Background pass-go (BPG), a new approach for GPS

  • Authors:
  • L. Y. Por;X. T. Lim;F. Kianoush

  • Affiliations:
  • Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia;Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia;Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia

  • Venue:
  • ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Access to computer systems is most often based on the use of alpha-numeric password until today. The textual passwords or alpha-numeric passwords have been the basis of authentication systems for a long time. Similarly, they have also been the major attractions for crackers and attackers. However, users always face difficulty in remembering a password which is considered as secured password as this type of secured passwords usually has long string of characters and in random appearing [14]. Hence, most of the users tend to create simple, short and insecure passwords. As a consequence, the usability level of passwords has not achieved an optimum level most of the time for a secured password [14]. In order to solve this problem, a new password scheme has been invented. There are a few schemes which have been studied and enhanced based on the initial idea of Greg Blonder. In this paper, we discuss the design and intention of our proposed scheme, called Background Pass-Go (BPG). BPG is an improvement version of Pass-Go, as it keeps most of the advantages of Pass-Go and achieves better usability. We have analyzed the BPG scheme in terms of 1) how BPG is able to improve other schemes of GSP especially in Pass-Go, 2) how BPG acts as a solution to different types of threats to networked computer systems. Though out our literature, we have verified that BPG manages to overcome the shortage of other GPS schemes. Moreover, the BPS also manages to address most of the security threats for the network security system.