Unobservable Re-authentication for Smartphones

Guoliang Xue (Inventor)

Research output: Patent

Abstract

Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when he logs in to the device. These systems require inputting a password to unlock the device and do not provide periodic re-authentication. Unfortunately, this allows an un-authorized user full access to the device until it is shut off. There is a need for a re-authentication system that is convenient to use. Most re-authentication systems that are currently available require a user to constantly input passwords inconveniencing the user. Researchers at Arizona State University have developed an authentication system for handheld devices. Once a user is authenticated, the system continually re-authenticates to insure only authorized use of the device. The gestures used by each person to operate a handheld device are unique, like a fingerprint. The system monitors the way the keystrokes are done and the amount of pressure used in keystrokes and taps. The system saves information about the users gestures and uses that information as a standard for re-authentication. When an unauthorized user operates the device, the system detects a different user. Additional authentication is needed to reactivate the device. Re-authentication is invisible to users and causes no inconvenience. Potential Applications Cell phones Note pads Electronic tablets Benefits and Advantages Convenient Re-authentication not noticeable to user More Power Constantly re-authenticates user Retrofit Works with existing handheld devices Low Cost No additional hardware needed Download Original PDF For more information about the inventor(s) and their research, please see Dr. Guoliang Xue's directory webpage
Original languageEnglish (US)
StatePublished - May 21 2013

Fingerprint

Smartphones
Authentication
Data privacy
Information use
Information systems
Hardware

Cite this

@misc{6ad52cfadc544a608248dcd414fef5fa,
title = "Unobservable Re-authentication for Smartphones",
abstract = "Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when he logs in to the device. These systems require inputting a password to unlock the device and do not provide periodic re-authentication. Unfortunately, this allows an un-authorized user full access to the device until it is shut off. There is a need for a re-authentication system that is convenient to use. Most re-authentication systems that are currently available require a user to constantly input passwords inconveniencing the user. Researchers at Arizona State University have developed an authentication system for handheld devices. Once a user is authenticated, the system continually re-authenticates to insure only authorized use of the device. The gestures used by each person to operate a handheld device are unique, like a fingerprint. The system monitors the way the keystrokes are done and the amount of pressure used in keystrokes and taps. The system saves information about the users gestures and uses that information as a standard for re-authentication. When an unauthorized user operates the device, the system detects a different user. Additional authentication is needed to reactivate the device. Re-authentication is invisible to users and causes no inconvenience. Potential Applications Cell phones Note pads Electronic tablets Benefits and Advantages Convenient Re-authentication not noticeable to user More Power Constantly re-authenticates user Retrofit Works with existing handheld devices Low Cost No additional hardware needed Download Original PDF For more information about the inventor(s) and their research, please see Dr. Guoliang Xue's directory webpage",
author = "Guoliang Xue",
year = "2013",
month = "5",
day = "21",
language = "English (US)",
type = "Patent",

}

TY - PAT

T1 - Unobservable Re-authentication for Smartphones

AU - Xue, Guoliang

PY - 2013/5/21

Y1 - 2013/5/21

N2 - Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when he logs in to the device. These systems require inputting a password to unlock the device and do not provide periodic re-authentication. Unfortunately, this allows an un-authorized user full access to the device until it is shut off. There is a need for a re-authentication system that is convenient to use. Most re-authentication systems that are currently available require a user to constantly input passwords inconveniencing the user. Researchers at Arizona State University have developed an authentication system for handheld devices. Once a user is authenticated, the system continually re-authenticates to insure only authorized use of the device. The gestures used by each person to operate a handheld device are unique, like a fingerprint. The system monitors the way the keystrokes are done and the amount of pressure used in keystrokes and taps. The system saves information about the users gestures and uses that information as a standard for re-authentication. When an unauthorized user operates the device, the system detects a different user. Additional authentication is needed to reactivate the device. Re-authentication is invisible to users and causes no inconvenience. Potential Applications Cell phones Note pads Electronic tablets Benefits and Advantages Convenient Re-authentication not noticeable to user More Power Constantly re-authenticates user Retrofit Works with existing handheld devices Low Cost No additional hardware needed Download Original PDF For more information about the inventor(s) and their research, please see Dr. Guoliang Xue's directory webpage

AB - Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when he logs in to the device. These systems require inputting a password to unlock the device and do not provide periodic re-authentication. Unfortunately, this allows an un-authorized user full access to the device until it is shut off. There is a need for a re-authentication system that is convenient to use. Most re-authentication systems that are currently available require a user to constantly input passwords inconveniencing the user. Researchers at Arizona State University have developed an authentication system for handheld devices. Once a user is authenticated, the system continually re-authenticates to insure only authorized use of the device. The gestures used by each person to operate a handheld device are unique, like a fingerprint. The system monitors the way the keystrokes are done and the amount of pressure used in keystrokes and taps. The system saves information about the users gestures and uses that information as a standard for re-authentication. When an unauthorized user operates the device, the system detects a different user. Additional authentication is needed to reactivate the device. Re-authentication is invisible to users and causes no inconvenience. Potential Applications Cell phones Note pads Electronic tablets Benefits and Advantages Convenient Re-authentication not noticeable to user More Power Constantly re-authenticates user Retrofit Works with existing handheld devices Low Cost No additional hardware needed Download Original PDF For more information about the inventor(s) and their research, please see Dr. Guoliang Xue's directory webpage

M3 - Patent

ER -