AU2021106052A4 - An enhanced recognition based image authentication method to save system time and memory - Google Patents
An enhanced recognition based image authentication method to save system time and memory Download PDFInfo
- Publication number
- AU2021106052A4 AU2021106052A4 AU2021106052A AU2021106052A AU2021106052A4 AU 2021106052 A4 AU2021106052 A4 AU 2021106052A4 AU 2021106052 A AU2021106052 A AU 2021106052A AU 2021106052 A AU2021106052 A AU 2021106052A AU 2021106052 A4 AU2021106052 A4 AU 2021106052A4
- Authority
- AU
- Australia
- Prior art keywords
- image
- recognition based
- memory
- based image
- image authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000013459 approach Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
AN ENHANCED RECOGNITION BASED IMAGE AUTHENTICATION METHOD TO
SAVE SYSTEM TIME AND MEMORY
The present invention relates to an enhanced recognition based image authentication method to
save system time and memory. The proposed method focuses on recognition based image
authentication method and also provides its two different ways of authentication. Sequential
recognition based and non-sequential recognition-based image authentication methods which
will provide a facility to the user to verify its password sequentially or non-sequentially. At the
user side, this authentication scheme is flexible and easy to remember. And at the system side, it
provides low memory consumption and verifies the password in less amount of time. It has been
observed that this method is saving the time and memory making the system advantageous.
Description
Technical field of invention:
The present invention relates to the field of computer science and more particularly relates to an enhanced recognition based image authentication method to save system time and memory.
Background of the present invention
The background information herein below relates to the present disclosure but is not necessarily prior art.
As people are utilizing computing devices for an increasing variety of tasks, there is a corresponding need to improve the security available for these tasks. While many conventional approaches rely on password entry for user authentication, these passwords can be stolen or discovered by other persons who can impersonate the user for any of a variety of tasks. Further, the entry of these passwords on portable devices is not user friendly in many cases, as the small touchscreen or keyboard elements can be difficult to accurately select using a relatively large human finger, and can require the user to turn away from friends or co-workers when entering a password, which can be awkward or embarrassing in many situations.
In order to avoid typing in long passwords in such situations, users often have their passwords stored on their devices or enable information to be stored elsewhere such that an activity can be performed without manually re-entering the password. When using such an approach, however, another person having access to that device can impersonate the user for any task associated with the store password. As a compromise some users utilize short and simple passwords, but these passwords can be easily hacked by an unscrupulous user or application.
Certain approaches attempt to improve security by adding biometric identification. For example, a computing device might capture an image of a user and analyse that image to attempt to recognize the user using facial recognition software. Such a process provides only a certain level of additional protection, however, as the facial recognition process can often be spoofed by holding a picture of the user in front of the camera, as the resulting two dimensional image can look substantially the same whether taken of the user or a picture of the user.
Therefore to overcome the limitations of the existing authentication methods and techniques there is need to introduce an improved and less time consuming technique. Hence the present invention provides an enhanced recognition based image authentication method to save system time and memory.
Objective of the invention:
The primary object of the present invention is to provide an enhanced recognition based image authentication method to save system time and memory.
Another object of the present invention is to develop the authentication method using images as the front end data which makes it easy to remember for the user.
Summary of the invention
Accordingly present invention provides an enhanced recognition based image authentication method to save system time and memory. The proposed method proposed an authentication method that contains images, alphabets, numbers and symbols. For saving the large amount of memory and processing time, the proposed method converts all the selected images in the string containing alphabets, numbers and symbols. This method focuses on recognition based image authentication method and also provides its two different ways of authentication. Sequential recognition based and non-sequential recognition-based image authentication schemes provide a facility to the user to verify its password sequentially or non sequentially. At the user side, this authentication method is flexible and easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time.
Detailed description of invention
The present invention relates to an enhanced recognition based image authentication method to save system time and memory. The proposed method proposed an authentication method that contains images, alphabets, numbers and symbols.
The preferred embodiment of the present invention develops an authentication method using images as the front end data which makes it easy to remember for the user. But to store that selected images by the user in the backend (database), it takes a large amount of memory as well as processing time for password verification. Thus for saving the large amount of memory and processing time, the proposed method converts all the selected images in the string containing alphabets, numbers and symbols.
Further in the embodiment, the proposed method focuses on recognition based image authentication method and also provides its two different ways of authentication. Sequential recognition based and non-sequential recognition-based image authentication methods provide a facility to the user to verify its password sequentially or non-sequentially.
At the user side, this authentication method is flexible and easy to remember. And at the system side, it provides low memory consumption and verifies the password in less amount of time.
In the preferred embodiment, the enhanced authentication scheme has two steps, i.e. registration phase/login phase and password selection phase.
At very first step - Registration Phase / Login Phase, initially, a user has to register its identity for the first time on this authentication platform. For Registration, User should enter name (First and Last), User Id (not used before by any other user) and valid Email ID.
For Login, User should be already registered by the above given process and has to enter User Id only.
Second step is password selection phase which is the heart of newly implemented recognition based image authentication scheme. It contains three image panels.
The first panel contains 26 images for the user's selection. The idea behind 26 images is that in the English language there are 26 alphabets (A to Z) so in the database, that selected images will be converted into its corresponding alphabets.
Image Alphabet Image Alphabet Image I A Image 8 H Image 2 B Image 9 I Image 3 C Image 10 J Image 4 D Image 11 K Image 5 E Image 12 L Image 6 F Image 13 M Image 7 G Image 14 N Image Alphabet Imge Alphabet Image 15 0 Image 22 V Image 16 P Image 23 W Inage 17 Q Image24 X Image 18 R Image 25 Y Image 19 S Image 26 Z Image 20 T Image 21 U
Second panel contains another 10 images for the user's selection. The idea behind images is that, in Decimal Number System, there are 10 numbers (0 to 9) so in the database that selected images will be converted into its corresponding numbers.
Image Number Image Number Image 1 0 Image 6 5 Image 2 1 Image 7 6 Image 3 2 Image 8 7 Image 4 3 Image 9 8 Image 5 4 Image 10 9
Further third panel contains another 15 images for the user's selection. The idea behind 15 images is that, 15 symbols are taken into consideration to set a password which contains symbols so in the database that selected images will be converted into its corresponding symbols.
Image Symbol Image Symbol Image 1 Image 9 Image 2 1 Imagel1 (
Image 3 @ Image 11 )
Image 4 # Image 12 Image 5 $ Image13 +
Image 6 % Image 14 [ Image 7 A Image15 ] Image 8 &
After the invention is developed, the system time and memory is also calculated and analysed. It has been observed that this scheme is saving the time and memory making the system advantageous.
Thus the enhanced recognition based image authentication method has been implemented. This method has been proposed to prevent the difficulties of using images as a primary data in authentication scheme. With the help of this method, the system time and memory are saved at a larger level and it is also easy to remember authentication scheme for the user.
The many features and advantages of the invention are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the invention which fall within the true spirit and scope of the invention. Further, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
Claims (3)
1. An enhanced recognition based image authentication method to save system time and memory that contains images, alphabets, numbers and symbols wherein the said method converts all the selected images in the string containing alphabets, numbers and symbols.
2. An enhanced recognition based image authentication method to save system time and memory as claimed in claim wherein the recognition based image authentication implemented to provides sequential recognition based and non-sequential recognition based image authentication methods which facilitates to the user to verify its password sequentially or non-sequentially.
3. An enhanced recognition based image authentication method to save system time and memory as claimed in claim 1 wherein the enhanced authentication scheme has two steps registration phase/login phase and password selection phase which further contains three image panels.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021106052A AU2021106052A4 (en) | 2021-08-19 | 2021-08-19 | An enhanced recognition based image authentication method to save system time and memory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021106052A AU2021106052A4 (en) | 2021-08-19 | 2021-08-19 | An enhanced recognition based image authentication method to save system time and memory |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021106052A4 true AU2021106052A4 (en) | 2021-12-23 |
Family
ID=78958081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021106052A Ceased AU2021106052A4 (en) | 2021-08-19 | 2021-08-19 | An enhanced recognition based image authentication method to save system time and memory |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021106052A4 (en) |
-
2021
- 2021-08-19 AU AU2021106052A patent/AU2021106052A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10169558B2 (en) | Enhancing biometric security of a system | |
US7484173B2 (en) | Alternative key pad layout for enhanced security | |
US8392975B1 (en) | Method and system for image-based user authentication | |
TWI260557B (en) | Computer readable medium recording handwritten signature authentication program, and handwritten signature authentication method and apparatus | |
Mayron | Biometric authentication on mobile devices | |
US20070236330A1 (en) | System and method for performing user authentication based on user behavior patterns | |
US20130326604A1 (en) | Rhythm-based authentication | |
JP2003271966A (en) | Device, method and program for authentication of hand- written input | |
EP2685401A1 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
WO2017170384A1 (en) | Biodata processing device, biodata processing system, biodata processing method, biodata processing program, and recording medium for storing biodata processing program | |
WO2021244531A1 (en) | Payment method and apparatus based on facial recognition | |
Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
EP3706021A1 (en) | Authentication system, authentication device, authentication method, and program | |
JPH10261082A (en) | Registered signature data preparing method for computer signature collating system | |
EP3786820B1 (en) | Authentication system, authentication device, authentication method, and program | |
AU2021106052A4 (en) | An enhanced recognition based image authentication method to save system time and memory | |
Kumar et al. | A graphical password based authentication based system for mobile devices | |
Hasan et al. | Multifactor pattern implicit authentication | |
KR101054096B1 (en) | A method and a computer readable media for secure password input using touchscreen interfaces | |
Gao et al. | Usability and security of the recall-based graphical password schemes | |
CN112417429A (en) | Security verification method and device, electronic equipment and storage medium | |
CN111181981A (en) | Processing method and device and computer equipment | |
KR100608775B1 (en) | System and method for authenticating user with handwriting | |
Yang et al. | Implementation of a Personal Authentication System T-Time | |
Malempati et al. | Intrusion Prevention by Native Language Password Authentication Scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |