April 29-30 
573 
rely on physical characteristics such as a fingerprint, facial patterns, or iris or 
retinal patterns to verify user identity. Biometrics authentication is becoming 
popular for many purposes, including network logon. A biometrics template or 
identifier (a sample known to be from the authorized user) must be stored in a 
database for the device to compare to a new sample given during the logon 
process. Biometrics are often used in conjunction with smart cards in high-security 
environments. The most popular 

Download 5,02 Mb.

Do'stlaringiz bilan baham:
1   ...   157   158   159   160   161   162   163   164   ...   222




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish