Page Nav

HIDE

Grid

GRID_STYLE

Pages

Breaking News

latest

To protect your phone, this system learns how you tap

A new security system continuously monitors how a user taps and swipes a mobile device and recognizes if the movements don’t match the owner...

A new security system continuously monitors how a user taps and swipes a mobile device and recognizes if the movements don’t match the owner’s normal tendencies. If that happens, the system can be programmed to automatically lock.

The LatentGesture system, from cybersecurity researchers at Georgia Institute of Technology, used Android devices in testing and was nearly 98 percent accurate on a smartphone and 97 percent correct on tablets. The research team will present the findings in Toronto at ACM Chinese CHI 2014 at the end of April.

“The system learns a person’s ‘touch signature,’ then constantly compares it to how the current user is interacting with the device,” says Polo Chau, assistant professor of computing who led the study.

To test the system, Chau and his team set up an electronic form with a list of tasks for 20 participants. They were asked to tap buttons, check boxes, and swipe slider bars on a phone and tablet to fill out the form. The system tracked their tendencies and created a profile for each person.
"It's pretty easy for someone to look over your shoulder while you're unlocking your phone and see your password," says Samuel Clarke. "This system ensures security even if someone takes your phone or tablet and starts using it." (Credit: Nicola/Flickr)
After profiles were stored, the researchers designated one person’s signature as the “owner” of the device and repeated the tests. LatentGesture successfully matched the owner and flagged everyone else as unauthorized users.

“Just like your fingerprint, everyone is unique when they use a touchscreen,” Chau says. “Some people slide the bar with one quick swipe. Others gradually move it across the screen. Everyone taps the screen with different pressures while checking boxes.”
Recognizes up to five users

The research team also programmed the system to store five touch signatures on the same device—one “owner” and four authorized users. When someone other than the owner used the tablet, the system identified each with 98 percent accuracy.

“This feature could be used when a child uses her dad’s tablet,” says Premkumar Saravanan, a sophomore in the College of Computing. “The system would recognize her touch signature and allow her to use the device. But if she tried to buy an app, the system could prevent it.”

LatentGesture’s biggest advantage is that the system is constantly running in the background. The user doesn’t have to do anything different for added security and authentication.

“It’s pretty easy for someone to look over your shoulder while you’re unlocking your phone and see your password,” says Samuel Clarke, another College of Computing student on the research team. “This system ensures security even if someone takes your phone or tablet and starts using it.”

The National Science Foundation partially funded the project.

Source: Georgia Tech
Disclaimer: The information contained in this website is for general information purposes only.

The information is provided by PaHarare Exptreme using online sources and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose.

Any reliance you place on such information is therefore strictly at your own risk.


Classic Header