Analysis of user behavior and authorization methods in context of mobile devices security

Main Article Content

DOI

Piotr Król

piotrekk6@gmail.com

Damian Marek

damian.marek@outlook.com

Jakub Smołka

j.smolka@pollub.pl

Abstract

This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors. Pattern and PIN (Personal Identification Number) lock were compared with two new authentication methods. The time required for entering the key, number of mistakes, number of possible combinations were analyzed.

Keywords:

user authentication; pattern lock; pin lock; android security; authorization methods

References

Article Details

Król, P., Marek, D., & Smołka, J. (2018). Analysis of user behavior and authorization methods in context of mobile devices security . Journal of Computer Sciences Institute, 6, 34–41. https://doi.org/10.35784/jcsi.636