skip to main content
10.1145/2493190.2494435acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
poster

A tap and gesture hybrid method for authenticating smartphone users

Published: 27 August 2013 Publication History

Abstract

This paper presents a new tap and gesture hybrid method for authenticating mobile device users. The new technique augments four simple gestures - up, down, left, and right, to the dominant digit lock technique, allowing users to either tap or perform any one of the four gestures on the digit keys. It offers in total 6250000 unique four-symbol password combinations, which is substantially more than the conventional techniques. Results of a pilot study showed that the new technique was slower and more error prone than the digit lock technique. However, we believe with practice it could get faster and more accurate. Also, most users were comfortable and all of them felt more secured while using the new technique.

References

[1]
Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc.WOOT '10. USENIX (2010), 1--7.
[2]
Biddle, R., Mannan, M., Van Oorschot, P. C., and Whalen, T. User study, analysis, and usable security of passwords based on digital objects. Trans. Info. For. Sec. 6, 3 (2011), 970--979.
[3]
Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P. C. User interface design affects security: patterns in click-based graphical passwords. Int. J. Inf. Security 8, 6 (2009), 387--398.
[4]
Clarke, N. L. and Furnell, S. M. Advanced user authentication for mobile devices. Computers & Security 26, 2 (2007), 109--119.
[5]
Davies, D. W. and Price, W. L. Security for Computer Networks. John Wiley & Sons, Inc., 1989.
[6]
Dhamija, R. and Perrig, A. Déjà Vu: a user study using images for authentication. In Proc. SSYM '00. USENIX (2000), 4--4.
[7]
Jakobsson, M. and Akavipat, R. Rethinking passwords to adapt to constrained keyboards. In MoST Workshop '12. IEEE (2012).
[8]
Jakobsson, M., Shi, E, Golle, P., and Chow, R. Implicit authentication for mobile devices. In Proc. HotSec '09. USENIX (2009), 9--9.
[9]
Jansen, W. Authenticating mobile device users through image selection. Data Security, 2004.
[10]
Kim, I. Keypad against brute force attacks on smartphones. IET Information Security 6, 2 (2012), 71--76.
[11]
Mannan, M. and Van Oorschot, P. C. Passwords for both mobile and desktop computers: ObPwd for Firefox and Android. USENIX 37, 4 (2012), 28--37.
[12]
Nazir, I., Zubair, I., and Islam, M. H., User authentication for mobile device through image selection. In Proc. NDT '09. IEEE (2009), 518--520.
[13]
Nielsen Holdings. Two thirds of new mobile buyers now opting for smartphones. http://shar.es/xfZvs.
[14]
Raguram, R., White, A. M., Goswami, D., Monrose, F., and Frahm, J.-M. iSpy: Automatic reconstruction of typed input from compromising reflections. In Proc. CCS '11. ACM (2011), 527--536.
[15]
Skillen, A. and Mannan, M. Myphrase: Passwords from your own words. Spectrum, Concordia University, Montreal, Quebec, Canada, 2013.
[16]
Zhai, S. and Kristensson, P.-O. Shorthand writing on stylus keyboard. In Proc. CHI '03. ACM (2003), 97--104.
[17]
Zheng, Z., Liu, X., Yin, L., and Liu, Z. A stroke-based textual password authentication scheme. In Proc. ETCS '09. IEEE (2009), 90--95.

Cited By

View all
  • (2024)Take a Seat, Make a Gesture: Charting User Preferences for On-Chair and From-Chair Gesture InputProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642028(1-17)Online publication date: 11-May-2024
  • (2023)Squeez’In: Private Authentication on Smartphones based on Squeezing GesturesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581419(1-15)Online publication date: 19-Apr-2023
  • (2021)Simple Screen Locking Method Using Randomly Generated Number Grid on ImageResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch012(223-246)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. A tap and gesture hybrid method for authenticating smartphone users

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobileHCI '13: Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
      August 2013
      662 pages
      ISBN:9781450322737
      DOI:10.1145/2493190
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 August 2013

      Check for updates

      Author Tags

      1. authentication
      2. gesture
      3. hybrid
      4. mobile
      5. pin
      6. security

      Qualifiers

      • Poster

      Conference

      MobileHCI '13
      Sponsor:

      Acceptance Rates

      MobileHCI '13 Paper Acceptance Rate 53 of 238 submissions, 22%;
      Overall Acceptance Rate 202 of 906 submissions, 22%

      Upcoming Conference

      MobileHCI '25
      27th International Conference on Mobile Human-Computer Interaction
      September 22 - 26, 2025
      Sharm El-Sheikh , Egypt

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Take a Seat, Make a Gesture: Charting User Preferences for On-Chair and From-Chair Gesture InputProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642028(1-17)Online publication date: 11-May-2024
      • (2023)Squeez’In: Private Authentication on Smartphones based on Squeezing GesturesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581419(1-15)Online publication date: 19-Apr-2023
      • (2021)Simple Screen Locking Method Using Randomly Generated Number Grid on ImageResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch012(223-246)Online publication date: 2021
      • (2020)Enabling Predictive Number Entry and Editing on Touchscreen-Based Mobile DevicesProceedings of the 2020 Conference on Human Information Interaction and Retrieval10.1145/3343413.3377957(13-22)Online publication date: 14-Mar-2020
      • (2020)Woodpecker: Secret Back-of-Device Tap Rhythms to Authenticate Mobile Users2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC42975.2020.9283239(2727-2733)Online publication date: 11-Oct-2020
      • (2018)Simple Screen Locking Method Using Randomly Generated Number Grid on ImageInternational Journal of Mobile Human Computer Interaction10.4018/IJMHCI.201810010310:4(42-71)Online publication date: 1-Oct-2018
      • (2018)Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural NetworksFuture Internet10.3390/fi1002001710:2(17)Online publication date: 5-Feb-2018
      • (2017)NomadiKey: User authentication for smart devices based on nomadic keysInternational Journal of Network Management10.1002/nem.199828:1Online publication date: 31-Aug-2017
      • (2016)Spin-lock gesture authentication for mobile devicesProceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct10.1145/2957265.2961863(775-782)Online publication date: 6-Sep-2016
      • (2016)NomadiKey: User authentication for smart devices based on nomadic keys2016 IEEE International Conference on Communications (ICC)10.1109/ICC.2016.7511425(1-6)Online publication date: May-2016
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media