Cargando…

Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedi...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Hyun-Woo, Kim, Jun-Ho, Park, Jong Hyuk, Jeong, Young-Sik
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4151540/
https://www.ncbi.nlm.nih.gov/pubmed/25202737
http://dx.doi.org/10.1155/2014/796515
_version_ 1782333027165143040
author Kim, Hyun-Woo
Kim, Jun-Ho
Park, Jong Hyuk
Jeong, Young-Sik
author_facet Kim, Hyun-Woo
Kim, Jun-Ho
Park, Jong Hyuk
Jeong, Young-Sik
author_sort Kim, Hyun-Woo
collection PubMed
description Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.
format Online
Article
Text
id pubmed-4151540
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41515402014-09-08 Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device Kim, Hyun-Woo Kim, Jun-Ho Park, Jong Hyuk Jeong, Young-Sik ScientificWorldJournal Research Article Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties. Hindawi Publishing Corporation 2014 2014-08-17 /pmc/articles/PMC4151540/ /pubmed/25202737 http://dx.doi.org/10.1155/2014/796515 Text en Copyright © 2014 Hyun-Woo Kim et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Kim, Hyun-Woo
Kim, Jun-Ho
Park, Jong Hyuk
Jeong, Young-Sik
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
title Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
title_full Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
title_fullStr Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
title_full_unstemmed Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
title_short Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
title_sort time pattern locking scheme for secure multimedia contents in human-centric device
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4151540/
https://www.ncbi.nlm.nih.gov/pubmed/25202737
http://dx.doi.org/10.1155/2014/796515
work_keys_str_mv AT kimhyunwoo timepatternlockingschemeforsecuremultimediacontentsinhumancentricdevice
AT kimjunho timepatternlockingschemeforsecuremultimediacontentsinhumancentricdevice
AT parkjonghyuk timepatternlockingschemeforsecuremultimediacontentsinhumancentricdevice
AT jeongyoungsik timepatternlockingschemeforsecuremultimediacontentsinhumancentricdevice