IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

Similar documents
IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

7,, i

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

Computer Security Symposium October 2013 Android OS kub

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

IT,, i

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

3_23.dvi

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

58 10

Web Basic Web SAS-2 Web SAS-2 i

Web Web Web Web i

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Vol.11-HCI-15 No. 11//1 Xangle 5 Xangle 7. 5 Ubi-WA Finger-Mount 9 Digitrack 11 1 Fig. 1 Pointing operations with our method Xangle Xa

IPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki

900 GPS GPS DGPS Differential GPS RTK-GPS Real Time Kinematic GPS 2) DGPS RTK-GPS GPS GPS Wi-Fi 3) RFID 4) M-CubITS 5) Wi-Fi PSP PlayStation Portable

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

28 Horizontal angle correction using straight line detection in an equirectangular image

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

21 Key Exchange method for portable terminal with direct input by user

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

日本感性工学会論文誌

1 1 tf-idf tf-idf i

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of


Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

1_26.dvi

12) NP 2 MCI MCI 1 START Simple Triage And Rapid Treatment 3) START MCI c 2010 Information Processing Society of Japan

<95DB8C9288E397C389C88A E696E6462>

IPSJ SIG Technical Report Vol.2014-CDS-10 No /5/ Intuitive appliance control method based on high-accurate indoor localization system

A comparative study of the team strengths calculated by mathematical and statistical methods and points and winning rate of the Tokyo Big6 Baseball Le

. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr

Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science,

202

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

2017 (413812)


Web Web Web Web Web, i

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

IPSJ SIG Technical Report An Evaluation Method for the Degree of Strain of an Action Scene Mao Kuroda, 1 Takeshi Takai 1 and Takashi Matsuyama 1

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

[2] , [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

untitled

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

MDD PBL ET 9) 2) ET ET 2.2 2), 1 2 5) MDD PBL PBL MDD MDD MDD 10) MDD Executable UML 11) Executable UML MDD Executable UML

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

.N..

1,a) 1,b) TUBSTAP TUBSTAP Offering New Benchmark Maps for Turn Based Strategy Game Tomihiro Kimura 1,a) Kokolo Ikeda 1,b) Abstract: Tsume-shogi and Ts

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

log F0 意識 しゃべり 葉の log F0 Fig. 1 1 An example of classification of substyles of rap. ' & 2. 4) m.o.v.e 5) motsu motsu (1) (2) (3) (4) (1) (2) mot

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

Mimehand II[1] [2] 1 Suzuki [3] [3] [4] (1) (2) 1 [5] (3) 50 (4) 指文字, 3% (25 個 ) 漢字手話 + 指文字, 10% (80 個 ) 漢字手話, 43% (357 個 ) 地名 漢字手話 + 指文字, 21

29 jjencode JavaScript

(2003)

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns

( )

ネットワーク化するデジタル情報家電の動向

013858,繊維学会誌ファイバー1月/報文-02-古金谷

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-GI-34 No /7/ % Selections of Discarding Mahjong Piece Using Neural Network Matsui


fiš„v8.dvi

DEIM Forum 2009 E

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori


<303288C991BD946797C797592E696E6464>

untitled

,,.,.,,.,.,.,.,,.,..,,,, i

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

Eclipse A Tool Support to Merge Similer Methods with Differences Akira Goto 1 Norihiro Yoshida 2 Masakazu Ioka 1 Katsuro Inoue 1 Abstra

23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones

1034 IME Web API Web API 1 IME Fig. 1 Suitable situations for context-aware IME. IME IME IME IME 1 GPS Web API Web API Web API Web )


<30315F836D815B83675F95D08BCB8E812E696E6464>

Transcription:

1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu Okazaki 1 Abstract: Some authentication methods that lock and unlock the screen are widely used in order to prevent from information be stolen. However, there is no method suitable for mobile terminals that have both shoulder-surfing resistant and high usability. Secret Tap method uses icon and tap input and has high shoulder-surfing resistant. However, in order to have sufficiently low probability for breaking the authentication by accident, it needs many times of tap input in an authentication. In this paper we propose a new authentication method called Secret Flick method that extends the Secret Tap method with flick input. The proposed method achieves high usability by less number of inputs. Keywords: mobile terminals, shoulder-surfing attack, personal authentication 1. Android PIN(Personal Identification Number) 1 Uniersity of Miyazaki 2 Uniersity of Miyazaki 3 Kanagawa Institute of Technology c 2012 Information Processing Society of Japan 1

Secret Tap [1] 1 Secret Tap Secret Flick 2. 2.1...... 2.2.. 1 3. 3.1 Android Password Pattern [2] 4 3.2 Convex Hull Click Scheme(CHC)[3] 3.3 Secret Tap [1] c 2012 Information Processing Society of Japan 2

1 4 4. 2 2 4, 1 4,,., 1,,...,.,,,.,. Secret Tap 1 1/4,10 PIN 4 7. PIN Android password patturn.,,. 2 1.. 1 Secret Tap 16 4 1 1 Secret Tap [1] Fig. 1 Authentication screen of Secret Tap 4. 4.1 Secret Tap,., Secret Tap 1 Secret Tap 3.3 PIN Secret Tap Secret Flick 4.2 (1) (2). c 2012 Information Processing Society of Japan 3

.. (3) 10 PIN4. ATM 10 PIN4. brute-force (4) PIN4 4 4.0. 4.3 Secret Flick 2 2 +1. 3 +1 3 1 4 1 1 Secret Tap 1/4 1/20 10 PIN4 7 4 3.3 1 2 Secret Flick Fig. 2 Schematic diagram of the authentication screen of Secret Flick 5. 5.1 Java Android SDK Eclipse Android 5.2 Secret Flick Secret Tap 6. 6.1 Secret Tap 10 PIN4 1 10 4 PIN c 2012 Information Processing Society of Japan 4

1 Table 1 Comparison of proposed methods and existing methods for the probability of success by accident 3 4 5 Secret Tap 1/64 1/256 1/1024 Secret Flick 1/8000 1/160000 1/320000 10 PIN 1/1000 1/10000 10 5 6 7 n Secret Tap 1/4096 1/16384 4 n Secret Flick 1/16400000 1/128000000 20 n 10 PIN 10 6 10 7 10 n 3 Secret Flick Fig. 3 Authentication screen of Secret Flick 1 1 4 Secret Flick Fig. 4 Password icon setting screen of Secret Flick n Secret Tap 1/4 n Secret Flick 1/20 n Secret Tap 7 1/16384 4 10 PIN 7 Secret Flick 3 1/8000, 10 PIN PIN 4 1/160000 4 10 PIN 4 10 PIN 6.2 11 10 2 1 4.5% 6.3 Secret Tap SD(Semantic Differential) ( ) SD 2 Table 2 2 Measurment items and scores on the impression of each method Table 3 3 1 5 1 5 1 5 1 5 1 5 1 5 SD Results of the questionnaire using semantic differential method () () Secret Tap 4.1(0.8) 4.2(0.4) 3.8(1.0) 4.5(0.7) 2.7(1.1) 4.3(0.7) 4.4(0.9) Secret Flick 4.3(0.9) 3.7(0.9) 3.3(1.1) 4.6(0.7) 4.7(0.5) 4.2(0.8) 3.8(0.4) SD 3 Secret Tap Secret Flick c 2012 Information Processing Society of Japan 5

Secret Flick Secret Tap Secret Flick Secret Tap Secret Tap 4.4 Secret Flick 3.8 Secret Tap Secret Flick Secret Flick Secret Tap PIN Secret Flick 11 9 Secret Flick 7. Secret Flick [1],,,,,,, (DICOMO2012), pp.2402-2409(2012). [2] Google Android-open source project http://sourve.android.com/ [3] S.Wiedenbeck J.Waters L.Sobrado and J.Birget, Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme in International Working Conference on Advanced Visual Interfaces(AVI) May 2006. c 2012 Information Processing Society of Japan 6