Toward secure mobile applications through proper authentication mechanisms

通过适当的身份验证机制实现安全的移动应用程序

阅读:2

Abstract

With the increased number of mobile apps, authentication processes play a key role in verifying users' identities and protecting data from security threats. Utilizing proper authentication techniques is key to protecting computer apps from being hacked. In this paper, we aimed to compare the authentication methods of the sign-up, sign-in, and password recovery processes of 50 e-commerce apps. To ensure accurate data analysis, we checked every app in a separate session and used the "think-aloud" technique while recording the screen. The researchers prepared a list of items that were checked during each session to identify the similarities and differences between tested apps regarding the authentication process. The results of this security analysis unequivocally demonstrated how different apps' designs for authentication processes are. Users' memory and comprehension are burdened by these variances, and no app can ensure that they adhere to recommended standards. The results of this study confirmed the necessity for unified and user-friendly authentication processes. This can be possible by following a usable security framework for the authentication process.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。