Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.5

Submission
Last date
28-Oct-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-5. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM
PaperId: :  7588
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 4 Issue 2 2018
DUI:    16.0415/IJARIIE-7588
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
SUMRAN SK.Ramakrishnan College of Engineering
VENKAT A PK.Ramakrishnan College of Engineering
VIJAYARANGAN S GK.Ramakrishnan College of Engineering
VIJAY KRISHNA NK.Ramakrishnan College of Engineering
B.KIRAN BALAK.Ramakrishnan college of Engineering

Abstract

Computer Science and Engineering
security, mobile, pattern lock
There have been a number of systems proposed to secure our mobile phones. It includes passwords with alphabets and numbers and latest development called patterns. But the pattern can be easily eavesdropped by noticing the hand movement of the user even though the pattern may be set to be invisible leading to insecurity. But in our system we have overcome it by merely including a timer to each dot. The user can choose any kind of pattern from the matrix and also can choose any amount time to each dot until which the finger has to be idle in that. The number of dots on which the timer is to be activated is purely user’s choice - it can be one or all or some of the user desired pattern. The timing to each pattern is also completely user’s wish - different timings to different dots. As there is to be a limit to everything, the time can be maximum up to five seconds, contemplating about emergency situations. This prohibits third parties to lurk into patterns and access one’s personal data maliciously as one cannot concentrate on both the timing and the pattern. With this there will be no weak passwords. It only requires the user to have a strong memory power to remember the timings with the pattern.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. "TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM" International Journal Of Advance Research And Innovative Ideas In Education Volume 4 Issue 2 2018 Page 1570-1574
MLA SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. "TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM." International Journal Of Advance Research And Innovative Ideas In Education 4.2(2018) : 1570-1574.
APA SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, & B.KIRAN BALA. (2018). TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM. International Journal Of Advance Research And Innovative Ideas In Education, 4(2), 1570-1574.
Chicago SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. "TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM." International Journal Of Advance Research And Innovative Ideas In Education 4, no. 2 (2018) : 1570-1574.
Oxford SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. 'TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM', International Journal Of Advance Research And Innovative Ideas In Education, vol. 4, no. 2, 2018, p. 1570-1574. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/TIMER_INDUCED_PATTERN_SECURITY_FOR_CRITICAL_SYSTEM_ijariie7588.pdf (Accessed : 11 April 2022).
Harvard SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. (2018) 'TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM', International Journal Of Advance Research And Innovative Ideas In Education, 4(2), pp. 1570-1574IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/TIMER_INDUCED_PATTERN_SECURITY_FOR_CRITICAL_SYSTEM_ijariie7588.pdf (Accessed : 11 April 2022)
IEEE SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA, "TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM," International Journal Of Advance Research And Innovative Ideas In Education, vol. 4, no. 2, pp. 1570-1574, Mar-App 2018. [Online]. Available: http://ijariie.com/AdminUploadPdf/TIMER_INDUCED_PATTERN_SECURITY_FOR_CRITICAL_SYSTEM_ijariie7588.pdf [Accessed : 11 April 2022].
Turabian SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. "TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 4 number 2 (11 April 2022).
Vancouver SUMRAN S, VENKAT A P, VIJAYARANGAN S G, VIJAY KRISHNA N, and B.KIRAN BALA. TIMER INDUCED PATTERN SECURITY FOR CRITICAL SYSTEM. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2018 [Cited : 11 April 2022]; 4(2) : 1570-1574. Available from: http://ijariie.com/AdminUploadPdf/TIMER_INDUCED_PATTERN_SECURITY_FOR_CRITICAL_SYSTEM_ijariie7588.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads


Last download on 4/11/2022 3:58:09 PM

Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
A Deep Learning Framework for Mood-Based Music Recommendation via Facial Expression AnalysisComputer Vaibhav Ashok Bhangare Download
DIABETIC RETINOPATHY DETECTION USING MACHINE LEARNINGComputer EngineeringSiddharth Shukracharya Rokade Download
PERSONALITY PREDICTION USING MLComputer EngineeringTanvi Dashrath Bhagat Download
Crop Disease Detectioncomputer Mansi Sunil Sansare Download
NEXT-GEN PLANT DISEASE DIAGNOSIS WITH GEN-AI AND DEEP LEARNINGComputer ScienceGuruprasad K Download
GEN-AI POWERED PIGEON PEA LEAF-DISEASE DETECTION USING DEEP-LEARNING AND COMPUTER-VISIONComputer ScienceRajshekar G Download
GEN-AI POWERED LIVER-DISEASE DETECTION USING DEEP-LEARNING AND COMPUTER-VISIONComputer ScienceDhananjay M Download
Fake Review Detection on Amazon Dataset Using Classification TechniquesMachine LearningVishwajeet Kumar Download
Securing mobile networks:Identifying hijacking in opportunistic scenariosComputer engineeringKiran D Hosagoudar Download
The integration of artificial intelligence in web developmentComputer EngineeringRashmi M R Download
Intelligent Health Diagnosis Techniques Exploiting Automatic Ontology Generation and Web-Based Personal Health Record ServicesComputer ScienceMd Nafis Alam Download
Intelligent Allocation of Urban Parking Spaces Using Computational Learning Modelscomputer ApplicationMANOJ H N Download
Anomaly Recognition in Digital Commerce for Unethical Activity Prevention Using Advanced Learning ModelsMCAP Naveen Download
Rumor detection in twitter an analysis in retrospectMaster of Computer ApplicationAnusha H B Download
USING COLLECTIVE LEARNING TO SPOT ILLEGAL ACTIVITIES IN BANK CARD ACTIVITIESComputer Engineering PRAJWAL R K Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.