Operation Code Authentication preventing shoulder surfing attacks
Security is to grant access to a legal user, and to prevent the system from illegal or non authorized person. The so called process of Authentication has five factors in modern era. Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint, eye print), Something...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Security is to grant access to a legal user, and to prevent the system from illegal or non authorized person. The so called process of Authentication has five factors in modern era. Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint, eye print), Something You know (e.g., a password/PIN code), Somebody You know and Something You Process. In this paper, we have developed such a technique which provides more security to a user in typing his password, in a public place, and in case that user is in critical position, of accessing his computer system. In this paper we have developed a technique of Authentication by the factor "Something You Process". SHOULDER ATTACKS is one of the latest weapons used by hackers or adversaries in an organization to hack an account or to authenticate in a secure zone. In a shoulder attack a person is watching the user while he is typing the password and reads his fingers that what he has typed or makes a video of him typing the password and so comes to know that what the password is. |
---|---|
DOI: | 10.1109/ICCSIT.2010.5564028 |