PassPattern System (PPS): A Pattern-Based User Authentication Scheme

  • T. Rakesh Kumar
  • S. V. Raghavan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4982)


Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) choose very simple passwords which are often easy to guess. On the contrary, randomly generated strings are difficult to remember, especially if the user is having many passwords. In this paper we present a dynamic password scheme based on patterns, called PassPattern System (PPS), which works using the existing infrastructure. PPS is an Adaptive Authentication System, where the strength of the system can be changed depending on the need of the application without compromising the user comfort.


User Authentication Security 


  1. 1.
    McCaughrean, G.: One Thousand and One Arabian Nights, USA. Oxford University Press, Oxford (1999)Google Scholar
  2. 2.
    Adams, M.A., Sasse, M.S.: Users are not the enemy: why users compromise computing security mechanisms and how to take remedial measure. Communications of the ACM 42(12), 40–46 (1999)CrossRefGoogle Scholar
  3. 3.
    RSA Security Inc. RSA SecurID® authenticators,
  4. 4.
    Suo, X., Owen, Y.Z.: Graphical Passwords: A Survey. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 463–472 (2005)Google Scholar
  5. 5.
    Gilhooly, K.: Biometrics: Getting Back to Business. Computerworld (May 09, 2005)Google Scholar
  6. 6.
    Strong passwords: How to create and use them,
  7. 7.
    Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-Factor Authentication: Somebody You Know. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 168–178 (2006)Google Scholar
  8. 8.
    Shepard, R.N.: Recognition memory for words, sentences and pictures. Journal of verbal Learning and verbal Behavior 6, 153–163 (1967)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • T. Rakesh Kumar
    • 1
  • S. V. Raghavan
    • 1
  1. 1.Network Systems Laboratory, Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia

Personalised recommendations