The present application is based on, and claims priority from, Taiwan (International) Application Serial Number 101129890, filed on Aug. 17, 2012, the disclosure of which is hereby incorporated by reference herein in its entirety.
The present disclosure relates to a graphical authentication system and method for anti-shoulder surfing attacking.
In computer security, a conventional authentication is an authentication process that verifies an identity by requiring correct authentication information to be provided. The authentication information is usually a password made up of random numbers and letters. With rapid advance in Internet technology and popularity, there are a variety of web services and web applications that are becoming available in recent decade. Nevertheless, for gaining access to a website, a user is generally required to become a registered member of the website, and only then the user is able to login to the website using his/her registered username and password so as to have access to the service of the website. Generally, a user will use a same pair of username and password to register and login to different web service systems, and more particularly, a simple password composed of a pure string of numbers or lowercase English characters, as shown in
Nowadays, with the rise in popularity of portable Internet devices, it is a common practice for users to gain access to computer systems with cloud computing service in public. However, as these devices are often used in places that are more public and less secure and since most login information for authentication is provided and inputted into the corresponding authentication system either by typing on keyboard or by touching touch panel, the login information that is being provided in public can be very vulnerable to simple spying or “shoulder-surfing”. That is, any person with malicious intent can watch or photograph an unsuspecting user sign into his or her account, and thus, the user's privacy and property security are endangered.
In recent year, there are many different types of authentication systems and methods that are becoming available on the market, such as the graphical authentication system. However, asking users to remember a password consisting of a “mix of uppercase and lowercase characters” is similar to asking them to remember a sequence of bits, which is hard to remember, and only a little bit harder to crack. Therefore, there are biometrics-based authentication systems, such as the fingerprint recognition system, the iris recognition system, etc., that are provided and designed to perform an authentication process based on unalterable personal characteristics without asking users to memorize their passwords at all time. However, such biometrics-based authentication system is not popular for its poor portability; owing to they usually require to be assisted by some additional auxiliary devices so as to perform adequately. Thus, the knowledge-based authentication systems are still the mainstream authentication systems used today, despite that they are vulnerable to simple shoulder-surfing attack.
There are already many studies focusing on solving such security issues. One of which is disclosed in a U.S. Patent Application, entitled “Apparatus and Method for Inputting User Password”, in which the password characters displayed on the password input interface are determined by a series of character sets such as personal identification number (PIN) so as to be used for preventing shoulder-surfing attack. In this U.S. patent, a user will be asked to register a password composed of a string of alphanumeric characters while defining a respective target color for each character in the string, prior to an authentication process. For instance, a PIN number “531” is selected and accordingly yellow color is defined to be the target color for the digit “5”, the light-brown color is defined to be the target color for the digit “3”, and the purple color is defined to be the target color for the digit “1”. Please refer to
Another such study is an authentication method disclosed in U.S. Patent Application, entitled “Graphical Image Authentication and Security System”. During the enrollment phase of this authentication method, the user will be required to select a series of one or more image categories, which will serve as the user's authentication sequence. Thereafter, during the authentication process, an image series including the images of the user's authentication sequence will be generated and displayed, such as the nine images shown in
Therefore, it is in need of a graphical authentication system, which adopts a one-time login indicator for guaranteeing the security of protecting the user password from shoulder surfing attacking
The present disclosure provides a graphical authentication system for anti-shoulder surfing attacking, which comprises:
The present disclosure also provides a graphical authentication method for anti-shoulder surfing attacking, which comprises the steps of:
With the aforesaid method and system, the security of protecting the user password from shoulder surfing attacking can be guaranteed.
Further scope of applicability of the present application will become more apparent from the detailed description given hereinafter. However, it should be understood that the detailed description and specific examples, while indicating exemplary embodiments of the disclosure, are given by way of illustration only, since various changes and modifications within the spirit and scope of the disclosure will become apparent to those skilled in the art from this detailed description.
The present disclosure will become more fully understood from the detailed description given herein below and the accompanying drawings which are given by way of illustration only, and thus are not limitative of the present disclosure and wherein:
In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed embodiments. It will be apparent, however, that one or more embodiments may be practiced without these specific details. In other instances, well-known structures and devices are schematically shown in order to simplify the drawing.
Please refer to
It is noted that before initiating the graphical authentication system and method of the present disclosure, a registration process must be performed by a user in advance. As shown in
step 31: inputting a sole username to a service by a user;
step 32: enabling the user to select a graph from a graph list, or enabling the user to fetch a graph from a storage media while uploading the graph to the service;
step 33: enabling the selected graph to be partitioned into M*N pieces of graph blocks by the service;
step 34: enabling the user to select one of the graph blocks and use as a base for generating a password; and
step 35: storing the username, the selected graph and the selected graph block into a database.
Accordingly, it is clear that during the registration, the user can either select one graph or more than one graph that is to be partitioned, and then select one graph block out of the plural graph blocks resulting from the partition to be used as a base for creating a login indicator. In an embodiment shown in
As shown in
In the aforesaid embodiment of the present disclosure, each graph is partitioned into 7*11 pieces of graph blocks. Nevertheless, it is not limited thereby and thus the numbers M and N can be determined according to the security requirement of the service. That is, the finer the graph being partitioned, the more the graph block will be resulted, and consequently, the password strength for resisting brute-force attack is increased. However, for those devices with comparatively smaller screens, it is difficult for a user to recognize a graph block when the graph is being partitioned into too many graph blocks. Thus, it is importance to take the screen size into consideration for determining the numbers M and N in the graphical authentication system and method of the present disclosure. The embodiment shown in
The login indicator generating module is used for providing a randomly generated login indicator, whereas the login indicator is composed of a horizontal component and a vertical component. In an embodiment of the present disclosure, the horizontal bar is labeled by horizontal components of English letters and the vertical bar is labeled by vertical components of numbers, and thus, each login indicator is the composition of one English letter and one number, such as (A, 3) and (E, 11). It is noted that both the horizontal component and the vertical component in one login indicator are generated randomly, and thus, the login indicators that are obtained at different times even for the same user will not be the same. In addition, the login indicator can be provided to and obtained by the user in different ways without any restriction. For instance, the login indicator can be an audio signal that can be heard by the user via the transmission of a headset, or the login indicator can be a video signal that can be displayed on a display device after the user putting his/her fingers of one had together to form a circle and then arranging the hand to engage with the screen by a side thereof, whereas the displaying of the video signal is discontinued after the hand is detached from the screen, as shown in
The horizontal and vertical axis control module is enabled during the performing of a password verification process by a user, which is provided for enabling the horizontal bar and the vertical bar to be controlled by the user according to the function programmed in the horizontal and vertical axis control module. Moreover, the horizontal bar is composed of M horizontal components of distinctive features; and the vertical bar is composed of N vertical components of distinctive features. In an embodiment of the present disclosure, the M horizontal components of the horizontal bar are English letters, and the N vertical components of the vertical bar are numbers, by that at each time when the vertical and the horizontal bars are generated, the English letters on the horizontal bar as well as the numbers of the vertical bar are randomly arranged. Moreover, each of the vertical and the horizontal bars is designed to scroll in circles. As shown in
The communication module is used for controlling the data transmission between a server and other modules in the graphical authentication system, and the data being transmitted by the communication module includes the graphs and the graph block that are selected by the user during the registration process. It is noted that any such data transmission by the communication module is protected by the SSL (Secure Socket Layer) protocol so as to prevent the data transmission from being monitored or acquired by any person with malicious intent.
The password verification module is used for verifying a password inputting by the user in the password verification process, whereas the password inputting into the service can be performed in an indirect manner. It is noted that only after each and every graph and its corresponding graph block that are selected by the user during the registration process are inputted correctly as required by the service, the user is then able to succeed in the password verification process and then to be allow to login to the service. For instance, the graph shown in
In addition, as shown in
step 81: inputting a sole username to a service by a user;
step 82: enabling the service to generate and display a login indicator during a login process enabled by the user while allowing the login indicator to composed of an English letter and a number;
step 83: enabling the service to generate and display a set of vertical components with alphanumeric labels and horizontal components with alphanumeric labels;
step 84: enabling the system to generate and display a horizontal bar and a vertical bar and accordingly enabling the user to scroll the horizontal bar and the vertical bar to a position according to the login indicator and confirm entry;
step 85: enabling the service to perform an evaluation to determine whether information that is indicated by and corresponding to the position is conforming to the information stored in the database; and
step 86: allowing the user to log into the service if the information is conforming.
In addition, the database is used for storing account information relating to the user, whereas the account information of the user may include a username of the user, and information relating to the password of the user (such as the image number of the selected graph, the grid position of the selected graph), and the registration time of the user, login records, and the duration of each login, and so on. Moreover, the database can be adapted for a system with functions including add, delete and search, etc.
The system and method of the present disclosure can be adapted for various of service platform. While being adapted for web applications, the system and method of the present disclosure can be achieved using various web-related techniques, which includes: style sheet language, such as HyperText Markup Language (HTML) and Cascading Style Sheets (CCS); techniques for facilitating client-server communication in a non-synchronous manner, such as Ajax (Javascript+XML); and various data manipulation languages, such as PHP and MySQL. On the other hand, While being adapted for applications on Android or OS, the system and method of the present disclosure can be achieved using Java and Android API.
With respect to the above description then, it is to be realized that the optimum dimensional relationships for the parts of the disclosure, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
101129890 | Aug 2012 | TW | national |