Skip to main content

Improved Digital Password Authentication Method for Android System

  • Conference paper
  • First Online:
Intelligent Computing Theories and Application (ICIC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10955))

Included in the following conference series:

  • 2219 Accesses

Abstract

Proposes a simple digital password authentication method for mobile phones. Improves the authentication program by introducing random numbers and increasing the number of constant numbers. The input number of the six passwords increases correspondingly with location. The authentication order of the current authentication password is determined according to the cyclic order of the cyclic constants and the dynamic nature of the authentication cipher is achieved. The improved authentication process: this paper calculates the user’s input code and the random number, preserves the final number of the results. Authentication is accomplished by verifying the correspondence of the last digits to the stored passwords. If the result is consistent the authentication is passed otherwise the authentication fails. The randomness of the cipher is improved by adding random numbers. The randomness of the password is increased by increasing the random number. At the same time, the upper limit of authentication failure is set and the password is automatically updated when the upper limit is reached. Experiments show that this improved Android system digital password authentication method can effectively resist attacks such as shoulder peeping attacks, stain attacks and guessing attacks, thus increasing the security of mobile authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, H.M., Abdulkareem, B.J.: Biometric authentication system based on iris patterns. J. Comput. Commun. 04(1), 23–32 (2016)

    Article  Google Scholar 

  2. Shah, A., Thapa, P., Dwivedi, M., et al.: Method and system to provide customizable and configurable lock screen in a user device. US20150254464 (2015)

    Google Scholar 

  3. Samangouei, P., Patel, V.M., Chellappa, R., et al.: Attribute-based continuous user authentication on mobile devices. US20170026836 (2017)

    Google Scholar 

  4. Ali, M.L., Monaco, J.V., Tappert, C.C., et al.: Keystroke biometric systems for user authentication. J. Signal Process. Syst. 86(2–3), 175–190 (2016)

    Google Scholar 

  5. Faruki, P., Bharmal, A., Laxmi, V., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutor. 17(2), 998–1022 (2015)

    Article  Google Scholar 

  6. Lee, S., Park, J., Hong, S., et al.: Study on the improvement about user authentication of android third party application through the vulnerability in Google voice. J. KIISE 42(1), 23–32 (2015)

    Article  Google Scholar 

  7. Pathangay, V., Rath, S.P.: Biometric user authentication system and a method therefor. US20160132669 (2016)

    Google Scholar 

  8. Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016)

    Article  Google Scholar 

  9. Wu, J., Cao, T., Zhai, J.: BlindLock: a pattern lock system that effectively prevents stains attack. Comput. Sci. (b11), 364–367 (2015)

    Google Scholar 

  10. Todeschini, E.: User authentication system and method. US20160188861 (2016)

    Google Scholar 

  11. Kim, G.L., Lim, J.D., Kim, J.N.: Secure user authentication based on the trusted platform for mobile devices. EURASIP J. Wirel. Commun. Netw. 2016(1), 233 (2016)

    Article  Google Scholar 

  12. Aviv, A.J., Gibson, K., Mossop, E., et al.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1–7. USENIX Association (2010)

    Google Scholar 

  13. Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 115–126. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_11

    Chapter  Google Scholar 

  14. Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? The security of customer-chosen banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 25–40. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_3

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Science Foundation of China under Grant No. 61462009, Science Research Project 2014 of the China-ASEAN Study Center (Guangxi Science Experiment Center) of Guangxi University for Nationalities, No. TD201404 and Innovation Project of Guangxi University for Nationalities Graduate Education, No. gxun-chxps201766. The authors would like to thank Prof. Lina Ge for their valuable comments which greatly improved the presentation of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lina Ge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Geng, B., Ge, L., Wang, Q., Wang, L. (2018). Improved Digital Password Authentication Method for Android System. In: Huang, DS., Jo, KH., Zhang, XL. (eds) Intelligent Computing Theories and Application. ICIC 2018. Lecture Notes in Computer Science(), vol 10955. Springer, Cham. https://doi.org/10.1007/978-3-319-95933-7_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95933-7_86

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95932-0

  • Online ISBN: 978-3-319-95933-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics