Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Communications of the ACM
Integrated technologies for indexing spoken language
Communications of the ACM
Communications of the ACM
Automatic extraction and description of human gait models for recognition purposes
Computer Vision and Image Understanding
Seeding without leading: making space for participant contribution in design elicitation techniques
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 2
Mobile Technology for Children: Designing for Interaction and Learning
Mobile Technology for Children: Designing for Interaction and Learning
Biometrics in Practice: What Does HCI Have to Say?
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
ePet: when cellular phone learns to recognize its owner
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Considering context, content, management, and engagement in design activities with children
Proceedings of the 9th International Conference on Interaction Design and Children
Invisible design: exploring insights and ideas through ambiguous film scenarios
Proceedings of the Designing Interactive Systems Conference
Hi-index | 0.00 |
A well-known security and identification problem involves the creation of secure but usable identification and authentication tools that the user is fully motivated to adopt. We describe an innovative solution to this problem: The Biometric Daemon, which takes its inspiration from two sources. It is firstly conceived as a biometric device which is initially imprinted with the fixed biometric properties of its owner, and is then regularly updated with the fluid biometric properties of its owner. However it also acts as an electronic pet which (i) part-shares identity with its owner, (ii) needs nurturing and (iii) effectively dies when separated from its owner for any length of time. Our proposal was inspired by the literary daemons described by Philip Pullman. Our Biometric Daemon synthesizes the properties of biometric token and daemon and we argue that it offers the basis for secure, usable and engaging identification and authentication.