Under the table: tap authentication for smartphones
نویسندگان
چکیده
Current smartphone authentication methods are known to be susceptible to even rudimentary attacks based on observation. In this paper, we propose an approach to authentication based on rich tapping patterns that addresses this problem. We present a novel tapping detection technique, using a single example as a template. We also report on two user studies (N = 30 and N = 19) where tapping authentication is compared to the leading alternatives, both in an “out in the open” and in an “under the table” condition. Results indicate that the tapping method approximates current standards of security and usability, but also affords inconspicuous authentication, thus allowing the user to self-protect in social settings.
منابع مشابه
Assessing Inconspicuous Smartphone Authentication for Blind People
As people store more personal data in their smartphones, the consequences of having it stolen or lost become an increasing concern. A typical counter-measure to avoid this risk is to set up a secret code that has to be entered to unlock the device after a period of inactivity. However, for blind users, PINs and passwords are inadequate, since entry 1) consumes a non-trivial amount of time, e.g....
متن کاملUser Authentication in Smartphones for Telehealth
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Heal...
متن کاملCertCoin: A NameCoin Based Decentralized Authentication System 6.857 Class Project
Authentication is vital to all forms of remote communication. A lack of authentication opens the door to man-in-the-middle attacks, which, if performed at a key moment, may subvert the entire interaction. Current approaches to authentication on the internet include certificate authorities and webs of trust. Both of those approaches have significant drawbacks: the former relies upon trusted thir...
متن کاملPerson Recognition using Smartphones' Accelerometer Data
Smartphones have become quite pervasive in various aspects of our daily lives. They have become important links to a host of important data and applications, which if compromised, can lead to disastrous results. Due to this, today's smartphones are equipped with multiple layers of authentication modules. However, there still lies the need for a viable and unobtrusive layer of security which can...
متن کاملTwo New Gestures to Zoom: Enhancing Online Maps Services
Online services such as Google Maps or Open Street Maps allow the exploration of maps on smartphones and tablets. The gestures used are the pinch to adjust the zoom level and the drag to move the map. In this paper, two new gestures to adjust the zoom level of maps are presented. Both gestures – with slight differences – allow the identification of a target area to zoom, which is enlarged autom...
متن کامل