Skip to main content
Top

2013 | OriginalPaper | Chapter

Mobile User Authentication Scheme Based on Minesweeper Game

Authors : Taejin Kim, Siwan Kim, Hyunyi Yi, Gunil Ma, Jeong Hyun Yi

Published in: Multimedia and Ubiquitous Engineering

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The latest boom in the prevalence of smartphones has been encouraging various personal services to store and utilize important data such as photos and banking information. Thus, the importance of user authentication has also been growing rapidly. Nevertheless, many problems have arisen as a result of the common method of using a four-digit personal identification number (PIN) because of its potential for being breached by a brute force attack or shoulder-surfing attack. Various authentication schemes have been developed to overcome these problems. In this paper, we also propose a new password-based user authentication scheme that utilizes the well-known Minesweeper game, providing better usability as well as greater security. The proposed scheme provides its users a simple method for memorizing their passwords and usable security by allowing them to enter calculated values rather than the password itself.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Roth V, Richter K, Freidinger R (2004) A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM conference on computer and communications security, USA, pp 236–245 Roth V, Richter K, Freidinger R (2004) A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM conference on computer and communications security, USA, pp 236–245
2.
go back to reference Park SB (2004) A method for preventing input information from exposing to observers. Patent application no.: 10-2004-0039209, Korea Park SB (2004) A method for preventing input information from exposing to observers. Patent application no.: 10-2004-0039209, Korea
5.
go back to reference Yi JH, Kim T, Ma G, Yi H, Kim S (2012) Method and apparatus for authenticating password. Patent application no.: US 13/623,409 Yi JH, Kim T, Ma G, Yi H, Kim S (2012) Method and apparatus for authenticating password. Patent application no.: US 13/623,409
6.
go back to reference Kaye R (2000) Minesweeper is NP-complete. Math Intell 22:9–15 Kaye R (2000) Minesweeper is NP-complete. Math Intell 22:9–15
7.
go back to reference Olson JR, Olson GM (1990) The growth of cognitive modeling in human-computer interaction since GOMS. Hum Comput Interact 5:221–265 Olson JR, Olson GM (1990) The growth of cognitive modeling in human-computer interaction since GOMS. Hum Comput Interact 5:221–265
8.
go back to reference Lee S, Myung R (2009) Modified GOMS-model for mobile computing. J Soc Korea Ind Syst Eng 32:85–93 Lee S, Myung R (2009) Modified GOMS-model for mobile computing. J Soc Korea Ind Syst Eng 32:85–93
Metadata
Title
Mobile User Authentication Scheme Based on Minesweeper Game
Authors
Taejin Kim
Siwan Kim
Hyunyi Yi
Gunil Ma
Jeong Hyun Yi
Copyright Year
2013
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6738-6_29