DiamondTouch: a multi-user touch technology
Proceedings of the 14th annual ACM symposium on User interface software and technology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Examining the content and privacy of web browsing incidental information
Proceedings of the 15th international conference on World Wide Web
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
EURASIP Journal on Advances in Signal Processing
Can i borrow your phone?: understanding concerns when sharing mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
User evaluation of lightweight user authentication with a single tri-axis accelerometer
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Experiments with Simple Iris Recognition for Mobile Phones
ITNG '10 Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations
The IR ring: authenticating users' touches on a multi-touch display
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
Testing metrics for password creation policies by attacking large sets of revealed passwords
Proceedings of the 17th ACM conference on Computer and communications security
Analysis of pattern recognition techniques for in-air signature biometrics
Pattern Recognition
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
On the need for different security methods on mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Vulnerabilities in biometric encryption systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Mobile token-based authentication on a budget
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Touché: enhancing touch interaction on humans, screens, liquids, and everyday objects
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SilentSense: silent user identification via touch and movement behavioral biometrics
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve datarates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.