{"title":"Implementation of a Personal Authentication System T-Time","authors":"Gi-Chul Yang, H. Oh","doi":"10.1109/SOCA.2019.00019","DOIUrl":null,"url":null,"abstract":"Currently, the most commonly used personal authentication system for digital deveces use text-based passwords. However, long passwords which increse the security are hard to remember and decrease the usability. Nowadays, alternative systems are used such as graphical password systems and biometrics systems. Each of them has its own problem also. Lost password cannot be replaced in case of biometric system and graphical password systems are weak at shoulder-surfing attacks. This paper describes implementation of a new personal authentication scheme called T-TIME. T-TIME uses touch signal generation time information which is cumbersome to identify by watching.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCA.2019.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, the most commonly used personal authentication system for digital deveces use text-based passwords. However, long passwords which increse the security are hard to remember and decrease the usability. Nowadays, alternative systems are used such as graphical password systems and biometrics systems. Each of them has its own problem also. Lost password cannot be replaced in case of biometric system and graphical password systems are weak at shoulder-surfing attacks. This paper describes implementation of a new personal authentication scheme called T-TIME. T-TIME uses touch signal generation time information which is cumbersome to identify by watching.