The document proposes two visual authentication protocols that aim to resist keylogging attacks:
1) A password-based protocol where the server encrypts a random OTP for the user to decrypt and enter on their terminal.
2) A protocol where the server randomizes a keyboard layout and encrypts it for the user to view on their phone to enter their password on the terminal's blank keyboard.
The protocols aim to prevent keyloggers by removing the need for users to type passwords or view decrypted content on compromised terminals. Security analyses argue the protocols would be resistant to keylogging and malware by distributing tasks between devices and users.