Your Phone Knows You: Almost Transparent Authentication for Smartphones

Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed
{"title":"Your Phone Knows You: Almost Transparent Authentication for Smartphones","authors":"Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed","doi":"10.1109/COMPSAC.2014.60","DOIUrl":null,"url":null,"abstract":"With the advent of ever more powerful smart phones, having bigger touch screens and a large assortment of exciting applications accessible through online app stores, people are using their phones to meet various ends, even critical tasks, like: mobile banking and mobile health-care, are being performed using smart phones. Although security of smart phones is vital, application-level security - in the form of end-user authentication - is often the only security mechanism that users adopt. We propose a transparent and adaptive authentication framework for smart phones that is built around the biological metaphor of how a pet recognizes its owner. Our proposed framework rids the user from remembering a strong secret and from inputting the secret via smart phone's small keypad time and again, while the pet metaphor helps assuage possible psychological issues related to the covert nature of the authentication method. We implemented a subset of our proposed framework on the Android platform and through data obtained from users, we show that the proposed framework has the potential to become effective, efficient, and popular.","PeriodicalId":106871,"journal":{"name":"2014 IEEE 38th Annual Computer Software and Applications Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 38th Annual Computer Software and Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC.2014.60","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

With the advent of ever more powerful smart phones, having bigger touch screens and a large assortment of exciting applications accessible through online app stores, people are using their phones to meet various ends, even critical tasks, like: mobile banking and mobile health-care, are being performed using smart phones. Although security of smart phones is vital, application-level security - in the form of end-user authentication - is often the only security mechanism that users adopt. We propose a transparent and adaptive authentication framework for smart phones that is built around the biological metaphor of how a pet recognizes its owner. Our proposed framework rids the user from remembering a strong secret and from inputting the secret via smart phone's small keypad time and again, while the pet metaphor helps assuage possible psychological issues related to the covert nature of the authentication method. We implemented a subset of our proposed framework on the Android platform and through data obtained from users, we show that the proposed framework has the potential to become effective, efficient, and popular.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
你的手机知道你:智能手机几乎透明的身份验证
随着功能越来越强大的智能手机的出现,更大的触摸屏和各种各样的令人兴奋的应用程序可以通过在线应用程序商店访问,人们正在使用他们的手机来满足各种各样的目的,甚至关键的任务,如:移动银行和移动医疗保健,正在使用智能手机执行。尽管智能手机的安全性至关重要,但应用程序级别的安全性(以最终用户身份验证的形式)通常是用户采用的唯一安全机制。我们提出了一个透明的、自适应的智能手机认证框架,该框架是围绕宠物如何识别其主人的生物学隐喻构建的。我们提出的框架使用户不必记住强密码,也不必一次又一次地通过智能手机的小键盘输入密码,而宠物隐喻有助于缓解与身份验证方法的隐秘性相关的可能的心理问题。我们在Android平台上实现了我们提出的框架的一个子集,通过从用户那里获得的数据,我们表明我们提出的框架有潜力变得有效、高效和流行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Power-Saving Mechanism for IEEE 802.11 Clients in a Multicast Multimedia Streaming Network Empirically Based Evolution of a Variability Management Approach at UML Class Level CrowdAdaptor: A Crowd Sourcing Approach toward Adaptive Energy-Efficient Configurations of Virtual Machines Hosting Mobile Applications A Distributed Topic-Based Pub/Sub Method for Exhaust Data Streams towards Scalable Event-Driven Systems Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1