skip to main content
10.1145/1866029.1866071acmconferencesArticle/Chapter ViewAbstractPublication PagesuistConference Proceedingsconference-collections
research-article

The IR ring: authenticating users' touches on a multi-touch display

Published: 03 October 2010 Publication History

Abstract

Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead to loss of data confidentiality and integrity. For example, one user can open or alter files of a second user, or impersonate the second user, while the second user is absent or not looking. Towards preventing these attacks, we explore means to associate the touches of a user with the user's identity in a fashion that is cryptographically sound as well as easy to use. We describe our current solution, which relies on a ring-like device that transmits a continuous pseudorandom bit sequence in the form of infrared light pulses. The multi-touch display receives and localizes the sequence, and verifies its authenticity. Each sequence is bound to a particular user, and all touches in the direct vicinity of the location of the sequence on the display are associated with that user.

Supplementary Material

JPG File (tn373-roth.jpg)
MPEG File (tn373-roth.mpeg)

References

[1]
}}A. Ageev. Manchester decoder and clock recovery module for FPGA prototype of active RFID tag. Technical report, Berkeley Wireless Research Center, UC Berkeley, Dec. 2009.
[2]
}}D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In NDSS, 2002.
[3]
}}M. D. Corner. Transient Authentication for Mobile Devices. Ph.D. thesis, University of Michigan, Aug. 2003.
[4]
}}P. H. Dietz and D. Leigh. DiamondTouch: a multi-user touch technology. In UIST, pages 219--226, 2001.
[5]
}}C. Holz and P. Baudisch. The generalized perceived input point model and how to double touch accuracy by extracting fingerprints. In CHI. ACM, 2010.
[6]
}}J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.
[7]
}}A. Olwal and A. D. Wilson. SurfaceFusion: unobtrusive tracking of everyday objects in tangible user interfaces. In Graphics Interface, pages 235--242, 2008.
[8]
}}J. Schöning, M. Rohs, and A. Krüger. Using mobile phones to spontaneously authenticate and interact with multi-touch surfaces. In Proc. Workshop on Designing Multi-Touch Interaction Techniques for Coupled Public and Private Displays, Naples, Italy, May 2008.
[9]
}}C. E. Shannon.Communication in the presence of noise. Proc. IRE, 37(1):10--21, Jan. 1949.
[10]
}}A. Sugiuraand and Y. Koseki. A user interface using finger-print recognition: holding commands and data objects on fingers. In UIST, pages 71--79. ACM, 1998.
[11]
}}A. Wilson and S. Shafer. XWand: UI for intelligent spaces. In CHI, pages 545--552. ACM, 2003.

Cited By

View all
  • (2024)EM-Rhythm: An Authentication Method for Heterogeneous IoT DevicesACM Transactions on Sensor Networks10.1145/3700441Online publication date: 16-Oct-2024
  • (2024)TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM EmanationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.341499223:12(12587-12602)Online publication date: Dec-2024
  • (2023)MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist WearablesIEEE Transactions on Mobile Computing10.1109/TMC.2021.307259822:1(311-327)Online publication date: 1-Jan-2023
  • Show More Cited By

Index Terms

  1. The IR ring: authenticating users' touches on a multi-touch display

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    UIST '10: Proceedings of the 23nd annual ACM symposium on User interface software and technology
    October 2010
    476 pages
    ISBN:9781450302715
    DOI:10.1145/1866029
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. multi-touch

    Qualifiers

    • Research-article

    Conference

    UIST '10

    Acceptance Rates

    Overall Acceptance Rate 561 of 2,567 submissions, 22%

    Upcoming Conference

    UIST '25
    The 38th Annual ACM Symposium on User Interface Software and Technology
    September 28 - October 1, 2025
    Busan , Republic of Korea

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)EM-Rhythm: An Authentication Method for Heterogeneous IoT DevicesACM Transactions on Sensor Networks10.1145/3700441Online publication date: 16-Oct-2024
    • (2024)TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM EmanationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.341499223:12(12587-12602)Online publication date: Dec-2024
    • (2023)MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist WearablesIEEE Transactions on Mobile Computing10.1109/TMC.2021.307259822:1(311-327)Online publication date: 1-Jan-2023
    • (2019)WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables2019 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2019.8802715(28-36)Online publication date: Jun-2019
    • (2018)Spatio-Temporal Analysis of Urban Acoustic Environments with Binaural Psycho-Acoustical Considerations for IoT-Based ApplicationsSensors10.3390/s1803069018:3(690)Online publication date: 26-Feb-2018
    • (2018)Body-Guided CommunicationsProceedings of the 24th Annual International Conference on Mobile Computing and Networking10.1145/3241539.3241550(353-368)Online publication date: 15-Oct-2018
    • (2018)Interaction for Immersive AnalyticsImmersive Analytics10.1007/978-3-030-01388-2_4(95-138)Online publication date: 16-Oct-2018
    • (2017)A Unified Model for User Identification on Multi-Touch Surfaces: A Survey and Meta-AnalysisACM Transactions on Computer-Human Interaction10.1145/314456924:6(1-39)Online publication date: 19-Dec-2017
    • (2017)An Offensive and Defensive Exposition of Wearable ComputingACM Computing Surveys10.1145/313383750:6(1-39)Online publication date: 22-Nov-2017
    • (2017)TUIOFXProceedings of the ACM on Human-Computer Interaction10.1145/30958121:EICS(1-18)Online publication date: 30-Jun-2017
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media