Graphical Authentication System

Read Complete Research Material

GRAPHICAL AUTHENTICATION SYSTEM

Graphical Authentication System

Graphical Authentication System

In the 21st century AD there are many methods of biometric authentication. All of them are divided qualitatively into two groups, namely:

Static methods:

Unique physiological, or other static characteristics of each human body, which he receives from God and nature and unique to him - form the basis of the static methods of biometric authentication. Static characteristics of a person does not change throughout his life, and are integral to it.

Dynamic methods:

Dynamic methods of biometric authentication based on the behavioral (dynamic) characteristics of a person, that is built on the features characteristic of the unconscious movements in the process of playing an action.

Certain graphical part is incorporated whith the authentication processes by the graphical authentication system. This enables the user to select pictures, draw a shpe or choose colors as a substitute for entring alphanumeric passwords. One of the great scourges of ubiquitous authentication system based on user name and password is the difficulty for users to remember passwords. This makes often use simple passwords, which are easy to guess with social engineering techniques to break dictionary attacks-and even repeat the same password for different applications. To overcome these weaknesses, the traditional alphanumeric passwords can be replaced by new graphical authentication systems, which may be of different types depending on the action to be performed by the user, identify one or more images from among a larger set, touching certain specific points in an image or relocate any of the objects in it and perform a particular stroke an array.

Taken together preceding cases, the authentication graph is based on our ability to recognize, which is much higher than recall, so it is always easier for us to recognize something we have seen before (e.g. an image), to remember something without having any clue. Besides being easier to remember for the user, graphical passwords are also more robust, as it is much more difficult to apply brute force attacks on text images. Also, graphical passwords possible that there are no subsets of passwords that is more common than others. Furthermore, for a same length, passwords alphanumeric password have limited space, ie always be combinations thereof ASCII characters. Instead, the inventory of possible passwords is virtually infinite graphs. The new mobile devices with full color touch screens and bigger and bigger, offer an ideal platform for the use of graphical passwords, which is feasible to increase security while facilitating the user experience. Trust in Semantic Web Portal can be configured and test a graphical authentication system. The graph also password is used in the application gOTP.

Graphical password consists of two complementary components. It includes an image from your collection of images and a set of gestures drawn over the image. Instead of choosing from the final set of images you do give Microsoft a picture, which increases both security of the password. You decide what it will be a picture, and what parts of it are important to you. In addition, you can see an image, it is ...
Related Ads