This document surveys various user authentication schemes specifically designed for mobile devices, highlighting the evolution of authentication methods to counter security threats linked to sensitive data. It discusses the inadequacies of traditional PIN and password systems and presents alternative graphical, image-based, and audio-based methods, detailing their advantages and disadvantages. The need for new, adaptive authentication mechanisms is emphasized to ensure security while considering the limited user interfaces of mobile devices.