Sireesha et al., 2015 - Google Patents
Key logging Prevention by QR code with Visual AuthenticationSireesha et al., 2015
View PDF- Document ID
- 13075917891231245924
- Author
- Sireesha K
- Ramesh D
- Publication year
- Publication venue
- IJSEAT
External Links
Snippet
Key logging is an activity of capturing users' keyboard the activity key logger hardware and software. The key loggers secretly monitor and log all keystrokes. Malicious programs, key loggers do not cause any threat to system can be used to intercept passwords unlike other …
- 230000000007 visual effect 0 title abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nyang et al. | Keylogging-resistant visual authentication protocols | |
US8997177B2 (en) | Graphical encryption and display of codes and text | |
Sabzevar et al. | Universal multi-factor authentication using graphical passwords | |
JP5153327B2 (en) | Online data encryption and decryption | |
JP5330567B2 (en) | Computer-implemented authentication interface system | |
US9038196B2 (en) | Method for authenticating a user requesting a transaction with a service provider | |
Karim et al. | Online banking user authentication methods: a systematic literature review | |
Xiao et al. | Differentiated virtual passwords, secret little functions, and codebooks for protecting users from password theft | |
Pagar et al. | Strengthening password security through honeyword and Honeyencryption technique | |
Singh et al. | A 3-level multifactor Authentication scheme for cloud computing | |
Hanaek et al. | E-banking security-comparative study | |
Divya et al. | An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis | |
Evseev et al. | Two-factor authentication methods threats analysis | |
Divya et al. | Visual authentication using QR code to prevent keylogging | |
US20220237601A1 (en) | WebAuthn+JSON DLT ˜the internet of value | |
Tekawade et al. | Social engineering solutions for document generation using key-logger security mechanism and QR code | |
Sireesha et al. | Key logging Prevention by QR code with Visual Authentication | |
Varshney et al. | A new secure authentication scheme for web login using BLE smart devices | |
DODDE et al. | Novel Authentication Protocols to Overcome Key Logging Attacks | |
Neenu | On screen randomized blank keyboard | |
Hakami et al. | Secure Transaction Framework based on Encrypted One-time Password and Multi-factor | |
Haque et al. | A concept of captcha based dynamic password | |
Reddy et al. | A comparative analysis of various multifactor authentication mechanisms | |
Krishna et al. | Bank Application: One-Time Password Generation | |
Liou | Performance measures for evaluating the dynamic authentication techniques |