[go: up one dir, main page]

Islam et al., 2018 - Google Patents

Glasspass: Tapping gestures to unlock smart glasses

Islam et al., 2018

View PDF
Document ID
18411960974108276747
Author
Islam M
Lee D
Jahan L
Oakley I
Publication year
Publication venue
Proceedings of the 9th Augmented Human International Conference

External Links

Snippet

Wearable technologies such as smart-glasses can sense, store and display sensitive personal contents. In order to protect this data, users need to securely authenticate to their devices. However, current authentication techniques, such as passwords or PINs, are a poor …
Continue reading at www.whereveriam.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G02OPTICS
    • G02FDEVICES OR ARRANGEMENTS, THE OPTICAL OPERATION OF WHICH IS MODIFIED BY CHANGING THE OPTICAL PROPERTIES OF THE MEDIUM OF THE DEVICES OR ARRANGEMENTS FOR THE CONTROL OF THE INTENSITY, COLOUR, PHASE, POLARISATION OR DIRECTION OF LIGHT, e.g. SWITCHING, GATING, MODULATING OR DEMODULATING; TECHNIQUES OR PROCEDURES FOR THE OPERATION THEREOF; FREQUENCY-CHANGING; NON-LINEAR OPTICS; OPTICAL LOGIC ELEMENTS; OPTICAL ANALOGUE/DIGITAL CONVERTERS
    • G02F1/00Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics
    • G02F1/01Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour
    • G02F1/13Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating, or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on liquid crystals, e.g. single liquid crystal display cells
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Abdrabou et al. Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication
Schaub et al. Password entry usability and shoulder surfing susceptibility on different smartphone platforms
Song et al. Multi-touch authentication using hand geometry and behavioral information
Ellavarason et al. Touch-dynamics based behavioural biometrics on mobile devices–a review from a usability and performance perspective
Islam et al. Glasspass: Tapping gestures to unlock smart glasses
Buschek et al. Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices
Khamis et al. Cueauth: Comparing touch, mid-air gestures, and gaze for cue-based authentication on situated displays
Aumi et al. Airauth: evaluating in-air hand gestures for authentication
Crawford et al. Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics
Yadav et al. Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass
Khan et al. Augmented reality-based mimicry attacks on behaviour-based smartphone authentication
US20080235788A1 (en) Haptic-based graphical password
Guo et al. Capauth: Identifying and differentiating user handprints on commodity capacitive touchscreens
Gil et al. TriTap: identifying finger touches on smartwatches
Rajanna et al. A gaze gesture-based user authentication system to counter shoulder-surfing attacks
Maqsood et al. Bend Passwords: using gestures to authenticate on flexible devices
Buschek et al. Evaluating the influence of targets and hand postures on touch-based behavioural biometrics
Oakley et al. The personal identification chord: A four buttonauthentication system for smartwatches
Alariki et al. TOUCH GESTURE AUTHENTICATION FRAMEWORK FOR TOUCH SCREEN MOBILE DEVICES.
Hsiu et al. ForceBoard: Using force as input technique on size-limited soft keyboard
Dhandapani et al. HapticLock: Eyes-free authentication for mobile devices
Tung et al. RainCheck: overcoming capacitive interference caused by rainwater on smartphones
Yang Development Status and Prospects of Graphical Password Authentication System in Korea.
Kumar et al. PassWalk: Spatial authentication leveraging lateral shift and gaze on mobile headsets
Ritter et al. Miba: Multitouch image-based authentication on smartphones