The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan. (2014 vol.13)
pp: 4-19
Tam Vu , Dept. of Comput. Sci. & Eng., Univ. of Colorado-Denver, Denver, CO, USA
Akash Baid , WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Simon Gao , WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Marco Gruteser , WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Richard Howard , WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Janne Lindqvist , WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Predrag Spasojevic , WINLAB, Rutgers Univ., North Brunswick, NJ, USA
Jeffrey Walling , Electr. & Comput. Eng. Dept., Univ. of Utah, Salt Lake City, UT, USA
ABSTRACT
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve data rates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.
INDEX TERMS
Authentication, Receivers, Hardware, Software, Capacitance, Smart phones,mobile communications, Authentication, Receivers, Hardware, Software, Capacitance, Smart phones, capacitive screen, Capacitive touch communication, touchscreen, authentication, identification
CITATION
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, Jeffrey Walling, "Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen", IEEE Transactions on Mobile Computing, vol.13, no. 1, pp. 4-19, Jan. 2014, doi:10.1109/TMC.2013.116
REFERENCES
[1] "Face Recognition on Galaxy Nexus Is Very Neat, but Easily Compromised with the Picture?" Zimbio, http://tiny.ccgj50gw, 2011.
[2] "Nearfield Communications Forum," http:/www.nfc-forum.org, 2011.
[3] A. Adler, "Vulnerabilities in Biometric Encryption Systems," Proc. Fifth Int'l Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA), 2005.
[4] "AFG3000C Arbitrary/Function Generator," http://www.tek. comAFG3000, 2013.
[5] "Amplifier Transistors BC548B," http:/onsemi.com, 2013.
[6] "An MCU-Based Buck-Boost Converter for Battery Chargers," http:/www.st.com, 2013.
[7] "Atmel maXTouch mXT1386 Specifications," http://www.atmel. com/devicesMXT1386.aspx , 2013.
[8] G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. de Santos Sierra, "Analysis of Pattern Recognition Techniques for In-Air Signature Biometrics," Pattern Recognition, vol. 44, nos. 10/11, pp. 2468-2478, 2011.
[9] D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proc. Network and Distributed System Security Symp. (NDSS), Feb. 2002.
[10] Belkin, "WeMo Home Automation System," http://www. belkin.com/us/Products/home-automation/ cwemo-home-automation, 2013.
[11] N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Möller, "On the Need for Different Security Methods on Mobile Phones," Proc. 13th Int'l Conf. Human Computer Interaction with Mobile Devices and Services (MobileHCI), Aug. 2011.
[12] H. Bojinov and D. Boneh, "Mobile Token-Based Authentication on a Budget," Proc. 12th Workshop Mobile Computing Systems and Applications (HotMobile), Feb. 2011.
[13] A. Braun and P. Hamisu, "Using the Human Body Field as a Medium for Natural Interaction," Proc. Second Int'l Conf. PErvasive Technologies Related to Assistive Environments (PETRAE), article 50, 2009.
[14] C. Cornelius, J. Sorber, R. Peterson, J. Skinner, R. Halter, and D. Kotz, "Who Wears Me? Bioimpedance as a Passive Biometric," Proc. HealthSec Workshop, 2012.
[15] Craftsman, "Assurelink Garage Doors Openers," http://www.craftsman.com/garage-doordap-120000000180763 , 2013.
[16] P. Dietz and D. Leigh, "DiamondTouch: A Multi-User Touch Technology," Proc. 14th Ann. ACM Symp. User Interface Software and Technology (UIST), Nov. 2001.
[17] P. Dunphy, A.P. Heiner, and N. Asokan, "A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices," Proc. Sixth Symp. Usable Privacy and Security (SOUPS), July 2010.
[18] M. Faundez-Zanuy, "On the Vulnerability of Biometric Security Systems," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no. 6, pp. 3-8, June 2004.
[19] C. Foresman, "Apple Facing Class-Action Lawsuit Over Kids' In-App Purchases," Ars Technica, Apr. 2011.
[20] Electrostatic Discharge Association, "ESD Fundamentals," http://www.esda.orgfundamentalsp5.html, 2010.
[21] J. Galbally-Herrero, J. Fierrez-Aguilar, J.D. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, and M. Tapiador, "On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprints Attacks," Proc. Carnahan Conf. Security Technology, Oct. 2006.
[22] C. Gehrmann, C.J. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," CryptoBytes, vol. 7, pp. 29-37, Spring 2004.
[23] E. Haselsteiner and K. Breitfuss, "Security in Near Field Communication (NFC)," Proc. Workshop RFID Security, 2006.
[24] K. Hawkey and K.M. Inkpen, "Examining the Content and Privacy of Web Browsing Incidental Information," Proc. 15th Int'l Conf. World Wide Web (WWW), May 2006.
[25] A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security," EURASIP J. Advances in Signal Processing, vol. 2008, pp. 113:1-113:17, Jan. 2008.
[26] E.A. Johnson, "Touch Displays: A Programmed Man-Machine Interface," Ergonomics, vol. 10, no. 2, pp. 271-277, 1967.
[27] A.K. Karlson, A.B. Brush, and S. Schechter, "Can I Borrow Your Phone?: Understanding Concerns When Sharing Mobile Phones," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI), Apr. 2009.
[28] S. Kurkovsky, T. Carpenter, and C. MacDonald, "Experiments with Simple Iris Recognition for Mobile Phones," Proc. Seventh Int'l Conf. Information Technology: New Generations, pp. 1293-1294, Apr. 2010.
[29] J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan, "User Evaluation of Lightweight User Authentication with a Single Tri-Axis Accelerometer," Proc. Int'l Conf. Human-Computer Interaction with Mobile Devices and Services (MobileHCI), Sept. 2009.
[30] S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, "Proximate: Proximity-Based Secure Pairing Using Ambient Wireless Signals," Proc. ACM MobiSys, June 2011.
[31] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial 'Gummy' Fingers on Fingerprint Systems," Proc. SPIE, vol. 4677, 2002.
[32] R. Mayrhofer and H. Gellersen, "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices," IEEE Trans. Mobile Computing, vol. 8, no. 6, pp. 792-806, June 2009.
[33] M.L. Mazurek, J.P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L.F. Cranor, G.R. Ganger, and M.K. Reiter, "Access Control for Home Data Sharing: Attitudes, Needs and Practices," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI), May 2010.
[34] "MOBIO - Mobile Biometry: European Funded Project (FP7-2007-ICT-1)," http:/www.mobioproject.org, 2011.
[35] "Motorola ATRIX: Technical Specifications," http://bit.lyf7nfEX, 2011.
[36] Texas Instruments, "MSP430 Ultra-Low Power 16-Bit Microcontrollers," http:/msp430.com, 2013.
[37] A. Nicholson, M.D. Corner, and B.D. Noble, "Mobile Device Security Using Transient Authentication," IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1489-1502, Nov. 2006.
[38] "Ringbow," http://ringbow.comringbow, 2013.
[39] V. Roth, P. Schmidt, and B. Güldenring, "The IR Ring: Authenticating Users' Touches on a Multi-Touch Display," Proc. 23nd Ann. ACM Symp. User Interface Software and Technology (UIST), Oct. 2010.
[40] M. Sato, I. Poupyrev, and C. Harrison, "Touché: Enhancing Touch Interaction on Humans, Screens, Liquids, and Everyday Objects," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI), pp. 483-492, 2012.
[41] Y. Shaked and A. Wool, "Cracking the Bluetooth Pin," Proc. ACM MobiSys), pp. 39-50, 2005.
[42] E. Sofge, "Can a Smartphone Make Your Car Smarter?" MSN Autos, 2010.
[43] Sony, "'mofiria' - Finger-Vien Pattern Recognition," http://www.sony.net/SonyInfo/technology/ technology/theme mofiria_01.html, 2009.
[44] F. Stajano and R.J. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," Proc. Seventh Int'l Workshop Security Protocols, Apr. 2000.
[45] E. Naone, "Pushing the Limits of the Touch Screen," MIT Technology Review, http://www.technologyreview.com/hack/425130 pushing-the-limits-of-the-touch-screen , 2011.
[46] L. Thalheim and J. Krissler, "Body Check: Biometric Access Protection Devices and Their Programs Put to the Test," CT Magazine, Nov. 2002.
[47] M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords," Proc. 17th ACM Conf. Computer and Comm. Security (CCS), Oct. 2010.
[48] W. Westerman and J.G. Elias, Capacitive Sensing Arrangment, US Patent 0232567, Patent and Trademark Office, 2006.
[49] F. Xie, T. Furon, and C. Fontaine, "On-Off Keying Modulation and Tardos Fingerprinting," Proc. ACM Workshop Multimedia and Security (MM & Sec), pp. 101-106, 2008.
101 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool