A Tap and Gesture Hybrid Method for Authenticating Smartphone Users
|
|
|
- Norah Doyle
- 10 years ago
- Views:
Transcription
1 A Tap and Gesture Hybrid Method for Authenticating Smartphone Users Ahmed Sabbir Arif 1,2, Michel Pahud 1, Ken Hinckley 1, Bill Buxton 1 1 Microsoft Research One Microsoft Way Redmond, WA USA {mpahud, kenh, bibuxton}@microsoft.com 2 York University Department of Computer Science & Engineering 4700 Keele Street Toronto, Ontario M3J 1P3 Canada [email protected] Abstract This paper presents a new tap and gesture hybrid method for authenticating mobile device users. The new technique augments four simple gestures up, down, left, and right, to the dominant digit lock technique, allowing users to either tap or perform any one of the four gestures on the digit keys. It offers in total unique four-symbol password combinations, which is substantially more than the conventional techniques. Results of a pilot study showed that the new technique was slower and more error prone than the digit lock technique. However, we believe with practice it could get faster and more accurate. Also, most users were comfortable and all of them felt more secured while using the new technique. Author Keywords Authentication; mobile; security; PIN; gesture; hybrid. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Copyright is held by the owner/author(s). MobileHCI 2013, Aug 27 30, 2013, Munich, Germany. ACM /13/08. ACM Classification Keywords K.6.5 Security and Protection: Authentication. General Terms Design; Performance; Security. Introduction Smartphones are becoming an integral part of our everyday life. A recent survey [13] showed that 55% of
2 Figure 1. The device and the custom application used during the study. The first picture illustrates the initial state of the hybrid condition, where a random hybrid password was generated by the system. The password can be located at the top of the application. Here, to unlock the device, one has to make a left gesture on the 9 key, tap on the 6 key, make a down gesture on the 5 key, and then tap on the 7 key. The second picture illustrates a state where a user already inputted the first two items. Note that, here and similar to the default Windows Phone 7 lock-screen, the cancel button has changed to the backspace («) button to accommodate error correction. all U.S. mobile phone users own a smartphone and about two thirds of the new buyers are opting for one. Smartphones are built with more advanced computing capability and connectivity than regular mobile phones. This allows users to perform variety of tasks on these devices. Thus, smartphones usually accrue sensitive information over time and often gain access to wireless services and organizational intranets. This makes it vital to secure the data stored in these devices. Although, it has been established that user authentication is the most practical method for securing smartphone data, maintaining a sensible balance between the usability and the effectiveness of the password schemes remains a persistent problem [9]. Users are reluctant to use schemes that are too complex, while using simpler schemes compromises the security [14]. At present, the most popular password authentication technique is digit lock. Reportedly, 88% mobile users use this method on their devices [8]. With this method, users usually select a four-digit personal identification number (PIN) that they memorize and input using a virtual keypad to unlock a locked phone. This method offers unique four-digit password combinations. Recently, a graphical method, called pattern lock, is becoming popular amongst the Android OS users [1]. With this technique, users select a pattern by connecting four or more dots from a 3 3 grid. All connecting dots have to be unique. Users are allowed to connect a dot, which requires going through other dots, only when those dots have already been used. Under these conditions, this method offers distinct patterns [1]. Both of these methods have been criticized for their vulnerability to attacks due to the limited number of possible combinations [15] and guessability. Pattern locks usually leave oily residue or smudge on the screen, from which it is often possible to guess the password patterns [1]. Numerous alternate methods have been proposed to enhance mobile security, such as image selection [9, 12] that requires users to select sequence of images as passwords, stroke-based textual passwords [17], where users have to input textual passwords using gestures, multi-word passwords [7, 15] that enforce users to select multiple words as passwords, object-based schemes [2] that automatically construct textual passwords from digital objects such as images, etc., biometrics [4] that authenticate users through their fingerprints, typing pattern, face recognition, etc. Several issues have been identified with these techniques as well. The use of complex graphical passwords can enhance mobile security significantly. However, in practice, users often select patterns that are easily predictable [3]. Multi-word methods, in contrast, are usually error-prone and time consuming as it is often challenging to input such passwords using virtual mobile keyboards, mainly due to smaller keysizes and the need for swapping between multiple keyboard layouts to input special characters [11]. Biometrics, on the other hand, is difficult to adjust due to the trade-off between impostor pass rate and false alarm rate [5]. Besides, most of these techniques are substantially different from the dominant digit lock technique. This often discourages users to switch to a new technique. This also increases the production cost for smartphone manufactures. The New Technique We propose a new hybrid user authentication technique that augments four gestures: up, down, left, and right, to the ten digit keys from 0 to 9 of a virtual keypad. To initiate these gestures, one has to first touch a key and then stroke up, down, left, or right, respectively. While
3 Figure 2. The experiment setup. Here, a user is inputting PINs using the custom software. selecting a password, one could either tap on a key to select the corresponding digit or initiate any one of the four gestures. As the gestures are differentiated based on where they were initiated, a gesture on a specific key is different from the same gesture that was initiated on a different key. Based on a pilot, a threshold of 0.5 cm was used for the minimum gesture length. That is, a gesture had to be at least 0.5 cm long from touch-down to touch-up, to be considered as a gesture. Otherwise, the system recorded a tap. Motivation The new technique looks and feels similar to the most popular digit lock method (see Figure 1), which may encourage users to give it a try. Also, it allows users to select passwords that contain only digits, only gesture, or both digits and gestures. This eliminates the need for switching between different techniques. This is also beneficial to manufacturers as they do not have to develop multiple systems. The hybrid technique provides five choices per key, one digit and four gestures. This increases the total number of unique combinations significantly compared to the dominant ones. Furthermore, a recent study [1] indicated that combinations of taps and gestures are relatively harder to retrieve from smudges on the touchscreens than individual taps or gestures. Finally, as the gestures can be relatively short, 0.5 cm and above, it may be difficult for shoulder-surfers to differentiate between the gestures and the digits, and also to determine the directions of the gestures. A Pilot Study We conducted a pilot study to compare the new technique with the dominant digit lock technique. The intention was not to evaluate the security but to investigate how it performs in terms of speed, accuracy, and usability compared to the dominant one. Apparatus We used a Nokia Lumia 800 ( mm, 76 cm³, and 142 grams) during the study. The device ran on Windows Phone 7 OS at pixel resolution and ~252 ppi pixel density. A custom application was developed with WPF/C# to replicate the default Windows Phone 7 lock-screen. See Figure 1. During the study the device was connected to a tablet using a USB data cable. See Figure 2. This allowed the application to log all interactions with timestamps and record user performance directly to the tablet. Participants Twelve participants took part in the study. Their age ranged from 24 to 32 years, average 27. Three of them were female and two of them were left-handed. Eight users owned touchscreen smartphones, while the rest owned conventional mobile devices. They all used their devices frequently, that is, every day for at least three hours. They received a small gratuity for participating. Design and Procedure The study investigated three four-symbol password combinations: 1) digit only that contained four digits, similar to the digit lock approach, 2) gesture only that contained four gestures, and 3) hybrid that contained two digits and two gestures. A within-subjects design was used to explore the three password combinations in three counterbalanced conditions. The custom application generated one random password per condition for each participant at run-time. During a condition, participants were asked to input the corresponding password for 105 times in three equal
4 Limitations Similar to almost all recently proposed techniques, the hybrid method assumes that users will indeed use a hybrid password to secure their smartphone data. However, in practice, users have the tendency of selecting short and easy-to-guess textual passwords [10]. Likewise, they often select patterns that are easy to predict [3]. Such tendencies can hinder the efficacy of the new technique, making it comparable to the digit lock. Smudge attack is another concern for the new method. Although, the combination of tap and gesture has a comparatively lower retrieval rate from the smudges left on the screen [1], the possibility of such incidents remains. Finally, as performing gestures take more time than tapping, theoretically a hybrid password will take more time to input than a digit-based password. Some users may find this frustrating. blocks (3 35 attempts). Participants practiced inputting the password(s) for 15 times before each condition. Thus, in summary the design was: 12 participants 3 conditions (digit, gesture, hybrid) 3 blocks 35 attempts per block = in total 3780 attempts, excluding the 3 15 practice attempts. The system represented the gestures in the passwords using the following symbols: for up, for down, for left, for right, and for taps. See Figure 1. We used symbols instead of texts to reduce visual scan time and the mental processing and preparation time, as it takes less time to process a symbol than multi-character texts. The passwords were visible on the screen throughout the conditions to allow users to refer to those when they cannot remember the passwords. See Figure 1. However, we instructed them to look at the passwords only before or after an attempt. We did not allow them to select their own passwords in an attempt to avoid situations where multiple users selected the same password(s), which is not unusual [10]. This also allowed us to investigate a wide range of digits and gestures by eliminating the possibility of the selection of the most common patterns [3]. Note that, as discussed earlier, the intention of this study was to compare the performance of the new technique with the dominant one, and not to analyze the security. Users were instructed to hold the device with their dominant hand and then input the password(s) using the thumb of the same hand. A tap or gesture was recorded from the moment they touched the screen to the moment they lifted their finger(s). They could rest between the conditions or before they started inputting a password. Participants were allowed to correct their mistakes using the Backspace key. However, it was not enforced as users usually find it difficult to verify their input in the password field where dots are displayed for each attempt. Similar to the default Windows Phone 7 lock-screen, the custom software provided users with haptic feedback on incorrect input attempts. When a password was inputted incorrectly, the device vibrated for 200 ms. The following metrics were calculated during the study: Entry Speed (seconds): This denotes, on average, how much time it took to input one password. Error Rate (%): This denotes the average percentage of incorrect operations i.e. taps or gestures per password. For example, if 5234 was inputted instead of 1234, the error rate was 25%. Note that this metric does not consider error correction efforts. In addition, participants were asked to fill out two short questionnaires. One prior to the study that investigated what sort of user authentication method they use on their mobile devices. Another after the study, where they were asked to rate the investigated techniques, i.e. how secured they felt using the techniques, how hard it was to memorize the random passwords, etc. Results An Anderson-Darling test revealed that the study data was not normally distributed. This is most likely due to the insufficient number of different values. Thus, we used nonparametric tests for all analyses. We also filtered (2%) outliers beyond 3σ from the mean. Entry Speed A Friedman test identified a significant effect of method on entry speed (χ²=20.67, p<.0005, df=2). On average entry speed for digit, gesture, and hybrid were 1.01,
5 Figure 3. Average entry speed (seconds), with standard error (SE), for all investigated techniques. Figure 4. Average error rate (%), with standard error (SE), for all investigated techniques. 1.82, and 1.61 seconds, respectively. Post-hoc pairwise comparisons revealed that digit was significantly faster than gesture and hybrid, and hybrid was significantly faster than gesture. A significant effect of block was also identified for gesture (χ²=10.17, p<.05, df=2) but not for digit (χ²=1.17, p>.05, df=2) or hybrid (χ²=5.17, p>.05, df=2). Figure 3 illustrates average entry speed for all technique during the three blocks. Accuracy A Friedman test identified a significant effect of method on accuracy (χ²=11.62, p<.005, df=2). Average error rate for digit, gesture, and hybrid were 1.31, 5.28, and 3.93%, respectively. Post-hoc pairwise comparisons revealed that digit was significantly more accurate than gesture. No such indications were identified for the other groups. There was also no significant effect of block on accuracy for digit (χ²=0.64, ns, df=2), gesture (χ²=4.35, p>.05, df=2), or hybrid (χ²=4.54, p>.05, df=2). Figure 4 illustrates average error rate for all technique during the three blocks. Tap Error vs. Gesture Error A Wilcoxon Signed-Rank test identified significance regarding action type (i.e. tap or gesture) on error rate (z=-3.06, p<.005). Users made significantly more mistakes while inputting gestures (73%) than digits (27%). A deeper analysis revealed that 28% tap errors were committed when users mistakenly inputted gestures instead of digits, while 33% gesture errors were caused by accidental digit inputs. User Evaluation Most users (67%) responded that they found the hybrid technique comfortable to use, while the rest 33% found it uncomfortable. REMEMBERING THE PASSWORDS A Friedman test identified a significant effect of technique on users difficulty in remembering the passwords (χ²=16.89, p<.0005, df=2). Almost all users (83%) found gesture and hybrid harder to remember than digit. SENSE OF SECURITY A Friedman test found a significant effect of technique on users sense of security (χ²=16.55, p<.0005, df=2). Almost all users (92%) felt more secured using gesture, while all of them (100%) felt more secured using hybrid than digit. Discussion The hybrid technique yielded a lower entry speed and higher error rate compared to the digit lock technique. We expected this as gestures takes more time than taps. Results also showed that most of the input errors were committed while performing the gestures. Two additional factors contributed to the hybrid technique s lower accuracy rate. First, it was often hard for users to memorize the randomly generated passwords. Thus, they often mistyped the numbers or mis-performed the gestures. This phenomenon may reduce in real life scenarios when users will select their own passwords. Second, the gestures performed on the bordering keys often ended on the bezel, which caused misrecognition. However, we noticed that after some time users realized that they have to complete the gestures within the screen and the gestures do not have to be that long ( 0.5 cm). This encouraged them to initiate and complete the gesture within the keys. We did not observe any significant effect of learning, other than on entry speed for gestures, most probably due to insufficient data. However, prior studies showed that
6 Figure 5. A variation of the hybrid method that will allow users to apply four additional gestures: north-west, north-east, southwest, and south-east, on each key. This will increase the total number of possible unique four-symbol password combinations from to Figure 6. Another variation of the hybrid method that will allow users to input their PINs by drawing shapes through the digits, similar to the ShapeWriter [16] approach. Here, the user entered his/her four-digit PIN 1569 by connecting the digits. The dot indicates the starting end of the gesture. users gesture input performance improve with practice [16]. Encouragingly, most users found the new technique comfortable, and all of them felt more secured while using it. Conclusion and Future Work We presented a new tap and gesture hybrid mobile user authentication scheme that augments four gestures to the conventional digit lock technique. It provides in total unique four-symbol password combinations. A pilot study comparing the new and the digit lock technique revealed that the former was significantly slower and more error prone. However, most users found the new technique comfortable to use and all of them felt more secured while using it. In the future, we plan on conducting a longitudinal study to investigate if users entry speed and accuracy improves with practice. The study will also examine memorability to determine the effects of user-chosen passwords and the security of this system. We also plan on exploring two variations of the hybrid technique. The first will allow users to perform eight gestures on a key, see Figure 5, and the second will allow users to input the PINs by connecting the digits, see Figure 6. References [1] Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc.WOOT '10. USENIX (2010), 1-7. [2] Biddle, R., Mannan, M., Van Oorschot, P. C., and Whalen, T. User study, analysis, and usable security of passwords based on digital objects. Trans. Info. For. Sec. 6, 3 (2011), [3] Chiasson, S., Forget, A., Biddle, R., and Van Oorschot, P. C. User interface design affects security: patterns in click-based graphical passwords. Int. J. Inf. Security 8, 6 (2009), [4] Clarke, N. L. and Furnell, S. M. Advanced user authentication for mobile devices. Computers & Security 26, 2 (2007), [5] Davies, D. W. and Price, W. L. Security for Computer Networks. John Wiley & Sons, Inc., [6] Dhamija, R. and Perrig, A. Déjà Vu: a user study using images for authentication. In Proc. SSYM '00. USENIX (2000), 4-4. [7] Jakobsson, M. and Akavipat, R. Rethinking passwords to adapt to constrained keyboards. In MoST Workshop '12. IEEE (2012). [8] Jakobsson, M., Shi, E, Golle, P., and Chow, R. Implicit authentication for mobile devices. In Proc. HotSec '09. USENIX (2009), 9-9. [9] Jansen, W. Authenticating mobile device users through image selection. Data Security, [10] Kim, I. Keypad against brute force attacks on smartphones. IET Information Security 6, 2 (2012), [11] Mannan, M. and Van Oorschot, P. C. Passwords for both mobile and desktop computers: ObPwd for Firefox and Android. USENIX 37, 4 (2012), [12] Nazir, I., Zubair, I., and Islam, M. H., User authentication for mobile device through image selection. In Proc. NDT '09. IEEE (2009), [13] Nielsen Holdings. Two thirds of new mobile buyers now opting for smartphones. [14] Raguram, R., White, A. M., Goswami, D., Monrose, F., and Frahm, J-M. ispy: Automatic reconstruction of typed input from compromising reflections. In Proc. CCS '11. ACM (2011), [15] Skillen, A. and Mannan, M. Myphrase: Passwords from your own words. Spectrum, Concordia University, Montreal, Quebec, Canada, [16] Zhai, S. and Kristensson, P.-O. Shorthand writing on stylus keyboard. In Proc. CHI '03. ACM (2003), [17] Zheng, Z., Liu, X., Yin, L., and Liu, Z. A strokebased textual password authentication scheme. In Proc. ETCS '09. IEEE (2009),
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication Mohd Anwar and Ashiq Imran Department of Computer Science North Carolina A&T State University [email protected],
Securing ATM Using Graphical Password Authentication Scheme
Securing ATM Using Graphical Password Authentication Scheme Sonia Rathi 1, Raunak Chitnis 2, Ramakant Yadav 3, Mrs. M.V.Bhosle 4 1 (Department Of Information Technology, Marathwada Mitra Mandal s Institute
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Innovative Spiral Lock Design for Smartphone Security
Innovative Spiral Lock Design for Smartphone Security Jacqueline Bermudez, Alaa Abdulaal, Liwen Xu, Benson Quach University of Toronto Department of Computer Science {jbermudez, alaa84, xuliwenx, benson}@cs.toronto.edu
Reading with Mobile Phone & Large Display
Reading with Mobile Phone & Large Display Roswitha Gostner Computing Department Lancaster University, [email protected] Hans Gellersen Computing Department Lancaster University Lancaster, LA1 4WY, UK
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
MobileMerchant Application Guide
MobileMerchant Application Guide United Kingdom Ireland Version 6 Android: Google Play is a trademark of Google Inc. Apple: Apple, the Apple logo, iphone and ipad are trademarks of Apple Inc., registered
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Making Graphic-Based Authentication Secure against Smudge Attacks
Session: Emotion and User Modeling IUI', March 9, 0, Santa Monica, CA, USA Making Graphic-Based Authentication Secure against Smudge Attacks Emanuel von Zezschwitz, Anton Koslow, Alexander De Luca, Heinrich
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT Waraporn Viyanon Computer Science Program, Department of Mathematics Faculty of Science, Srinakharinwirot University Bangkok,
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
An Analysis of Keystroke Dynamics Use in User Authentication
An Analysis of Keystroke Dynamics Use in User Authentication Sam Hyland (0053677) Last Revised: April 7, 2004 Prepared For: Software Engineering 4C03 Introduction Authentication is an important factor
Release Your App on Sunday Eve: Finding the Best Time to Deploy Apps
Release Your App on Sunday Eve: Finding the Best Time to Deploy Apps Niels Henze University of Oldenburg Escherweg 2 Oldenburg, Germany [email protected] Susanne Boll University of Oldenburg
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
Pass-Image Authentication Method Tolerant to Video-Recording Attacks
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 767 773 ISBN 978-83-60810-22-4 Pass-Image Authentication Method Tolerant to Video-Recording Attacks Yutaka Hirakawa
Universal Multi-Factor Authentication Using Graphical Passwords
Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu
PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS
International Journal of Computer Science and Applications Technomathematics Research Foundation Vol. 9, No. 3, pp. 20 36, 2012 PASS-IMAGE AUTHENTICATION METHOD TOLERANT TO RANDOM AND VIDEO-RECORDING ATTACKS
Cheap and easy PIN entering using eye gaze
Cheap and easy PIN entering using eye gaze Pawel Kasprowski, Katarzyna Harężlak Institute of Informatics Silesian University of Technology Gliwice, Poland {pawel.kasprowski,katarzyna.harezlak}@polsl.pl
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Kaspersky Password Manager
Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.
Installation and Setup
Installation and Setup Xoom INDEX Xoom Features/Pictures. Page 2 Accessories.. Page 2 Accessing Users Guides... Page 3 itap RDP mouse modes... Page 3 Setup for Xoom use in the office (Office wireless network)
MoCoShoP: supporting mobile and collaborative shopping and planning of interiors
MoCoShoP: supporting mobile and collaborative shopping and planning of interiors Julian Seifert 1, Dennis Schneider 2 and Enrico Rukzio 1 1 Ulm University, Ulm, Germany {julian.seifert, enrico.rukzio}@uni-ulm.de
GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones
GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones Irfan Altiok, Sebastian Uellenbeck, Thorsten Holz Horst Görtz Institute for IT-Security Ruhr-University Bochum Universitätsstrasse 150
Smudge Attacks on Smartphone Touch Screens
Smudge Attacks on Smartphone Touch Screens Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith Department of Computer and Information Science University of Pennsylvania {aviv,gibsonk,emossop,blaze,jms}@cis.upenn.edu
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
Ariba Supplier Mobile App Quick Start Guide
Ariba Supplier Mobile App Quick Start Guide Table of Contents Getting Started...3 Downloading and Authenticating Your App... 3 Using the Ariba Supplier Mobile App...6 Logging In... 6 Setting Up Alerts
Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
Chapter 3 Input Devices
CSCA0101 COMPUTING BASICS Chapter 3 1 Topics: Examples of Input Device Keyboard Pointing Devices Graphic and Video Audio 2 Any peripheral (piece of computer hardware equipment) used to provide data and
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
BlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
TouchDevelop App Development on Mobile Devices
TouchDevelop App Development on Mobile Devices Nikolai Tillmann, Michal Moskal, Jonathan de Halleux, Manuel Fahndrich, Sebastian Burckhardt Microsoft Research One Microsoft Way Redmond WA, USA {nikolait,micmo,jhalleux,maf,sburckha}@microsoft.com
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
Student service user guide Version 1.0, July 2013
Student service user guide Version 1.0, July 2013 This guide is designed to help Exams Officers and teachers understand what students see when they log into the new enhanced version of ResultsPlus Direct,
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
User Guide. SafeNet MobilePASS for Windows Phone
SafeNet MobilePASS for Windows Phone User Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Product
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
3. Surfing with Your Tablet
95 3. Surfing with Your Tablet In this chapter you will get to know the Internet app. This is the default web browser application that is installed on your Samsung Galaxy Tab. You can use this app to surf
EFFECTS OF AUDITORY FEEDBACK ON MULTITAP TEXT INPUT USING STANDARD TELEPHONE KEYPAD
EFFECTS OF AUDITORY FEEDBACK ON MULTITAP TEXT INPUT USING STANDARD TELEPHONE KEYPAD Sami Ronkainen Nokia Mobile Phones User Centric Technologies Laboratory P.O.Box 50, FIN-90571 Oulu, Finland [email protected]
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk
VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...
SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG
Technical Disclosure Commons Defensive Publications Series January 06, 2016 SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG Alexander Faaborg Ariel Sachter-Zeltzer Follow this and additional
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
How to connect to the DGL Practice Manager Cloud Server from an Apple Mac
How to connect to the DGL Practice Manager Cloud Server from an Apple Mac Connecting to the DGL Practice Manager Hosted Servers requires the use of the "Microsoft Remote Desktop Client" application, which
Experiences with Studying Usability of Two-Factor Authentication Technologies. Emiliano De Cristofaro https://emilianodc.com
Experiences with Studying Usability of Two-Factor Authentication Technologies Emiliano De Cristofaro https://emilianodc.com Two Factor (2FA) Authentication Authentication Token password Fingerprint Phone
Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation
Abstract Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation Narmeen
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,
Technical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products
Technical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products Document Updated: September 29, 2014 Written by: Tim Marks, President, FMA, Inc. Introduction
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Setting up CU@Round On line Account
Setting up CU@Round On line Account Created Date: October 6, 2009 Purpose: This document is a step by step process on how to set up a member s CU@Round online account. Note: The member will need the following
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
How we design & build websites. Menu 2 Menu 3 Menu 4 Menu 5. Home Menu 1. Item 1 Item 2 Item 3 Item 4. bob. design & marketing
How we design & build websites Home Menu 1 Item 1 Item 2 Item 3 Item 4 Menu 2 Menu 3 Menu 4 Menu 5 Item 1 Item 2 Item 3 Home Menu 1 Item 1 Item 2 Item 3 Item 4 Menu 2 Menu 3 Menu 4 Menu 5 Item 1 Item 2
Setup your university email on your Android smartphone
Setup your university email on your Android smartphone This guide is designed for student users with an Office365 mailbox who wish to access their University email through an Android device Students starting
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge
How To Test The Effect Of Tactile Feedback On Typing On A Soft Keyboard On A Tablet Device
Text Entry Performance Evaluation of Haptic Soft QWERTY Keyboard on a Tablet Device Byung-Kil Han 1, 2, Kwangtaek Kim 2, 3, Koji Yatani 2, and Hong Z. Tan 2 1 Korea Advanced Institute of Science and Technology,
Password Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock
Progressive Authentication on Mobile Devices Zachary Fritchen Introduction Standard authentication schemes on mobile phones are at the moment very limited. They are typically restricted to a single security
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
SAP Business One mobile app for Android
User Guide SAP Business One mobile app 1.2.x for Android Document Version: 1.0 2016-03-25 Applicable Releases: SAP Business One 9.1 PL05 and later, SAP Business One 9.1 PL05, version for SAP HANA and later,
The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app.
PayClip User Guide The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Contents Getting started made easy 2 Information for Merchants....................................................2
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
NetSuite OpenAir Mobile for Android User Guide Version 1.3
NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through
Remote Desktop Services User's Guide
Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015
(http://www.forbes.com/sites/louiscolumbus/2012/08/04/hype-cycle-for-cloud-computing-showsenterprises-finding-value-in-big-data-virtualization/)
5 Near Future Cloud Computing Trends Cloud computing has been around in one form or another for decades, but the idea has only started to take off in the last five to ten years. Like any newly popular
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Dolby Conference Phone User s Guide 2.0. Issue 2
Dolby Conference Phone User s Guide 2.0 Issue 2 Corporate Headquarters Dolby Laboratories Licensing Corporation Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103 4813 USA Telephone 415
Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM
Rogers Smart Home Monitoring QUICK START GUIDE STAY CONNECTED TO YOUR HOME AND YOUR FAMILY. This Quick Start Guide is designed to help you get the most out of your new system right away and help ensure
(IT Journal of Research, Volume 1, May 2010 SECUREZZA. Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune.
SECUREZZA Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune Abstract The current security systems and authentication systems have much weakness and are prone to break through. Textual
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Trans-Soft Datacenter Administration Guide
Trans-Soft Datacenter Administration Guide Copyright 2009 Trans-Soft, Inc. Introduction We would like to take a moment and welcome you the Trans-Soft Datacenter. We appreciate your business and are dedicated
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
For keyboard and touchscreen BlackBerry devices User manual
TSMobiles Terminal Service client for Mobiles For keyboard and touchscreen BlackBerry devices User manual Introduction... 3 System Requirements... 3 1. Configuring Remote Desktop on computer... 4 2. Installation...
Windows Phone 8 devices will be used remotely over 3G, 4G and non-captive Wi-Fi networks to enable a variety of remote working approaches such as
GOV.UK Guidance End User Devices Security Guidance: Windows Phone 8 Updated 14 October 2013 Contents 1. Usage Scenario 2. Summary of Platform Security 3. How the Platform Can Best Satisfy the Security
Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules
Getting Started User Name Rules All user names must: Be unique. Be between six and 40 characters in length. Notes: It is recommended that user names consist only of alphanumeric characters (A-Z, 0-9).
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
To Virtualize or Not? The Importance of Physical and Virtual Components in Augmented Reality Board Games
To Virtualize or Not? The Importance of Physical and Virtual Components in Augmented Reality Board Games Jessica Ip and Jeremy Cooperstock, Centre for Intelligent Machines, McGill University, Montreal,
