Professional Documents
Culture Documents
Multi Pattern Android Lock ICCMC.2019.8819635
Multi Pattern Android Lock ICCMC.2019.8819635
Abstract- This paper proposes the implementation of progressive and PINs remaining prominent and dependable authentication
authentication service in smart android mobile phone. In this methods well into the future[8]. The security approaches has the
digital era, massive amount of work can be done in the digital form major problem for bypassing & cracking the modules through
using the smart devices like smart phone , laptop, Tablets , etc. The different attack types as the hacker can relate to the user’s
number of smartphone users approx. reach to 299.24 million, as
password via predicting or by generally trying the password
per the recent survey report [1] in 2019 this count will reach 2.7
billion and after 3 years, this count will increase up to 442.5 combination (dictionary attack) etc. Thes e difficulties are
million. This article includes a cluster based progressive smart lock general to most of the modules of security. So many
with a dependent combination that is short and more secure in authentication scheme are introduce in this digital era like
nature. Android provides smart lock facilities with the combination graphics authentication password [9], [10], that is show the
of 9 dot, 6dot, 5dot, 4dot and 1-9 number. By using this mobile some weaknesses associated with other kinds of password.
phone user will be able to generate pattern lock or number Based on some studies such as those in [11], [12], phone user
password for authentication. This is a single authentication system, have a better ability to memorize images with longterm memory
this research paper includes a more secured multiple cluster based than verbal representations. As per the studies [13][14]
pattern match system.
maximum user are used Image based authentication. Figure 1
Keywords- ALP, Cluster, Pattern, Authentication, S mart phone show statics of Smartphone user between 2015 to 2022 (in
lock millions)*.
I. INT RODUCT ION
619
female user. Length of dot and number of combination is
showing in Fig 2 Dot length and Combinations.
In the given figure 1.5 is show Løge statically report chart that
indicate to us how many number of dot used by the user for
various purpose , here in this chart Løge include the some
domain these are shopping smart phone bank , and chart show Fig.4 Dot pattern used by user in percent[2]
how many dot pattern used for the banking along with its
complexity means for banking related work person are used
longer pattern , how many dot are us ed for the shopping and its Løge[2] had proposed the so many suggestions for generating
complexity , dot pattern use for simply phone locking point of the pattern lock using the dot in the secure manner. These
view with its complexity. In this chart present Løge display the suggestion are as
comparison between among them with Gender ratio .What can
we learn from this research [16]? The conclusion part of this For Pattern lock used grater than one Dot and Make it
research article is if a person used the smart phone and seeking as Complex.
for the best security for its APL so a person really secure a data Use Crossover sequence for Pattern lock Generation .
,the best strategy is to act like nobody does. Android settings "make pattern visible" option turn
off.
Recently some of the Advance Lock system is introduce in the
market but the devices is very expensive as comparing to other
device, these devices equipped with higher level APL
reorganization of face ,biometric etc [4]. It is a hope that this
technology be able to make it impossible for other user
individuals to use the Smartphone without the owner's
permission. Some easy and good patterns lock[5] example are
shown in Figure 5 and Figure 6.
620
in the top left-most node of the screen. A full 77% of them
started in one dot of the 4 corners point . For pattern generating
when user will use five dot, so total possible ALP approx 9000
and in case of 4 dot this count is 1,624 .
[2]
Fig.9 Pattern Lock
Fig.8 and 9 is show the some pattern lock example used by
various user in this world, up 38% of user are using the same
Pattern for authentication purpose .
621
T ABLE I The cluster approaches is proposed in this paper , that include
Dot -Pattern Matching Combination
two or more individual cluster along with the same series of dot
count that provide the higher security in APL, using this
S .NO Number dot used Pattern Generation Total Combination approach the total combination of dot pattern will double .
With the help of these cluster , user can generate same pattern
1 4 1624
or dependent patter and different pattern for authentication
2 5 7152 purpose . This introduce method is able to increases the total
number of combination of pattern and reduces the similar
3 6 26016 pattern of APL.
The well-known formula is used to calculate , number of ways
4 7 72912 with which to choose r items out of a possible pool of n items –
without replacement and in all possible sequences–is:
5 8 140704 [1]
6 9 140704 Rule 1- for pattern APL minimum 4 dot required .
Rule 2- Repetition is not allowed that means one dot use only
Total Possibilities 389112 one time for pattern generation .
Rule 3- Don’t skip the intermediate dot .
VI. Result .
This is the survey report done , Total sample data set 3000 ,
student data set among the various engineering college with
different courses. The statics is display in tabular format . The
Fig .10 Dot – Pattern Matching Combination [2] objective of the survey is make a summary report for the
existing APL’s generating using the available Dot to find the
common APL’s pattern .
V. PROPOSED MYTHOLOGY
Key idea of this paper for resolving describe problem , to create
and display two or more than two separate cluster, these cluster
are contain the 4 ,5,6,7,and 8 dot for pattern generation. if we
increases number of cluster area and number of dot in
individual cluster then authentication will also increases . This
idea increases the higher authentication for every individual
smart phone user and decrees the repetition of same pattern
matching. Suppose one user can able to create the one pattern
using 4 dot , 5 dot , 6 dot 7 dot , 8 dot or 9dot this pattern is
unique for the particular smart phone user , after this when user
want to unlock his/her phone screen then again he/she draw the
same pattern into phone screen if match then he/ she access the
mobile application and authentication is successfully check.
This approach is conventional approach up to 88% above smart
phone user are using this approach. Problem formulation part in
this paper I discuss the some calculation regarding this dot
pattern matching technique . Table I show the statistics of total
maximum combination of all dots. So their is maximum
Fig.12 Similar APL Count
possibilities to smart lock screen pattern will same in massive
mobile phones.
622
T ABLE III V I. CONCLUSIONS AND FUTURE PROPOSED WORK
Similar APL’S Statics
The key idea of this paper is to provide an alternative solution
Dot User Count S imilar APL for the existing Android pattern lock, which is able to provide a
4 482 21 massive amount of new dependent and independent pattern lock
5 734 16 combination and optimize the similarities between the pattern
lock models. Using this concept Android pattern lock
6 723 18 combination count will increase without increasing the number
7 492 17 of dots. Introduction of ALP section in this paper shows the
8 345 12 total possible combination for Authentication in the Android
pattern lock that is 389,112 but as per proposed cluster scheme
9 224 9 this count will increases up to 7,78,224 which is just a double if
we have used the Two cluster for APL, else if we use the Three
T able III cluster with Max 9 dot then this combination count become
Cluster APLCombination Statics Vs Existing APLCombination Statics 11,67,336 this is very helpful for Smartphone user to make more
secure smart phone authentication with easy pattern lock
Existing Work Proposed Work, Result combination. Proposed future work for APL authentication is
used two or more cluster for image, fingerprint, number cluster
S .NO Number dot Total Number of Cluster or some multilevel authentication models.