DEVELOPMENT OF A PASSPOINTS-BASED GRAPHICAL AUTHENTICATION API
Abstract
Authentication is crucial for protecting users and their data. Due to the weaknesses that appear in alphanumeric passwords as a result of user actions, new approaches have been developed, such as those based on graphical authentication. One of these systems is Passpoints, which stands out for its security and ease of use. This article presents our own implementation of this system, the result of an exhaustive study of the system in question. This study addressed both the functioning and security of the Passpoints system, identifying its weaknesses and exploring existing proposals to mitigate them. For the main implementation of this system, other essential intermediate implementations were carried out for its complete development. To achieve this, a comprehensive analysis of available discretization methods was conducted to select the most effective and efficient for subsequent translation into programming code, as well as research regarding the adaptation of this system to the variety of current screen resolutions and image sizes, allowing the adaptation of this implementation to any type of device. This process is fundamental to turning the system into a real product that can be evaluated by real users across different media.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
The authors who publish in this journal agree to the following terms:
- The authors retain the copyright and guarantee to the journal the right to be the first publication of the work are distributed under a license of use and distribution "Creative Commons Attribution-NonCommercial-NoDerivativeWorks 3.0 Unported" (CC BY-NC-ND 3.0) You can consult from here the informative version and the legal text of the license that allows others to share the work with an acknowledgement of the authorship of the work and the initial publication in this journal.
- Authors may separately enter into additional agreements for non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are allowed and encouraged to disseminate their work electronically (e.g., in institutional repositories or on their own website) before and during the submission process, as this can lead to productive exchanges as well as earlier and greater citation of published work (see The Effect of Open Access).