Fig. 1 Left) before put the pattern, Right) recognized pattern
Fig. 2 Suggested solution
Fig. 3 The processes without or with threads
Fig. 4 Pseudo code that shows how to check the pressing time using thread
Fig. 5 Comparing default pattern lock with suggest system
Fig. 6 The absolute positions of each buttons
Fig. 7 The convenience and security
Table. 1 The information of experiment environment
Table. 2 Number of cases for get the secret pattern
참고문헌
- UCSIS. Shoulder Surfing attack in graphical password authentication [Internet]. Available: https://arxiv.org/ftp/arxiv/papers/0912/0912.0951.pdf.
- A. J. Aviv, K. L. Gibson, E. Mossop, and J. M. Smith, "Smudge Attacks on Smart phone Touch Screens," Woot, 10: 1-7, 2010.
- C. Dongmin, "Application Adaptive Pattern-based Authentication Method for Smartphones," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology vol. 8, no. 2, pp. 59-67, February 2018.
- T. Kwon, and S. Na, "TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems," Computers & Security, 42, pp. 137-150, 2014. https://doi.org/10.1016/j.cose.2013.12.001
- Youtube. The video of how it works [Internet]. Available: https://youtu.be/OEOkHHQPTgA.
- Github. The open source of press time pattern lock PIN [Internet]. Available: https://github.com/kyu-h/PressTime_PatternLock_PIN.
- A. Karawash. Brute Force Attack [Internet]. Available: https://www.researchgate.net/profile/Ahmad_Karawash/publication/299645572_Data_protection_and_Brute_Force_attack/links/5703c19e08aeade57a25ae7b/Data-protection-and-Brute-Force-attack.pdf.
- H. J. Seo, and H. W. Kim, "Secure Keypad with Encrypted Input Message," Journal of the Korea Institute of Information and Communication Engineering, vol. 18, no. 12, pp. 2899-2910, Dec. 2014. https://doi.org/10.6109/jkiice.2014.18.12.2899
피인용 문헌
- 원형 스마트폰 잠금 패턴 방식 제안 vol.23, pp.11, 2019, https://doi.org/10.6109/jkiice.2019.23.11.1471