Huang et al., 2021 - Google Patents
Notification privacy protection via unobtrusive gripping hand verification using media soundsHuang et al., 2021
View PDF- Document ID
- 16345849851166092232
- Author
- Huang L
- Wang C
- Publication year
- Publication venue
- Proceedings of the 27th Annual International Conference on Mobile Computing and Networking
External Links
Snippet
This work proposes a media sound-based authentication method to protect smartphone notification privacy unobtrusively, which wisely hides or presents sensitive content by verifying who is holding the phone. We show that media sounds, such as the melodies of …
- 230000004224 protection 0 title description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10K—SOUND-PRODUCING DEVICES; ACOUSTICS NOT OTHERWISE PROVIDED FOR
- G10K11/00—Methods or devices for transmitting, conducting or directing sound in general; Methods or devices for protecting against, or for damping, noise or other acoustic waves in general
- G10K11/16—Methods or devices for protecting against, or damping of, acoustic waves, e.g. sound
- G10K11/175—Methods or devices for protecting against, or damping of, acoustic waves, e.g. sound using interference effects; Masking sound
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/60—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges including speech amplifiers
- H04M1/6033—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Feng et al. | Continuous authentication for voice assistants | |
| Cheng et al. | Personal voice assistant security and privacy—a survey | |
| Shi et al. | Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors | |
| Gomez-Barrero et al. | Biometrics in the Era of COVID-19: Challenges and Opportunities | |
| Lu et al. | Lippass: Lip reading-based user authentication on smartphones leveraging acoustic signals | |
| Anand et al. | Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers | |
| Chen et al. | Taprint: Secure text input for commodity smart wristbands | |
| Huang et al. | Notification privacy protection via unobtrusive gripping hand verification using media sounds | |
| Li et al. | Velody: Nonlinear vibration challenge-response for resilient user authentication | |
| Li et al. | Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns | |
| Cheng et al. | SonarSnoop: active acoustic side-channel attacks: P. Cheng et al. | |
| Zhang et al. | VibLive: A continuous liveness detection for secure voice user interface in IoT environment | |
| Anand et al. | Spearphone: A speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers | |
| Su et al. | Towards device independent eavesdropping on telephone conversations with built-in accelerometer | |
| Huang et al. | Pcr-auth: Solving authentication puzzle challenge with encoded palm contact response | |
| Zhang et al. | Using AI to hack IA: A new stealthy spyware against voice assistance functions in smart phones | |
| Liu et al. | SoundID: Securing mobile two-factor authentication via acoustic signals | |
| Chen et al. | ChestLive: Fortifying voice-based authentication with chest motion biometric on smart devices | |
| Yang et al. | Echolock: Towards low-effort mobile user identification leveraging structure-borne echos | |
| Yang et al. | BioCase: Privacy protection via acoustic sensing of finger touches on smartphone case mini-structures | |
| Zhang et al. | HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal | |
| Kadena et al. | Behavioral Biometrics for more (dis) trust and security | |
| WO2018051950A1 (en) | Personal authentication device, personal authentication method, and recording medium | |
| Zhou et al. | PrintListener: Uncovering the vulnerability of fingerprint authentication via the finger friction sound | |
| Wu et al. | Power saving and secure text input for commodity smart watches |