DOI QR코드

DOI QR Code

Relative Position Pattern Unlocking Solution based on Blind Interaction on Touch Screen

터치스크린에서의 블라인드 인터랙션 기반의 상대적 위치 패턴 잠금 해제 솔루션

  • 김주웅 (국민대학교 테크노디자인전문대학원 인터랙션디자인 전공) ;
  • 반영환 (국민대학교 테크노디자인전문대학원 인터랙션디자인 전공)
  • Received : 2019.12.17
  • Accepted : 2020.03.20
  • Published : 2020.03.28

Abstract

In this study, we propose a new Relative position pattern unlocking solution based on blind interaction, which is a new unlocking method, and compared it with existing unlocking methods to verify usability and security improvement. And verified the practical value of the proposed new unlocking solution. The relative position pattern unlock method is easily remembered than the numeric code method and is worth practical enough to show a degree of learning ease similar to the drawing pattern method. The new method is safer to steal than other two methods. It can be manufactured at a low cost and can also be used by special users such as blind people. Therefore, the practical value is relatively high.

본 연구에서는 현존하고 있는 잠금 해제 방식에서 보이는 문제점으로부터 출발해 보안성 및 사용성 측면에서 개선된 블라인드 인터랙션을 적용한 상대적 위치 기반 패턴 잠금 해제 방식을 제안하고 이론적 타당성을 고찰했다. 기존 숫자암호 잠금 해제 방식과 패턴 그리기 잠금 해제 방식과의 차이를 실험을 통해 확인하고 실용적 가치를 평가했다. 상대적 위치 패턴은 숫자 암호 보다 쉽게 기억되고 그리기 패턴과 비슷한 정도의 학습 용이성을 보여 주었고 타 방식에 비해 훔쳐보기 공격에 안전한 결과를 얻었다. 생체신호를 센싱 할 센싱 모듈을 사용할 필요 없이 터치스크린의 기본기능만으로 실현 가능하기에 적은 원가로 제작할 수 있다. 시각적 요소가 필요 없는 방식이기에 시각 장애인과 같은 특수 사용자들도 불편함 없이 사용할 수 있기에 실용적 가치도 상대적으로 높다.

Keywords

References

  1. K. P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. Tai, J. Cook & E. E. Schultz. (2007). Password Security and Memorability to Protect Personal and Organizational Information. International Journal of Human-Computer Studies, 65(8), 744-757. https://doi.org/10.1016/j.ijhcs.2007.03.007
  2. A. S. Brown, E. Bracken, S. Zoccoli & K. Douglas. (2004). Generating and remembering passwords. Applied Cognitive Psychology, 18(6), 641-651. https://doi.org/10.1002/acp.1014
  3. R. Biddle. S. Chiasson & P. C. Van Oorschot. (2012). Graphical passwords: Learning from the first twelve years. ACM Computing Surveys, 44(4), 1-41.
  4. L. Standing, J. Conezio & R. N. Haber. (1970). Perception and Memory for Pictures: Single-trial Learning of 2500 Visual Stimuli. Psychonomic Science, 19(2), 73-74. https://doi.org/10.3758/BF03337426
  5. S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot & R. Biddle. (2009). Multiple Password Interference in Text Passwords and Click-based Graphical Passwords. CCS'09, (pp. 500-511). New York : ACM.
  6. B. Kirkpatrick. (1894). An experimental study of memory. Psychological Review, 1, 602-609. https://doi.org/10.1037/h0068244
  7. S. Madigan. (1983). Picture memory. Essays in Honor of Allan Paivio, chapter3, (pp. 65-89). Hillsdale : Lawrence Erlbaum Associates.
  8. A. Paivio, T. Rogers & P. C. Smythe. (1968). Why are pictures easier to recall than words?. Psychonomic Science, 11, 137-138. https://doi.org/10.3758/BF03331011
  9. R. Shepard. (1967). Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior, 6, 156-163. https://doi.org/10.1016/S0022-5371(67)80067-7
  10. G. H. Bower, M. B. Karlin & A. Dueck (1975). Comprehension and memory for pictures. Memory and Cognition, 3, 216-220. https://doi.org/10.3758/BF03212900
  11. L. Standing. (1973). Learning 10,000 pictures. Quarterly Journal of Experimental Psychology, 25, 207-222. https://doi.org/10.1080/14640747308400340
  12. E. Von Zezschwitz, A. De Luca, P. Janssen & H. Hussmann. (2015). Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns. CHI '15, (pp. 2339-2342). New York : ACM.
  13. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze & J.M. Smith. (2010). Smudge attacks on smartphone touch screens. WOOT'10, USENIX, (pp. 2339-2342). CA : Association Berkeley.
  14. Z. X. Jin & Y. H. Pan. (2016). A Taxonomy of Uninterpretable Interactions from Interaction Design Perspective. Journal of the Ergonomic Society of Korea, 52(1), 53-65. DOI : 10.5143/JESK.2016.35.1.53
  15. L. Tao. (2018). Interaction Design Language. Beijing : Tsinghua University Press.
  16. K. Kim & J. H. Kim. (2018). A Development of an Low Cost Smart Parcel Service System with Enhanced Security. Journal of Convergence for Information Technology, 8(6), 193-199. DOI : 10.22156/CS4SMB.2018.8.6.193
  17. S. Hong. (2019). Security Vulnerability and Countermeasure on 5G Networks : Survey. Journal of Digital Convergence, 17(12), 197-202. https://doi.org/10.14400/JDC.2019.17.12.197
  18. S. Hong. (2018). Research on Security Model and Requirements for Fog Computing : Survey. Journal of the Korea Convergence Society, 9(5), 27-32. https://doi.org/10.15207/JKCS.2018.9.5.027