Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Personal Touch Signature Makes Mobile Devices More Secure

08.04.2014

New system provides security by monitoring how user touches the screen

Passwords, gestures and fingerprint scans are all helpful ways to keep a thief from unlocking and using a cell phone or tablet. Cybersecurity researchers from the Georgia Institute of Technology have gone a step further.


LatentGesture

LatentGesture continuously monitors how a user taps and swipes a mobile device. If the movements don’t match the owner’s tendencies, the system recognizes the differences and can be programmed to lock the device.

They’ve developed a new security system that continuously monitors how a user taps and swipes a mobile device. If the movements don’t match the owner’s tendencies, the system recognizes the differences and can be programmed to lock the device. 

The new system is called LatentGesture and was used during a Georgia Tech lab study using Android devices. The system was nearly 98 percent accurate on a smartphone and 97 percent correct on tablets. The research team will present the findings for the first time at the end of April. 

“The system learns a person’s ‘touch signature,’ then constantly compares it to how the current user is interacting with the device,” said Polo Chau, a Georgia Tech College of Computing assistant professor who led the study.

To test the system, Chau and his team set up an electronic form with a list of tasks for 20 participants. They were asked to tap buttons, check boxes and swipe slider bars on a phone and tablet to fill out the form. The system tracked their tendencies and created a profile for each person.

After profiles were stored, the researchers designated one person’s signature as the “owner” of the device and repeated the tests. LatentGesture successfully matched the owner and flagged everyone else as unauthorized users.  

“Just like your fingerprint, everyone is unique when they use a touchscreen,” said Chau. “Some people slide the bar with one quick swipe. Others gradually move it across the screen. Everyone taps the screen with different pressures while checking boxes.”

The research team also programmed the system to store five touch signatures on the same device – one “owner” and four authorized users. When someone other than the owner used the tablet, the system identified each with 98 percent accuracy. 

“This feature could be used when a child uses her dad’s tablet,” said College of Computing sophomore Premkumar Saravanan. “The system would recognize her touch signature and allow her to use the device. But if she tried to buy an app, the system could prevent it.”

The researchers say LatentGesture’s biggest advantage is that the system is constantly running in the background. The user doesn’t have to do anything different for added security and authentication.

“It’s pretty easy for someone to look over your shoulder while you’re unlocking your phone and see your password,” said Samuel Clarke, another College of Computing student on the research team. “This system ensures security even if someone takes your phone or tablet and starts using it.”

Chau is co-advising the project with Hongyuan Zha, a professor in the School of Computational Science and Engineering. The study will be presented in Toronto at ACM Chinese CHI 2014 from April 26 to 27.

This research was partially supported by the National Science Foundation (NSF) under grants IIS-1049694 and IIS-1116886. Any conclusions expressed are those of the principal investigator and may not necessarily represent the official views of the NSF.

Jason Maderer | EurekAlert!
Further information:
http://www.gatech.edu

Further reports about: CHI Computing Devices Engineering NSF Secure Signature differences

More articles from Information Technology:

nachricht Magnetic fields provide a new way to communicate wirelessly
01.09.2015 | University of California - San Diego

nachricht 'Magic' sphere for information transfer
24.08.2015 | Lomonosov Moscow State University

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: How wind sculpted Earth's largest dust deposit

China's Loess Plateau was formed by wind alternately depositing dust or removing dust over the last 2.6 million years, according to a new report from University of Arizona geoscientists. The study is the first to explain how the steep-fronted plateau formed.

China's Loess Plateau was formed by wind alternately depositing dust or removing dust over the last 2.6 million years, according to a new report from...

Im Focus: An engineered surface unsticks sticky water droplets

The leaves of the lotus flower, and other natural surfaces that repel water and dirt, have been the model for many types of engineered liquid-repelling surfaces. As slippery as these surfaces are, however, tiny water droplets still stick to them. Now, Penn State researchers have developed nano/micro-textured, highly slippery surfaces able to outperform these naturally inspired coatings, particularly when the water is a vapor or tiny droplets.

Enhancing the mobility of liquid droplets on rough surfaces could improve condensation heat transfer for power-plant heat exchangers, create more efficient...

Im Focus: Increasingly severe disturbances weaken world's temperate forests

Longer, more severe, and hotter droughts and a myriad of other threats, including diseases and more extensive and severe wildfires, are threatening to transform some of the world's temperate forests, a new study published in Science has found. Without informed management, some forests could convert to shrublands or grasslands within the coming decades.

"While we have been trying to manage for resilience of 20th century conditions, we realize now that we must prepare for transformations and attempt to ease...

Im Focus: OU astrophysicist and collaborators find supermassive black holes in quasar nearest Earth

A University of Oklahoma astrophysicist and his Chinese collaborator have found two supermassive black holes in Markarian 231, the nearest quasar to Earth, using observations from NASA's Hubble Space Telescope.

The discovery of two supermassive black holes--one larger one and a second, smaller one--are evidence of a binary black hole and suggests that supermassive...

Im Focus: What would a tsunami in the Mediterranean look like?

A team of European researchers have developed a model to simulate the impact of tsunamis generated by earthquakes and applied it to the Eastern Mediterranean. The results show how tsunami waves could hit and inundate coastal areas in southern Italy and Greece. The study is published today (27 August) in Ocean Science, an open access journal of the European Geosciences Union (EGU).

Though not as frequent as in the Pacific and Indian oceans, tsunamis also occur in the Mediterranean, mainly due to earthquakes generated when the African...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

Networking conference in Heidelberg for outstanding mathematicians and computer scientists

20.08.2015 | Event News

Scientists meet in Münster for the world’s largest Chitin und Chitosan Conference

20.08.2015 | Event News

Large agribusiness management strategies

19.08.2015 | Event News

 
Latest News

How to get rid of a satellite after its retirement

02.09.2015 | Physics and Astronomy

Expanded CNC programming software for operations planning, training and sales

02.09.2015 | Trade Fair News

Orang-utan females prefer cheek-padded males

02.09.2015 | Life Sciences

VideoLinks
B2B-VideoLinks
More VideoLinks >>>