Skip to main content

Enhance Computer Security with Graphical Passwords

Researchers at the Rutgers University have developed a unique system to safeguard your computer and online accounts by using images, and not digits and alphabets as passwords.

In one of the solutions proposed by the group, the user is required to pick certain 'click-points' that he had selected initially while setting the password on an an image. The other solution requires the user to select certain icons scrambled within hundreds of icons and then click inside the "convex hull" formed by connecting imaginary lines among these selected icons.

In the first method, the user sets the password by selecting an image of his choice and then selecting a number of regions in that picture. Now to authenticate himself, he will have to click within those regions in the picture.

Graphical Password
Example: To login, the user is required to click within the 4 circled red regions in this picture.


The second method requires the user to select a number of pass-icons from a large pool of icons and memorize them. Now to authenticate himself, the user will have to locate a minimum of three pass-icons from the randomly moving icons pool and click anywhere inside the "convex hull" formed by connecting imaginary lines among these pass icons. The user is required to click inside these regions perform this a predefined number of times and only then is he defined access.

Icon Based Graphical Password
Icon Based Graphical Password: The user has to click inside the area shown here as highlighted


Visit:
The Graphical Password Project Homepage
Graphical passwords for better security

Comments

Popular posts from this blog

Startups for a stronger Resume?

When the whole web is abuzz with keywords such as Ajax, Web 2.0, Meebo and all, there is some uncertainity about how this new Internet Bubble will shape up.

Mike at Techdirt writes that some of these new startups may be only to actually stand out for the crowd and act as a strong resume.

While the complaint is that so many of these companies are built to flip rather than to be sustainable businesses, some are noticing that this process is really just a better way for some to stand out and get a job. You build a company quickly and cheaply that gets some attention, and a bigger company comes along to scoop up your company, giving you a nice "signing bonus." In effect, the purpose of these companies is to act as a strong resume to stand out from the crowd.
Technorati Tags:

Pottermania

I'll have to admit that the nature of Pottermania is beyond my comprehension capabilities! As more and more fans of all ages and countries immerse themselves in Harry’s adventures, adding fuel to the belief that Pottermania is inescapable, I am purely and simply baffled by its ability to appeal to all ages.

Bored by the inactivity prevailing in this muggle world, I began to read the first one of the series and immediately concluded that reading beyond the tenth leaf was something impossible. Undeterred, I watched the first movie. I Hated it. But with the evil-wizard becoming apple of more and more eyes with every passing moment, around the world, it could only have been something wrong with me and so I watched the second movie. And then it became so easy to establish that I loathed the Potter Kid!

Just a passing thought - "Would it be a bad idea for a Potter special appearance in Oliver Twist? The poor kid could do with some wizardry."

Gmail Chat Disabled

The fact that it happened does not surprise me but that it took so long for our network administrators to figure it out does.

And if you are wondering how do you disable Gmail's chat features on your network, you only need locking DNS lookups to chatenabled.mail.google.com, by returning 127.0.0.1.