Bend Passwords: using gestures to authenticate on flexible devices

  title={Bend Passwords: using gestures to authenticate on flexible devices},
  author={Sana Maqsood and Sonia Chiasson and Audrey Girouard},
  journal={Personal and Ubiquitous Computing},
Upcoming mobile devices will have flexible displays, allowing us to explore alternate forms of user authentication. On flexible displays, users can interact with the device by deforming the surface of the display through bending. In this paper, we present Bend Passwords, a new type of user authentication that uses bend gestures as its input modality. We ran three user studies to evaluate the usability and security of Bend Passwords and compared it to PINs on a mobile phone. Our first two… 

Bend Passwords on BendyPass: A User Authentication Method for People with Vision Impairment

Bend passwords entered on BendyPass provide a tactile method for user authentication, designed to reduce the vulnerability to attackers and help people with vision impairment to better protect their personal information.

Bend or PIN: Studying Bend Password Authentication with People with Vision Impairment

Findings show bend passwords have learnability and memorability potential as a tactile authentication method for people with vision impairment, and could be faster to enter than PINs, however, BendyPass still has limitations relating to security and usability.

Understanding Authentication Method Use on Mobile Devices by People with Vision Impairment

Most use familiar names and numbers to create memorable passwords, the majority consider fingerprint to be the most secure and accessible user authentication method and PINs the least secure user authentication methods, and insights for designing better authentication methods for people with vision impairment are provided.

Deformable User Interfaces: Using Flexible Electronics for Human Computer Interaction

This work introduces the research on deformable user interfaces by discussing bend gestures as a source of input, presenting the process to rapidly prototype flexible devices, and demonstrating three deformableuser interfaces: bend passwords, bend for mobile games, and bend for vision impaired users.

Vibration-Based Pattern Password Approach for Visually Impaired People

This paper exploits the haptic technology by introducing a vibration-based pattern password approach in which the vibration feedback plays an important role, and shows that the vibration pulses feedback is usable and resistant to shoulder-surfing attacks.

3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items

3D-Auth is a new concept of two-factor authentication based on customizable 3D-printed items that combine two authentication factors in one object that can be recognized by a capacitive touchscreen.

Fabrication of Nāmya: A Bend and Touch-Sensitive Flexible Smartphone-Sized Prototype

In human-computer interaction research, prototypes allow for communicating design ideas and conducting early user studies to understand user experience without developing the actual product. For

Understanding the Design Space of Embodied Passwords based on Muscle Memory

It is found that a movement space of 200 mm × 200 mm is preferred; each context has a perceived level of safety, which—together with the affordances and link to familiarity—influences how the password is performed.

Non-Rigid HCI: A Review of Deformable Interfaces and Input

This review survey shows that deformable input was often used to augment or replace rigid input, particularly on elastic and flexible displays, and provides designers and practitioners with a baseline for designing deformable interfaces and input methodically.



POSTER: Passwords on flexible display devices

An authentication scheme for flexible display devices is presented, its implementation on a flexible display prototype and an ongoing user study evaluating the usability and security of the system are evaluated.

Exploring the design space of graphical passwords on smartphones

This work identifies and highlights interrelations between usability and security characteristics, available design features, and smartphone capabilities, and shows the expressiveness and utility of the design space in the development of graphical passwords schemes by implementing five different existing graphical password schemes on one smartphone platform.

Password entry usability and shoulder surfing susceptibility on different smartphone platforms

The results show significant differences in the usability of password entry (required password entry time, typing accuracy) and susceptibility to shoulder surfing and provide insights for security-aware design of on-screen keyboards and for password composition strategies tailored to entry on smartphones.

Now you see me, now you don't: protecting smartphone authentication from shoulder surfers

The results indicate that switching the sides increases security while authentication speed stays relatively fast (≤ 4 seconds), and insights on accuracy of eyes-free input (as used in XSide) are provided.

Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance

A negative effect on password security could be observed as users fall back to using passwords that are easier to enter on the respective devices as a result of the influence of mobile devices on authentication performance and password composition.

The haptic wheel: design & evaluation of a tactile password system

The design and initial evaluation of a novel haptic device, the haptic wheel, which displays tactons, or structured tactile messages, to enable password entry are presented, revealing that the chosen tactons are easily identifiable and that password entry times are significantly improved compared to previous systems based on haptic authentication.

The secure haptic keypad: a tactile password system

An evaluation of this system shows it outperforms previous interfaces which have used tactile feedback to obfuscate passwords, and is presented as a novel input keypad which uses tactile cues as means to compose a password.

Back-of-device authentication on smartphones

While performance declined, the results show that BoD Shapes can be very fast and that learning effects have an influence on its performance, which indicates that speed improvements can be expected in long-term use.

Smudge Attacks on Smartphone Touch Screens

This paper examines the feasibility of smudge attacks on touch screens for smartphones, and focuses on the Android password pattern, and provides a preliminary analysis of applying the information learned in a smudge attack to guessing an Android passwordpattern.

GesturePIN: using discrete gestures for associating mobile devices

A gesture-based authentication scheme, called GesturePIN, for associating multiple mobile devices, that provides the advantage of being adaptable to any PIN authentication systems.