Abstract

This article discusses improvements in a puzzle authentication method that adopts the interface of the Puzzle and Dragons game [1] and is tolerant against video-recording attacks. A problem that the conventional puzzle authentication methods face is that they are time consuming and have low success rate in authentication. We evaluated improvements of the interface to verify the usability of the improved system. The results suggested that the usability in terms of operation time and authentication success rate attained a level that was comparable with other leading methods in the field.

Highlights

  • Network services such as internet banking, internet finance, and network shopping are commonly used worldwide

  • This study focused on a puzzle authentication method that adopts the puzzle interface used in the Puzzle Dragon Game [1]

  • Each of the improved methods was found to be significantly different from the conventional puzzle authentication methods

Read more

Summary

Introduction

Network services such as internet banking, internet finance, and network shopping are commonly used worldwide. The system requires user authentication to deliver these services. With the explosive increase of smart phone users, authentication is used for smart phone locking to avoid the leaking of private information. Many types of authentication methods have been proposed. This article focuses on password authentication since it is the basic method and is occasionally used as a remedy when other authentication methods fail. The most popular method is called the personal identification number-entry (PIN-entry) system, which has been adopted worldwide by ATM machines

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call