Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

CybIQ: Secure Authentication Method

Version 1 : Received: 28 October 2021 / Approved: 2 November 2021 / Online: 2 November 2021 (11:06:37 CET)

How to cite: Devidas, R.; Srinivasachar, H. CybIQ: Secure Authentication Method. Preprints 2021, 2021110045. Devidas, R.; Srinivasachar, H. CybIQ: Secure Authentication Method. Preprints 2021, 2021110045.


With increased vulnerabilities and vast technology landscapes, it is extremely critical to build systems which are highly resistant to cyber-attacks, to break into systems to exploit. It is almost impossible to build 100% secure authentication & authorization mechanisms merely through standard password / PIN (With all combinations of special characters, numbers & upper/lower case alphabets and by using any of the Graphical password mechanisms). The immense computing capacity and several hacking methods used, make almost every authentication method susceptible to cyber-attacks in one or the other way. Only proven / known system which is not vulnerable in spite of highly sophisticated computing power is, human brain. In this paper, we present a new method of authentication using a combination of computer’s computing ability in combination with human intelligence. In fact this human intelligence is personalized making the overall security method more secure. Text based passwords are easy to be cracked [6]. There is an increased need for an alternate and more complex authentication and authorization methods. Some of the Methods [7] [8] in the category of Graphical passwords could be susceptible, when Shoulder surfing/cameras/spy devices are used.


Pattern based access; Graphical password; safe password; non-intuitive password; non-static password; visually encrypted password


Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0

Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.