Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010
DOI: 10.1145/1753326.1753488
|View full text |Cite
|
Sign up to set email alerts
|

The secure haptic keypad

Abstract: Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is through an observation attack, either using a camera or through direct observation (e.g. shoulder-surfing). This paper addresses this problem by presenting the design and implementation of a novel input keypad which uses tactile cues as means to compose a password. In this system, passwords are encoded as a sequence of randomized vibratio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…We used a NASA TLX questionnaire to evaluated the perceived workload. We opted for NASA TLX because of its demonstrated reliability in measuring perceived workload when using novel authentication schemes, and for comparability with previous work [9,10]. We ran multiple repeated measures ANOVA tests to investigate if there is an effect of the modality on the perceived workload.…”
Section: Perceived Workloadmentioning
confidence: 99%
See 1 more Smart Citation
“…We used a NASA TLX questionnaire to evaluated the perceived workload. We opted for NASA TLX because of its demonstrated reliability in measuring perceived workload when using novel authentication schemes, and for comparability with previous work [9,10]. We ran multiple repeated measures ANOVA tests to investigate if there is an effect of the modality on the perceived workload.…”
Section: Perceived Workloadmentioning
confidence: 99%
“…Participants were reserved towards the social acceptability of mid-air gestures. They frequently described the method as too overt (7) and awkward (9). Gaze was perceived to be very secure and discrete, but was also criticized for being slow.…”
Section: Qualitative Analysismentioning
confidence: 99%
“…In the PIN authentication methods, since they are not secure from the shoulder-surfing attacks, the recording attacks, and the smudge attacks, recently some PIN input techniques [1][2][3][4][5][6][7] have been proposed using non-visual channel such as sound channel or vibration channel to resist those attacks. We introduce a PIN input method, The Phone Lock [7], proposed by Bianchi et al as the related research of ours.…”
Section: Related Researchmentioning
confidence: 99%
“…To countermeasure shoulder-surfing attacks, recording attacks, and smudge attacks, various PIN input techniques [1][2][3][4][5][6][7][8][9][10] are proposed. This paper proposes a new simple PIN input technique (SPIT) that resists effectively those attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Secure Haptic Keypad [17] and Phone Lock [18] both used haptic based approach and [19] used mobile device screen for authentication. By using haptic input as PIN, typical observation attacks via person or camera, shouldersurfing, and guessing based on smudging on display, are all avoided.…”
Section: Authenticationmentioning
confidence: 99%