Abstract
In conventional smart phones and ATMs, a four-digit passcode is entered into a keypad, and the user confirms whether the passcode matches the keypad. However, there is a risk that a third party can easily steal the password by watching the code entry or analyzing the position of fingerprints left on the keypad. There are other solutions, such as biometric authentication or the use of special displays, but both of them are costly and difficult to implement. In this study, we propose a keypad that does not leave fingerprints on the screen, is low cost, and can be used to input passcodes without worry, even if someone is standing next to it. The proposed keypad uses cursors that are moved by directional keys to select numbers, making fingerprint analysis difficult. Because attackers do not know the color that the user has selected, they cannot know which cursor the user is moving. To verify the safety and convenience of this system, we conducted experiments on subjects in their 20 s and 50 s. The results showed that the average difference in authentication time from the conventional method was about 5 s, and the method was generally convenient. We conclude that our keypad system is secure, because no peeping attacks on a subject were successful in guessing the subject’s passcode.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Hongchun Qu, Linsheng He (2020) “An anti-peep passcode keypad based on hybrid image and fuzzy adaptive visual distance adjustment,” Chongquing University of posts and Telecommunications, IOP Conference Series: Materials Science and Engineering
Owada H, Kamitai D, Inoue C, Okamoto M (2019) A secret information input method using a sight input device. Proceedings of the Future Technologies Confference, pp. 936-943, February
Takeda Tetsuji (2008) fakePointer: a user authentication scheme that makes peeping attack with a video camera hard. IPSJ J. 49(9):3051–3061 (In Japanese)
Hara D, Sakurai K (2020) Current status and issues related to vulnerabilities of two-factor authentication (in Japanese). IPSJ SIG Technical Report. https://www.ipsj-kyushu.jp/page/ronbun/hinokuni/1009/Papers/B3-5.pdf. Accessed 28 Apr 2023
Thakare SV, Gore DV (2013) 3D security cloud computing using graphical password. Int J Adv Res Comput Commun Eng 2(1):945–949
Tanaka Ryosuke, Kashima Masayuki, Sato Kiminori, Watanabe Mutsumi (2015) The development of PIN code input system strong to multiple shoulder hacking. ITE Tech Rep 39(43):35–38 (In Japanese)
Ho PF, Kam YH-S, Wee MC, Chong YN, Por LY (2014) Preventing shoulder-surfing attack with the concept of concealing the password objects information. Sci World J 2014:12
Sauro J (2011) February 3, Measuring Usability with the System Usability Scale (SUS). https://measuringu.com/sus/ Accessed 03 Dec 2021
https://marketing-sphere.blogspot.com/2014/05/sussystem-usability-scale.html. Accessed 10 Dec 2021 (In Japanese)
Acknowledgements
This work was supported by JSPS KAKENHI Grant Numbers JP21K11849, JP22K12013, and JP20K11812.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
This work was presented in part at the joint symposium of the 27th International Symposium on Artificial Life and Robotics, the 7th International Symposium on BioComplexity, and the 5th International Symposium on Swarm Behavior and Bio-Inspired Robotics (Online, January 25–27, 2022).
About this article
Cite this article
Masuzawa, R., Aburada, K., Yamaba, H. et al. Development of keypads which use colors or shapes to prevent shoulder surfing. Artif Life Robotics 28, 710–717 (2023). https://doi.org/10.1007/s10015-023-00890-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10015-023-00890-y