Password Memorability and Security: Empirical Results
IEEE Security and Privacy
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
TwoKind authentication: protecting private information in untrustworthy environments
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Hi-index | 0.00 |
We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless authentication can offer a convenient and secure alternative to PIN-based unlocking.