Around Device Interaction for Inconspicuous Authentication?

نویسندگان

  • James Nicholson
  • Vasilis Vlachokyriakos
چکیده

Copyright is held by the author/owner(s). CHI 2014 Workshop on Inconspicuous Interaction, April 26, 2014, Toronto, ON, Canada. Abstract New interactive technologies tend to bring new challenges and opportunities for designing inconspicuous interaction. In this short paper we discuss the viability of Around Device Interaction (ADI) as a method for inconspicuous user interaction. We firstly review related work in the HCI field in ADI, and then propose challenges and opportunities for ADI when applied to inconspicuous interaction.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Duress Unlock: Using Covert Signals to Restrict Access to Mobile Devices

An unlocked mobile device can be a treasure trove of private information. Adversaries that are socially close to the user are in a particularly favorable position to authentication code and can even be handed the device for a legitimate task. To address this threat, we propose a new authentication concept that assumes that, by default, a user is authenticating under duress. An inconspicuous sid...

متن کامل

Assessing Inconspicuous Smartphone Authentication for Blind People

As people store more personal data in their smartphones, the consequences of having it stolen or lost become an increasing concern. A typical counter-measure to avoid this risk is to set up a secret code that has to be entered to unlock the device after a period of inactivity. However, for blind users, PINs and passwords are inadequate, since entry 1) consumes a non-trivial amount of time, e.g....

متن کامل

Hitting Authentication on the Nose: Using the Nose for Input to Smartphone security

Interaction with a touchscreen interface requires a pointer to target the desired interaction. The effort normally requires the use of two hands; one to hold the device and the other to manipulate the device. The lack of haptic or auditory feedback to indicate a specific screen position requires visual confirmation of the input by the user. Widespread use of smartphones in less than optimal con...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Listen to your Heart: Novel Ways of using Respiration and Heartbeat as Inconspicuous Input Modalities

The interactive capabilities of public interactive systems are often not fully exploited, as users often feel uncomfortable to interact with them as they may feel observed by bystanders while interacting. In some contexts, users would like to perform private and inconspicuous interactions with these systems. Performing expressive gestures in the public or using a mobile phone in front of a scre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014