AU2021106052A4 - An enhanced recognition based image authentication method to save system time and memory - Google Patents

An enhanced recognition based image authentication method to save system time and memory Download PDF

Info

Publication number
AU2021106052A4
AU2021106052A4 AU2021106052A AU2021106052A AU2021106052A4 AU 2021106052 A4 AU2021106052 A4 AU 2021106052A4 AU 2021106052 A AU2021106052 A AU 2021106052A AU 2021106052 A AU2021106052 A AU 2021106052A AU 2021106052 A4 AU2021106052 A4 AU 2021106052A4
Authority
AU
Australia
Prior art keywords
image
recognition based
memory
based image
image authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021106052A
Inventor
Abrar Alvi
Gajendra Bamnote
Sohel Bhura
Anand Chaudhari
Sunil Gupta
Sumedh Ingale
Roshan Karwa
Zeeshan Khan
Ankit Mune
Mahendra Pund
Vijaya Shandilya
Jayant Shelke
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bhura Sohel Dr
Original Assignee
Bhura Sohel Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bhura Sohel Dr filed Critical Bhura Sohel Dr
Priority to AU2021106052A priority Critical patent/AU2021106052A4/en
Application granted granted Critical
Publication of AU2021106052A4 publication Critical patent/AU2021106052A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

AN ENHANCED RECOGNITION BASED IMAGE AUTHENTICATION METHOD TO SAVE SYSTEM TIME AND MEMORY The present invention relates to an enhanced recognition based image authentication method to save system time and memory. The proposed method focuses on recognition based image authentication method and also provides its two different ways of authentication. Sequential recognition based and non-sequential recognition-based image authentication methods which will provide a facility to the user to verify its password sequentially or non-sequentially. At the user side, this authentication scheme is flexible and easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time. It has been observed that this method is saving the time and memory making the system advantageous.

Description

AN ENHANCED RECOGNITION BASED IMAGE AUTHENTICATION METHOD TO SAVE SYSTEM TIME AND MEMORY
Technical field of invention:
The present invention relates to the field of computer science and more particularly relates to an enhanced recognition based image authentication method to save system time and memory.
Background of the present invention
The background information herein below relates to the present disclosure but is not necessarily prior art.
As people are utilizing computing devices for an increasing variety of tasks, there is a corresponding need to improve the security available for these tasks. While many conventional approaches rely on password entry for user authentication, these passwords can be stolen or discovered by other persons who can impersonate the user for any of a variety of tasks. Further, the entry of these passwords on portable devices is not user friendly in many cases, as the small touchscreen or keyboard elements can be difficult to accurately select using a relatively large human finger, and can require the user to turn away from friends or co-workers when entering a password, which can be awkward or embarrassing in many situations.
In order to avoid typing in long passwords in such situations, users often have their passwords stored on their devices or enable information to be stored elsewhere such that an activity can be performed without manually re-entering the password. When using such an approach, however, another person having access to that device can impersonate the user for any task associated with the store password. As a compromise some users utilize short and simple passwords, but these passwords can be easily hacked by an unscrupulous user or application.
Certain approaches attempt to improve security by adding biometric identification. For example, a computing device might capture an image of a user and analyse that image to attempt to recognize the user using facial recognition software. Such a process provides only a certain level of additional protection, however, as the facial recognition process can often be spoofed by holding a picture of the user in front of the camera, as the resulting two dimensional image can look substantially the same whether taken of the user or a picture of the user.
Therefore to overcome the limitations of the existing authentication methods and techniques there is need to introduce an improved and less time consuming technique. Hence the present invention provides an enhanced recognition based image authentication method to save system time and memory.
Objective of the invention:
The primary object of the present invention is to provide an enhanced recognition based image authentication method to save system time and memory.
Another object of the present invention is to develop the authentication method using images as the front end data which makes it easy to remember for the user.
Summary of the invention
Accordingly present invention provides an enhanced recognition based image authentication method to save system time and memory. The proposed method proposed an authentication method that contains images, alphabets, numbers and symbols. For saving the large amount of memory and processing time, the proposed method converts all the selected images in the string containing alphabets, numbers and symbols. This method focuses on recognition based image authentication method and also provides its two different ways of authentication. Sequential recognition based and non-sequential recognition-based image authentication schemes provide a facility to the user to verify its password sequentially or non sequentially. At the user side, this authentication method is flexible and easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time.
Detailed description of invention
The present invention relates to an enhanced recognition based image authentication method to save system time and memory. The proposed method proposed an authentication method that contains images, alphabets, numbers and symbols.
The preferred embodiment of the present invention develops an authentication method using images as the front end data which makes it easy to remember for the user. But to store that selected images by the user in the backend (database), it takes a large amount of memory as well as processing time for password verification. Thus for saving the large amount of memory and processing time, the proposed method converts all the selected images in the string containing alphabets, numbers and symbols.
Further in the embodiment, the proposed method focuses on recognition based image authentication method and also provides its two different ways of authentication. Sequential recognition based and non-sequential recognition-based image authentication methods provide a facility to the user to verify its password sequentially or non-sequentially.
At the user side, this authentication method is flexible and easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time.
In the preferred embodiment, the enhanced authentication scheme has two steps, i.e. registration phase/login phase and password selection phase.
At very first step - Registration Phase / Login Phase, initially, a user has to register its identity for the first time on this authentication platform. For Registration, User should enter name (First and Last), User Id (not used before by any other user) and valid Email ID.
For Login, User should be already registered by the above given process and has to enter User Id only.
Second step is password selection phase which is the heart of newly implemented recognition based image authentication scheme. It contains three image panels.
The first panel contains 26 images for the user's selection. The idea behind 26 images is that in the English language there are 26 alphabets (A to Z) so in the database, that selected images will be converted into its corresponding alphabets.
Image Alphabet Image Alphabet Image I A Image 8 H Image 2 B Image 9 I Image 3 C Image 10 J Image 4 D Image 11 K Image 5 E Image 12 L Image 6 F Image 13 M Image 7 G Image 14 N Image Alphabet Imge Alphabet Image 15 0 Image 22 V Image 16 P Image 23 W Inage 17 Q Image24 X Image 18 R Image 25 Y Image 19 S Image 26 Z Image 20 T Image 21 U
Second panel contains another 10 images for the user's selection. The idea behind images is that, in Decimal Number System, there are 10 numbers (0 to 9) so in the database that selected images will be converted into its corresponding numbers.
Image Number Image Number Image 1 0 Image 6 5 Image 2 1 Image 7 6 Image 3 2 Image 8 7 Image 4 3 Image 9 8 Image 5 4 Image 10 9
Further third panel contains another 15 images for the user's selection. The idea behind 15 images is that, 15 symbols are taken into consideration to set a password which contains symbols so in the database that selected images will be converted into its corresponding symbols.
Image Symbol Image Symbol Image 1 Image 9 Image 2 1 Imagel1 (
Image 3 @ Image 11 )
Image 4 # Image 12 Image 5 $ Image13 +
Image 6 % Image 14 [ Image 7 A Image15 ] Image 8 &
After the invention is developed, the system time and memory is also calculated and analysed. It has been observed that this scheme is saving the time and memory making the system advantageous.
Thus the enhanced recognition based image authentication method has been implemented. This method has been proposed to prevent the difficulties of using images as a primary data in authentication scheme. With the help of this method, the system time and memory are saved at a larger level and it is also easy to remember authentication scheme for the user.
The many features and advantages of the invention are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the invention which fall within the true spirit and scope of the invention. Further, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.

Claims (3)

THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS
1. An enhanced recognition based image authentication method to save system time and memory that contains images, alphabets, numbers and symbols wherein the said method converts all the selected images in the string containing alphabets, numbers and symbols.
2. An enhanced recognition based image authentication method to save system time and memory as claimed in claim wherein the recognition based image authentication implemented to provides sequential recognition based and non-sequential recognition based image authentication methods which facilitates to the user to verify its password sequentially or non-sequentially.
3. An enhanced recognition based image authentication method to save system time and memory as claimed in claim 1 wherein the enhanced authentication scheme has two steps registration phase/login phase and password selection phase which further contains three image panels.
AU2021106052A 2021-08-19 2021-08-19 An enhanced recognition based image authentication method to save system time and memory Ceased AU2021106052A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021106052A AU2021106052A4 (en) 2021-08-19 2021-08-19 An enhanced recognition based image authentication method to save system time and memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021106052A AU2021106052A4 (en) 2021-08-19 2021-08-19 An enhanced recognition based image authentication method to save system time and memory

Publications (1)

Publication Number Publication Date
AU2021106052A4 true AU2021106052A4 (en) 2021-12-23

Family

ID=78958081

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021106052A Ceased AU2021106052A4 (en) 2021-08-19 2021-08-19 An enhanced recognition based image authentication method to save system time and memory

Country Status (1)

Country Link
AU (1) AU2021106052A4 (en)

Similar Documents

Publication Publication Date Title
US10169558B2 (en) Enhancing biometric security of a system
US7484173B2 (en) Alternative key pad layout for enhanced security
US8392975B1 (en) Method and system for image-based user authentication
TWI260557B (en) Computer readable medium recording handwritten signature authentication program, and handwritten signature authentication method and apparatus
Mayron Biometric authentication on mobile devices
US20070236330A1 (en) System and method for performing user authentication based on user behavior patterns
US20130326604A1 (en) Rhythm-based authentication
JP2003271966A (en) Device, method and program for authentication of hand- written input
EP2685401A1 (en) Methods and systems for improving the security of secret authentication data during authentication transactions
WO2017170384A1 (en) Biodata processing device, biodata processing system, biodata processing method, biodata processing program, and recording medium for storing biodata processing program
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
EP3706021A1 (en) Authentication system, authentication device, authentication method, and program
JPH10261082A (en) Registered signature data preparing method for computer signature collating system
EP3786820B1 (en) Authentication system, authentication device, authentication method, and program
AU2021106052A4 (en) An enhanced recognition based image authentication method to save system time and memory
Kumar et al. A graphical password based authentication based system for mobile devices
Hasan et al. Multifactor pattern implicit authentication
KR101054096B1 (en) A method and a computer readable media for secure password input using touchscreen interfaces
Gao et al. Usability and security of the recall-based graphical password schemes
CN112417429A (en) Security verification method and device, electronic equipment and storage medium
CN111181981A (en) Processing method and device and computer equipment
KR100608775B1 (en) System and method for authenticating user with handwriting
Yang et al. Implementation of a Personal Authentication System T-Time
Malempati et al. Intrusion Prevention by Native Language Password Authentication Scheme

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry