Image security
As a computer user, you must understand the importance of securing information and passwords that are often overlooked, easily stolen, especially when it is too simple. A newly announced security method is attracting new users
As a computer user, you must understand the importance of securing information and passwords that are often overlooked, easily stolen, especially when it is too simple.
Landscape photo of Rutgers University - Camden
A newly published security method is attracting attention: graphic password. This is a new study of computer experts from Rutgers University - Camden (USA) .
One solution is to 'get back from a click position' on a pre-selected image of the user (the password is created and the machine recognizes by the click position). Another option is 'shoulder surfing' (a way of stealing the password from behind the shoulder of the person typing the password) by selecting a random area in the set of icons reserved by the user. preset in the middle of an image area. If these solutions can be perfect for the main system, it will help to avoid the need to create new passwords for online applications.
Computer professor Jean - Camile Birget and his research team had this unique idea of 'graphic password'. Professor Jean said that normally, a password is created with numbers and characters, and with the solution of the image, the user will select the areas in a given picture, called the 'selection point' (click point) ), these positions are very easy to remember with the owner but become difficult to guess for others.
In the computer image security program, Jean - Camile Birget instructs: 'You can ask the user to select the picture, which helps the user remember the initial click on the picture. The picture must be complex enough to look like a city, so to be secure, users need to select multiple locations on the image.
Landscape photo of Rutgers University - Camden is an example. This is a simple description of a picture password that matches the old password (numbers and letters). To log in, the user is asked to select four locations with circles on the picture at the same time. These positions have been selected when creating a password, these four positions are user-friendly, most importantly they have to choose a location that is easy to remember. Users can also use their own images to create passwords, the more points the higher the security is selected.
The second method was developed to prevent 'shoulder surfing', a password theft that unknown users are being tracked from behind by bad guys.
Under this method, users must select 10 icons, mixed in nearly 200 other symbols. In order to access the system, the user must find the pictures, in particular the triangle, and the symbols they choose to place at the corners and click inside the image area (triangle). choose that.
Leonardo Sobrado, a member of the research team, said: 'The main idea of the model is to allow users to demonstrate their ability to understand secrets without revealing these secrets in an invisible way. love for others. The question or request is changed over time when the answer is made, but the secrets (passwords) do not change.
If you want to test this technology, you can download the program at: http://clam.rutgers.edu/~lsobrado/graphicalpassword/. More details can be found on The Graphical Passwords Project page (http://clam.rutgers.edu/~birget/grPssw).
TAM TRUNG
- Bank security is still loose
- McAfee security products make mistakes ... security
- Bank security of the time of
- Unlock the phone with lips, ears and heartbeat
- Ten current security trends
- Nymi - Security key of the future
- Two more security errors appear from the WMF vulnerability
- Patrol robot with security guard
- See network security struggles like the front
- IE, Firefox 'cross-apple' security error
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system