Wednesday, November 11, 2015

Introducing Authicon

What is graphical password?

A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). In a graphical password system, a user needs to choose memorable locations in an image.

A graphical password is easier than a text-based password for most people to remember. It may also offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words.

Why Authicon?

Using alphanumerical passwords has been shown to have significant drawbacks. To address this problem, Authicon uses the graphical password technique that deals with shoulder-surfing problem, identity theft and other online attacks.

Traditional cyber security system relying on just usernames and passwords isn’t enough anymore. The key is adding extra layers of protection. Authicon adds an extra layer of protection by using a graphical password technique. The system works by having the user logs in to his account on the website secured by Authicon using his login information – email and password for the particular website. Authicon pop up page will then open where the user has to enter the preselected icons from among a variety of icons displayed. If the correct icons were clicked in, the user would be authenticated. Once the user is authenticated, he can now access his account. Everytime the user will access his account on the website secured by Authicon, he has to enter the correct icons on the Authicon pop up page after every login.

Authicon server is capable of supporting tens of thousands of users and can be easily expanded to users without disrupting its infrastructure. Authicon is accessible through any web browser from anywhere.


Authicon eliminates significant up-front expense by offering a way for companies of any size to implement authentication quickly and inexpensively. Deploying Authicon authentication system is easy, cost-effective and secure. Visit http://blog.authicon.com/introducing-authicon/

No comments:

Post a Comment