[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sireesha et al., 2015 - Google Patents

Key logging Prevention by QR code with Visual Authentication

Sireesha et al., 2015

View PDF
Document ID
13075917891231245924
Author
Sireesha K
Ramesh D
Publication year
Publication venue
IJSEAT

External Links

Snippet

Key logging is an activity of capturing users' keyboard the activity key logger hardware and software. The key loggers secretly monitor and log all keystrokes. Malicious programs, key loggers do not cause any threat to system can be used to intercept passwords unlike other …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Similar Documents

Publication Publication Date Title
Nyang et al. Keylogging-resistant visual authentication protocols
US8997177B2 (en) Graphical encryption and display of codes and text
Sabzevar et al. Universal multi-factor authentication using graphical passwords
JP5153327B2 (en) Online data encryption and decryption
JP5330567B2 (en) Computer-implemented authentication interface system
US9038196B2 (en) Method for authenticating a user requesting a transaction with a service provider
Karim et al. Online banking user authentication methods: a systematic literature review
Xiao et al. Differentiated virtual passwords, secret little functions, and codebooks for protecting users from password theft
Pagar et al. Strengthening password security through honeyword and Honeyencryption technique
Singh et al. A 3-level multifactor Authentication scheme for cloud computing
Hanaek et al. E-banking security-comparative study
Divya et al. An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis
Evseev et al. Two-factor authentication methods threats analysis
Divya et al. Visual authentication using QR code to prevent keylogging
US20220237601A1 (en) WebAuthn+JSON DLT ˜the internet of value
Tekawade et al. Social engineering solutions for document generation using key-logger security mechanism and QR code
Sireesha et al. Key logging Prevention by QR code with Visual Authentication
Varshney et al. A new secure authentication scheme for web login using BLE smart devices
DODDE et al. Novel Authentication Protocols to Overcome Key Logging Attacks
Neenu On screen randomized blank keyboard
Hakami et al. Secure Transaction Framework based on Encrypted One-time Password and Multi-factor
Haque et al. A concept of captcha based dynamic password
Reddy et al. A comparative analysis of various multifactor authentication mechanisms
Krishna et al. Bank Application: One-Time Password Generation
Liou Performance measures for evaluating the dynamic authentication techniques