Abstract
Proposes a simple digital password authentication method for mobile phones. Improves the authentication program by introducing random numbers and increasing the number of constant numbers. The input number of the six passwords increases correspondingly with location. The authentication order of the current authentication password is determined according to the cyclic order of the cyclic constants and the dynamic nature of the authentication cipher is achieved. The improved authentication process: this paper calculates the user’s input code and the random number, preserves the final number of the results. Authentication is accomplished by verifying the correspondence of the last digits to the stored passwords. If the result is consistent the authentication is passed otherwise the authentication fails. The randomness of the cipher is improved by adding random numbers. The randomness of the password is increased by increasing the random number. At the same time, the upper limit of authentication failure is set and the password is automatically updated when the upper limit is reached. Experiments show that this improved Android system digital password authentication method can effectively resist attacks such as shoulder peeping attacks, stain attacks and guessing attacks, thus increasing the security of mobile authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmad, H.M., Abdulkareem, B.J.: Biometric authentication system based on iris patterns. J. Comput. Commun. 04(1), 23–32 (2016)
Shah, A., Thapa, P., Dwivedi, M., et al.: Method and system to provide customizable and configurable lock screen in a user device. US20150254464 (2015)
Samangouei, P., Patel, V.M., Chellappa, R., et al.: Attribute-based continuous user authentication on mobile devices. US20170026836 (2017)
Ali, M.L., Monaco, J.V., Tappert, C.C., et al.: Keystroke biometric systems for user authentication. J. Signal Process. Syst. 86(2–3), 175–190 (2016)
Faruki, P., Bharmal, A., Laxmi, V., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17(2), 998–1022 (2015)
Lee, S., Park, J., Hong, S., et al.: Study on the improvement about user authentication of android third party application through the vulnerability in Google voice. J. KIISE 42(1), 23–32 (2015)
Pathangay, V., Rath, S.P.: Biometric user authentication system and a method therefor. US20160132669 (2016)
Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016)
Wu, J., Cao, T., Zhai, J.: BlindLock: a pattern lock system that effectively prevents stains attack. Comput. Sci. (b11), 364–367 (2015)
Todeschini, E.: User authentication system and method. US20160188861 (2016)
Kim, G.L., Lim, J.D., Kim, J.N.: Secure user authentication based on the trusted platform for mobile devices. EURASIP J. Wirel. Commun. Netw. 2016(1), 233 (2016)
Aviv, A.J., Gibson, K., Mossop, E., et al.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1–7. USENIX Association (2010)
Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 115–126. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_11
Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? The security of customer-chosen banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 25–40. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_3
Acknowledgements
This work is supported by the National Science Foundation of China under Grant No. 61462009, Science Research Project 2014 of the China-ASEAN Study Center (Guangxi Science Experiment Center) of Guangxi University for Nationalities, No. TD201404 and Innovation Project of Guangxi University for Nationalities Graduate Education, No. gxun-chxps201766. The authors would like to thank Prof. Lina Ge for their valuable comments which greatly improved the presentation of the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Geng, B., Ge, L., Wang, Q., Wang, L. (2018). Improved Digital Password Authentication Method for Android System. In: Huang, DS., Jo, KH., Zhang, XL. (eds) Intelligent Computing Theories and Application. ICIC 2018. Lecture Notes in Computer Science(), vol 10955. Springer, Cham. https://doi.org/10.1007/978-3-319-95933-7_86
Download citation
DOI: https://doi.org/10.1007/978-3-319-95933-7_86
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95932-0
Online ISBN: 978-3-319-95933-7
eBook Packages: Computer ScienceComputer Science (R0)