Professional Documents
Culture Documents
Owen
Discusssion
Security Usability
Conclusion
Discusssion
Security Usability
Conclusion
Users tend to write passwords down or use the same passwords for different accounts
If the number of possible pictures is sufficiently large, the possible password space may exceed that of text-based schemes, thus offer better resistance to dictionary attacks. can be used to: workstation web log-in application ATM machines mobile devices
Conduct a comprehensive survey of the existing graphical password techniques Discuss the strengths and limitations of each method Point out future research directions
Discusssion
Security Usability
Conclusion
Discusssion
Security Usability
Conclusion
Discusssion
Security Usability
Conclusion
Other Schemes
Discusssion
Security Usability
Conclusion
User draws a simple picture on a 2D grid, the coordinates of the grids occupied by the picture are stored in the order of drawing redrawing has to touch the same grids in the same sequence in authentication user studies showed the drawing sequences is hard to Remember
PassPoint Scheme
User click on any place on an image to create a password. A tolerance around each chosen pixel is calculated. In order to be authenticated, user must click within the tolerances in correct sequence. can be hard to remember the sequences
Password Space: N^K ( N -the number of pixels or smallest units of a picture, K - the number of Point to be clicked on )
Other Schemes
Discusssion
Security Usability
Conclusion
Discusssion
Security Usability
Conclusion
Pictures are easier to remember than text strings Password registration and log-in process take too long Require much more storage space than text based passwords
Discusssion
Security Usability
Conclusion
It is more difficult to break graphical passwords using the traditional attack methods such as:burte force search, dictionary attack or spyware. Not yet widely used, current graphical password techniques are still immature
Questions?