DOI QR코드

DOI QR Code

T-TIME: A Password Scheme Based on Touch Signal Generation Time Difference

  • Yang, Gi-Chul (Department of Convergence Software, Mokpo National University)
  • Received : 2018.12.06
  • Accepted : 2018.12.23
  • Published : 2018.12.31

Abstract

As evidenced through rapidly growing digital devices and information, digital authentication is becoming ever more critical, especially considering the complex and prevalent digital accounts we are using every day. Also, digital authentication is apt to consistent digital security application. In this sense, digital security quality and usability can be enhanced by developing a mechanism for efficient digital authentication. In this paper, a mechanism of efficient digital authentication called T-TIME is introduced in order to alleviate issues dealing with secure and user friendly authentication across ever- growing digital devices and information. Touch Signal generation time difference is utilized for T-TIME as a mediation mechanism that enhances the security quality by confusing others unlike other graphical password mechanisms which are using spatial information. Hence, digital authentication by using T-TIME can be a good way of enhancing security quality and usability.

Keywords

Acknowledgement

Supported by : National Research Foundation of Korea (NRF)

References

  1. G. Blonder, "Graphical passwords", in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States, 1996.
  2. R. N. Shepard, "Recognition memory for words, sentences, and pictures", Journal of Verbal Learning and Verbal Behavior, Vol. 6, Issue 1, pp. 156-163, Feb. 1967. https://doi.org/10.1016/S0022-5371(67)80067-7
  3. A. Paivio, Rogers, T. B., Smythe, P. C., "Why are pictures easier to recall then words?" Psychonomic Science, Vol. 11, Issue 4, 137-138, Apr. 1976. https://doi.org/10.3758/BF03331011
  4. C. Yang, "Shoulder-Surfing Resistant Graphical Authentication Using Transparent Image Moving Scheme", The 13th Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2018 NhaTrang, Vietnam, June 2018.
  5. C. Yang and H. Kim, "A New Graphical Password Scheme Based on Universal Design," Journal of Digital Convergence, Vol. 12, No. 5, pp. 231-238, May 2014. https://doi.org/10.14400/JDC.2014.12.5.231
  6. Angeli, "Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems", International Journal of Human-Computer Studies, Vol. 63, No.1-2, pp. 128-152, Jul. 2005. https://doi.org/10.1016/j.ijhcs.2005.04.020
  7. Davis, F. Monrose, and M. K. Reiter, "On User Choice in Graphical Password Schemes", In: 13th USENIX Security Symposium, San Diego, CA, Nov. 2004.
  8. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system", International Journal of Human Computer Studies, Vol. 63, Issue 1-2, pp. 102-127, July 2005. https://doi.org/10.1016/j.ijhcs.2005.04.010
  9. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "Authentication using graphical passwords: Basic results", in Human-Computer Interaction International (HCII 2005), Las Vegas, NV. 2005.
  10. Dirik, N. Memon, and J.C. Birget, "Modeling user choice in the PassPoints graphical password scheme", Symposium on Usable Privacy and Security (SOUPS), at Carnegie-Mellon Univ., Pittsburgh, July 2007.
  11. Yang, "PassPositions: A Secure and User-Friendly Graphical Password Scheme", Proceedings of the 4th International Conference on Computer Applications and Information Processing Technology (CAIPT 2017), Bali, Aug. 2017.