Distinguishing users with capacitive touch communication

@inproceedings{Vu2012DistinguishingUW,
  title={Distinguishing users with capacitive touch communication},
  author={Tam N. Vu and Akash Baid and Simon Gao and Marco Gruteser and Richard E. Howard and Janne Lindqvist and Predrag Spasojevic and Jeffrey Sean Walling},
  booktitle={Mobicom '12},
  year={2012}
}
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter… 
Through-body Capacitive Touch Communication
TLDR
This paper presents for the first time the indirect method of capacitive touch communication that allows the users to transmit their information from the wearable devices to the touch-enabled devices using human body as a medium.
Biometric Touch Sensing: Seamlessly Augmenting Each Touch with Continuous Authentication
Current touch devices separate user authentication from regular interaction, for example by displaying modal login screens before device usage or prompting for in-app passwords, which interrupts the
Touch-to-Access Device Authentication For Indoor Smart Objects
TLDR
Compared with the existing approaches including intra-body communication and physiological sensing, TouchAuth is a low-cost, faster, and easy-to-use approach for authorized users to access the smart objects found in indoor environments.
Continuous Authentication for Voice Assistants
TLDR
VAuth is the first system that provides continuous authentication for voice assistants, designed to fit in widely-adopted wearable devices, where it collects body-surface vibrations of the user and matches it with the speech signal received by the voice assistant's microphone.
Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials
TLDR
Compared with existing approaches including intra-body communication and physiological sensing, TouchAuth is a low-cost, lightweight, and convenient approach for authorized users to access the smart objects found in indoor environments.
A wearable system that knows who wears it
TLDR
This paper presents a wearable system that unobtrusively recognizes the person wearing it, and demonstrates that this system continues to recognize a subset of these subjects even several months later.
Body-Guided Communications: A Low-power, Highly-Confined Primitive to Track and Secure Every Touch
TLDR
A body-guided communication mechanism to secure every touch when users interact with a variety of devices and objects is proposed, implemented in a hardware token worn on user's body, for example in the form of a wristband, which interacts with a receiver embedded inside the touched device through a body- guided channel established when the user touches the device.
Integrated Transparent NFC Antennas on Touch Displays
TLDR
A novel user interface is described that utilizes an integrated transparent NFC (Near Field Communication) antenna on a touch display that allows the user to interact directly and intuitively with digital information through the display.
User authentication and identification on smartphones by incorporating capacitive touchscreen
TLDR
This work develops a biometric authentication and identification system which uses the capacitive touchscreen that is featured in all current smartphones and achieves the maximum authentication accuracy and maxinum identification accuracy.
Enabling on-body transmissions with commodity devices
TLDR
It is shown for the first time that commodity input devices such as fingerprint sensors and touchpads can be used to generate wireless data transmissions that are confined to the human body.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 52 REFERENCES
The IR ring: authenticating users' touches on a multi-touch display
TLDR
This work explores means to associate the touches of a user with the user's identity in a fashion that is cryptographically sound as well as easy to use, which relies on a ring-like device that transmits a continuous pseudorandom bit sequence in the form of infrared light pulses.
DiamondTouch: a multi-user touch technology
TLDR
A technique for creating a touch-sensitive input device which allows multiple, simultaneous users to interact in an intuitive fashion and results obtained with a small prototype device are presented.
Mobile token-based authentication on a budget
TLDR
Two approaches to contactless authentication are proposed: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone.
Mobile Device Security Using Transient Authentication
TLDR
This work shows how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep, and shows this is done without inconveniencing the user, while imposing a minimal performance overhead.
On the need for different security methods on mobile phones
TLDR
A two-level security model for mobile phones is proposed, which provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.
Touché: enhancing touch interaction on humans, screens, liquids, and everyday objects
TLDR
The rich capabilities of Touché are demonstrated with five example setups from different application domains and experimental studies that show gesture classification accuracies of 99% are achievable with the technology.
Manual authentication for wireless devices
Manual authentication techniques have been designed to enable wireless devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer of data between the
A closer look at recognition-based graphical passwords on mobile devices
TLDR
A novel yet simple solution to the intersection attack that permits greater variability in login challenges; detailed analysis of the shoulder surfing threat that considers both simulated and human testing; and a first look at image processing techniques to contribute towards automated photograph filtering are produced.
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
TLDR
Two concrete methods are presented, ShaVe and ShaCK, in which sensing and analysis of shaking movement is combined with cryptographic protocols for secure authentication, which are based on initial key exchange followed by exchange and comparison of sensor data for verification of key authenticity.
User evaluation of lightweight user authentication with a single tri-axis accelerometer
TLDR
A series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer shows that uWave achieves high recognition accuracy and its usability is comparable with text ID-based authentication.
...
1
2
3
4
5
...