Click Passwords

  • Darko Kirovski
  • Nebojša Jojić
  • Paul Roberts
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 201)

Abstract

We present a set of algorithms and tools that enable entering passwords on devices with graphical input (touch-pad, stylus, mouse) by clicking on specific pixels of a custom image. As one of the most important features, when entering a password, the user is given limited tolerance for inaccuracy in the selection of pixels. The goal of the proposed click password system is to maximize the password space, while facilitating memorization of entered secrets. Besides enabling personalization of the login procedure through selection of the background image, the proposed system provides superior password space compared to traditional 8-character textual passwords.

Keywords

Tolerance Region Dictionary Attack Image Grid Voronoi Polygon Brute Force Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    A. Adams et al. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Comm. of the ACM, Vol.42, no. 12, pp.40–46, 1999.CrossRefGoogle Scholar
  2. 2.
    W. Belgers. Unix password security. http://www.ja.net/CERT/Belgers/UNIX-password-security.html.Google Scholar
  3. 3.
    G. Blonder. Graphical passwords. United States Patent no.5559961, 1996.Google Scholar
  4. 4.
    S. Brostoff et al. Are passfaces more usable than passwords? HCI, 2000.Google Scholar
  5. 5.
    CVonline: Geometric Feature Extraction Methods. http://homepages.inf.ed.ac.uk/rbf/CVonline/feature.htmGoogle Scholar
  6. 6.
    D.C. Feldmeier et al. UNIX Password Security-Ten Years Later. CRYPTO, pp.44–63, 1989.Google Scholar
  7. 7.
    M.R. Garey and D.S. Johnson. Computers and Intractability. Freeman, 1979.Google Scholar
  8. 8.
    I. Jermyn et al. The design and analysis of graphical passwords. USENIX Security Symposium, pp.1–14, 1999.Google Scholar
  9. 9.
    D.V. Klein. Foiling the Cracker: A survey of, and Improvements to Password Security. USENIX Security Workshop, pp.5–14, 1990.Google Scholar
  10. 10.
    Passfaces. http://www.realuser.comGoogle Scholar
  11. 11.
    Password Portal. http://www.passwordportal.net/.Google Scholar
  12. 12.
    E.E. Schultz. Advanced Windows NT security: network security. Computer Security J., Vol.15, no.3, pp. 13–22, 1999.Google Scholar
  13. 13.
    J. Yan et al. The Memorability and Security of Passwords — Some Empirical Results. Tech. Report No.500, Computer Lab., University of Cambridge, 2000.Google Scholar

Copyright information

© International Federation for Information Processing 2006

Authors and Affiliations

  • Darko Kirovski
    • 1
  • Nebojša Jojić
    • 1
  • Paul Roberts
    • 1
  1. 1.Microsoft ResearchRedmondUSA

Personalised recommendations