skip to main content
10.1145/1029632.1029658acmconferencesArticle/Chapter ViewAbstractPublication PagesuistConference Proceedingsconference-collections
Article

A gesture-based authentication scheme for untrusted public terminals

Published: 24 October 2004 Publication History

Abstract

Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based authentication mechanism for mobile devices that relies on physical possession instead of knowledge to setup the initial connection to a public terminal. Our solution provides a simple mechanism for shaking a device to authenticate with the public infrastructure, making few assumptions about the surrounding infrastructure while also maintaining a reasonable level of security.

References

[1]
Corner, M. and B. Noble. Zero-interaction authentication. MobiCom 2002. September 2002.
[2]
Fishkin K. P., Kurt Partridge, and Saurav Chatterjee. Wireless User Interface Components for Personal Area Networks. IEEE Pervasive Computing Magazine, October-December 2002. p. 49--55.
[3]
Hinckley, K. Synchronous Gestures for Multiple Users and Computers. In Proceedings of ACM UIST 2003, p. 149--158. Vancouver, Canada, November 2003.
[4]
Holmquist, L. E., F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen. SmartIts Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In Proceeding of Ubicomp 2001, p. 116--122. Atlanta, USA, September 2001.
[5]
Myers, B., R. Miller, J. Nichols, et al. Using Hand-Held Devices and PCs Together. Communications of the ACM, v44 n11, November 2001, pages 34--41.
[6]
Pering T., Murali Sundar, John Light, Roy Want. Photographic Authentication through Untrusted Terminals. IEEE Pervasive Computing: Mobile and Ubiquitous Systems. October 2002. p. 30--36.
[7]
Pierce, J. S., and Heather E. Mahaney. Opportunistic Annexing for Handheld Devices: Opportunities and Challenges. In Proceedings of HCIC 2004, Fraser, CO.
[8]
Rekimoto, J., Yuji Ayatsuka and Michimune Kohno, SyncTap: An Interaction Technique for Mobile Networking. In Proceeding of MOBILE HCI 2003, Udine, Italy, September 2003.
[9]
Want, R., Trevor Pering, Gunner Danneels, Muthu Kumar, Murali Sundar, John Light: The Personal Server: Changing the Way We Think about Ubiquitous Computing. Ubicomp 2002. p. 194--209.

Cited By

View all
  • (2023)UnifiedSense: Enabling Without-Device Gesture Interactions Using Over-the-shoulder Training Between Redundant Wearable SensorsProceedings of the ACM on Human-Computer Interaction10.1145/36042777:MHCI(1-25)Online publication date: 13-Sep-2023
  • (2022)Stay Home! Conducting Remote Usability Evaluations of Novel Real-World Authentication Systems Using Virtual RealityProceedings of the 2022 International Conference on Advanced Visual Interfaces10.1145/3531073.3531087(1-9)Online publication date: 6-Jun-2022
  • (2022)The Feet in Human-Centred Security: Investigating Foot-Based User Authentication for Public DisplaysExtended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491101.3519838(1-9)Online publication date: 27-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UIST '04: Proceedings of the 17th annual ACM symposium on User interface software and technology
October 2004
312 pages
ISBN:1581139578
DOI:10.1145/1029632
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. interaction with gestures
  2. mobile phone
  3. sensors

Qualifiers

  • Article

Conference

UIST04

Acceptance Rates

Overall Acceptance Rate 561 of 2,567 submissions, 22%

Upcoming Conference

UIST '25
The 38th Annual ACM Symposium on User Interface Software and Technology
September 28 - October 1, 2025
Busan , Republic of Korea

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)UnifiedSense: Enabling Without-Device Gesture Interactions Using Over-the-shoulder Training Between Redundant Wearable SensorsProceedings of the ACM on Human-Computer Interaction10.1145/36042777:MHCI(1-25)Online publication date: 13-Sep-2023
  • (2022)Stay Home! Conducting Remote Usability Evaluations of Novel Real-World Authentication Systems Using Virtual RealityProceedings of the 2022 International Conference on Advanced Visual Interfaces10.1145/3531073.3531087(1-9)Online publication date: 6-Jun-2022
  • (2022)The Feet in Human-Centred Security: Investigating Foot-Based User Authentication for Public DisplaysExtended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491101.3519838(1-9)Online publication date: 27-Apr-2022
  • (2021)User Authentication via Electrical Muscle StimulationProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445441(1-15)Online publication date: 6-May-2021
  • (2020)A Security Approach to Build a Trustworthy Ubiquitous Learning System2020 IEEE Bangalore Humanitarian Technology Conference (B-HTC)10.1109/B-HTC50970.2020.9298010(1-6)Online publication date: 8-Oct-2020
  • (2020)Multimodal Continuous Authentication Based on Match Level FusionThe 10th International Conference on Computer Engineering and Networks10.1007/978-981-15-8462-6_105(908-914)Online publication date: 6-Oct-2020
  • (2020)A Report on Behavior-Based Implicit Continuous Biometric Authentication for Smart PhoneApplied Computer Vision and Image Processing10.1007/978-981-15-4029-5_17(169-184)Online publication date: 29-Jul-2020
  • (2019)Developing a New Haptic Passcode for User Authentication with a Personal ID Tag to Prevent Copying AttacksApplied Sciences10.3390/app92455209:24(5520)Online publication date: 15-Dec-2019
  • (2019)WattomProceedings of the Thirteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3294109.3295642(307-313)Online publication date: 17-Mar-2019
  • (2019)Wattom: Ambient Eco-feedback with Mid-air Input2019 5th Experiment International Conference (exp.at'19)10.1109/EXPAT.2019.8876565(12-15)Online publication date: Jun-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media