基于触摸的安全验证方式
文章来源:未知 文章作者:enread 发布时间:2014-04-08 05:12 字体: [ ]  进入论坛
(单词翻译:双击或拖选)
Passwords, gestures and fingerprint1 scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further. They've developed a new security system that continuously monitors how a user taps and swipes a mobile device. If the movements don't match the owner's tendencies, the system recognizes the differences and can be programmed to lock the device. The new system is called LatentGesture and was used during a Georgia Tech lab study using Android devices. The system was nearly 98 percent accurate on a smartphone and 97 percent correct on tablets. The research team will present the findings for the first time at the end of April.
 
"The system learns a person's 'touch signature,' then constantly compares it to how the current user is interacting with the device," said Polo Chau, a Georgia Tech College of Computing2 assistant professor who led the study.
 
To test the system, Chau and his team set up an electronic form with a list of tasks for 20 participants. They were asked to tap buttons, check boxes and swipe slider bars on a phone and tablet to fill out the form. The system tracked their tendencies and created a profile for each person.
 
After profiles were stored, the researchers designated one person's signature as the "owner" of the device and repeated the tests. LatentGesture successfully matched the owner and flagged everyone else as unauthorized users.
 
"Just like your fingerprint, everyone is unique when they use a touchscreen," said Chau. "Some people slide the bar with one quick swipe. Others gradually move it across the screen. Everyone taps the screen with different pressures while checking boxes."
 
The research team also programmed the system to store five touch signatures on the same device -- one "owner" and four authorized3 users. When someone other than the owner used the tablet, the system identified each with 98 percent accuracy.
 
"This feature could be used when a child uses her dad's tablet," said College of Computing sophomore4 Premkumar Saravanan. "The system would recognize her touch signature and allow her to use the device. But if she tried to buy an app, the system could prevent it."
 
The researchers say LatentGesture's biggest advantage is that the system is constantly running in the background. The user doesn't have to do anything different for added security and authentication5.
 
"It's pretty easy for someone to look over your shoulder while you're unlocking your phone and see your password," said Samuel Clarke, another College of Computing student on the research team. "This system ensures security even if someone takes your phone or tablet and starts using it."
 
Chau is co-advising the project with Hongyuan Zha, a professor in the School of Computational Science and Engineering. The study will be presented in Toronto at ACM Chinese CHI 2014 from April 26 to 27.
 
This research was partially6 supported by the National Science Foundation (NSF) under grants IIS-1049694 and IIS-1116886. Any conclusions expressed are those of the principal investigator7 and may not necessarily represent the official views of the NSF.


点击收听单词发音收听单词发音  

1 fingerprint 4kXxX     
n.指纹;vt.取...的指纹
参考例句:
  • The fingerprint expert was asked to testify at the trial.指纹专家应邀出庭作证。
  • The court heard evidence from a fingerprint expert.法院听取了指纹专家的证词。
2 computing tvBzxs     
n.计算
参考例句:
  • to work in computing 从事信息处理
  • Back in the dark ages of computing, in about 1980, they started a software company. 早在计算机尚未普及的时代(约1980年),他们就创办了软件公司。
3 authorized jyLzgx     
a.委任的,许可的
参考例句:
  • An administrative order is valid if authorized by a statute.如果一个行政命令得到一个法规的认可那么这个命令就是有效的。
4 sophomore PFCz6     
n.大学二年级生;adj.第二年的
参考例句:
  • He is in his sophomore year.他在读二年级。
  • I'm a college sophomore majoring in English.我是一名英语专业的大二学生。
5 authentication jO5yS     
鉴定,认证
参考例句:
  • Computer security technology includes mainly:Authentication,Encryption,Access Control,Auditing and so on.计算机网络安全技术主要有: 认证授权、数据加密、访问控制、安全审计等。
6 partially yL7xm     
adv.部分地,从某些方面讲
参考例句:
  • The door was partially concealed by the drapes.门有一部分被门帘遮住了。
  • The police managed to restore calm and the curfew was partially lifted.警方设法恢复了平静,宵禁部分解除。
7 investigator zRQzo     
n.研究者,调查者,审查者
参考例句:
  • He was a special investigator for the FBI.他是联邦调查局的特别调查员。
  • The investigator was able to deduce the crime and find the criminal.调查者能够推出犯罪过程并锁定罪犯。
TAG标签: touch device security
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片