[go: up one dir, main page]

Huang et al., 2021 - Google Patents

Notification privacy protection via unobtrusive gripping hand verification using media sounds

Huang et al., 2021

View PDF
Document ID
16345849851166092232
Author
Huang L
Wang C
Publication year
Publication venue
Proceedings of the 27th Annual International Conference on Mobile Computing and Networking

External Links

Snippet

This work proposes a media sound-based authentication method to protect smartphone notification privacy unobtrusively, which wisely hides or presents sensitive content by verifying who is holding the phone. We show that media sounds, such as the melodies of …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10KSOUND-PRODUCING DEVICES; ACOUSTICS NOT OTHERWISE PROVIDED FOR
    • G10K11/00Methods or devices for transmitting, conducting or directing sound in general; Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
    • G10K11/16Methods or devices for protecting against, or damping of, acoustic waves, e.g. sound
    • G10K11/175Methods or devices for protecting against, or damping of, acoustic waves, e.g. sound using interference effects; Masking sound
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/60Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges including speech amplifiers
    • H04M1/6033Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets

Similar Documents

Publication Publication Date Title
Feng et al. Continuous authentication for voice assistants
Cheng et al. Personal voice assistant security and privacy—a survey
Shi et al. Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors
Gomez-Barrero et al. Biometrics in the Era of COVID-19: Challenges and Opportunities
Lu et al. Lippass: Lip reading-based user authentication on smartphones leveraging acoustic signals
Anand et al. Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
Chen et al. Taprint: Secure text input for commodity smart wristbands
Huang et al. Notification privacy protection via unobtrusive gripping hand verification using media sounds
Li et al. Velody: Nonlinear vibration challenge-response for resilient user authentication
Li et al. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns
Cheng et al. SonarSnoop: active acoustic side-channel attacks: P. Cheng et al.
Zhang et al. VibLive: A continuous liveness detection for secure voice user interface in IoT environment
Anand et al. Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers
Su et al. Towards device independent eavesdropping on telephone conversations with built-in accelerometer
Huang et al. Pcr-auth: Solving authentication puzzle challenge with encoded palm contact response
Zhang et al. Using AI to hack IA: A new stealthy spyware against voice assistance functions in smart phones
Liu et al. SoundID: Securing mobile two-factor authentication via acoustic signals
Chen et al. ChestLive: Fortifying voice-based authentication with chest motion biometric on smart devices
Yang et al. Echolock: Towards low-effort mobile user identification leveraging structure-borne echos
Yang et al. BioCase: Privacy protection via acoustic sensing of finger touches on smartphone case mini-structures
Zhang et al. HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal
Kadena et al. Behavioral Biometrics for more (dis) trust and security
WO2018051950A1 (en) Personal authentication device, personal authentication method, and recording medium
Zhou et al. PrintListener: Uncovering the vulnerability of fingerprint authentication via the finger friction sound
Wu et al. Power saving and secure text input for commodity smart watches