USEr IdEntIfICatIon ChallEngES

نویسندگان

  • Tam Vu
  • Marco Gruteser
چکیده

I n this emerging era of pervasive computing, we interact with and rapidly switch among a diverse set of digital devices. We tend to transition from a smartphone to a notebook when arriving in the office, and when we return home, we often switch to a tablet. In between, we might use large wall-mounted displays, car navigation systems, selfcheckout kiosks at retail stores, and home security or smart home controls. Many of these devices—even if only used in the home—have multiple users. Over the next decade, this range of devices will likely increase, and our time with any single device will grow shorter. We argue that it’s time for touchbased personal tokens that let devices unobtrusively identify who is interacting with the device at any given time. This would let devices tailor services to users and apply authentication to control access to sensitive information and online services. Consider, for example, that a child reportedly spent more than $1,000 on in-app purchases while playing games on his mother’s iPhone.1 Devices that know their users could limit such spending from unauthorized users and serve age-appropriate content and media. Our approach is to use a wearable personal token to communicate an identification code through touch.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Studying the Viewpoints of Librarians and Users about the Challenges and Strategies for User Participation in Library Activities and Services: A Case Study of Public Libraries in Bandar Abbas

Purpose: The purpose of this research is to identify the viewpoints of Bandar Abbas public libraries librarians and users about the challenges and strategies of users’ participation in public library activities and services. Method: The methodology used in this research is qualitative. The potential partners of this study include 20 librarians in five Bandar Abbas public libraries and users of...

متن کامل

Security Challenges for User-Oriented RFID Applications

In this article, we examine the role played by RFID in enabling user-oriented networked applications. We explain why RFID is seen to be an important building block of the ‘Internet of Things’ and examine how RFID, assisted by the deployment of NFC devices, is increasingly facilitating useroriented, Internet-based application architectures. Finally, we look at the high-level security challenges ...

متن کامل

Identification of the underlying factors affecting information seeking behavior of users interacting with the visual search option in EBSCO: a grounded theory study

Background and Aim: Information seeking is interactive behavior of searcher with information systems and this active interaction occurs in a real environment known as background or context. This study investigated the factors influencing the formation of layers of context and their impact on the interaction of the user with search option dialoge in EBSCO database. Method: Data from 28 semi-stru...

متن کامل

Focus Project: User-Controlled Wireless Privacy via Client-Oriented De-Identification

Technology Rationale: As mobile devices and their network services continuously monitor our environment, they enable many novel applications with tremendous societal benefits. However, they also raise significant privacy challenges by making it difficult for users to control when information about their whereabouts can be sensed or revealed. To address this challenge, this project studies the h...

متن کامل

Identification of parameters affecting the success of the hospital information system & presentation of a model for user satisfaction improvement

Complex institutions comprising several divisions and departments such as hospitals need access to information. Hospital information system has many capabilities and in case this system is acceptance by hospital staff, it leads to a revolution in the health care delivery industry. The identification of effective determinants and measures on the success of hospital information systems could sign...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013