Assessing Inconspicuous Smartphone Authentication for Blind People
نویسندگان
چکیده
As people store more personal data in their smartphones, the consequences of having it stolen or lost become an increasing concern. A typical counter-measure to avoid this risk is to set up a secret code that has to be entered to unlock the device after a period of inactivity. However, for blind users, PINs and passwords are inadequate, since entry 1) consumes a non-trivial amount of time, e.g. using screen readers, 2) is susceptible to observation, where nearby people can see or hear the secret code, and 3) might collide with social norms, e.g. disrupting personal interactions. Tap-based authentication methods have been presented and allow unlocking to be performed in a short time and support naturally occurring inconspicuous behavior (e.g. concealing the device inside a jacket) by being usable with a single hand. This paper presents a study with blind users (N = 16) where an authentication method based on tap phrases is evaluated. Results showed the method to be usable and to support the desired inconspicuity. Author
منابع مشابه
Under the table: tap authentication for smartphones
Current smartphone authentication methods are known to be susceptible to even rudimentary attacks based on observation. In this paper, we propose an approach to authentication based on rich tapping patterns that addresses this problem. We present a novel tapping detection technique, using a single example as a template. We also report on two user studies (N = 30 and N = 19) where tapping authen...
متن کاملHitting Authentication on the Nose: Using the Nose for Input to Smartphone security
Interaction with a touchscreen interface requires a pointer to target the desired interaction. The effort normally requires the use of two hands; one to hold the device and the other to manipulate the device. The lack of haptic or auditory feedback to indicate a specific screen position requires visual confirmation of the input by the user. Widespread use of smartphones in less than optimal con...
متن کاملAround Device Interaction for Inconspicuous Authentication?
Copyright is held by the author/owner(s). CHI 2014 Workshop on Inconspicuous Interaction, April 26, 2014, Toronto, ON, Canada. Abstract New interactive technologies tend to bring new challenges and opportunities for designing inconspicuous interaction. In this short paper we discuss the viability of Around Device Interaction (ADI) as a method for inconspicuous user interaction. We firstly revie...
متن کاملFUEL: Fast, Ubiquitous, Easy-to-use, and Low-cost Authentication for Smartphones
As smartphones have become highly ubiquitous, it is often used as a primary gateway for many online services that require authentication. However, the traditional authentication approach using a user id and password can be inconvenient or impossible to use in certain cases. We propose Fast, Ubiquitous, Easy-to-use, and Low-cost (FUEL) scheme for authenticating users by leveraging existing ambie...
متن کاملA Secure Mobile Payment Framework Based On Face Authentication
With the increasing market share of the smartphone, more and more people use m-payment (mobile payment) to pay for something in their daily life. In this paper, a brand new m-payment framework which based on face authentication is proposed after studying existing m-payment security frameworks. On the basis of traditional password authentication technology, this new face authentication based fra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1506.00930 شماره
صفحات -
تاریخ انتشار 2015