Personal touch-identification tokens

Tam Vu, Marco Gruteser

Research output: Contribution to journalReview articlepeer-review

5 Scopus citations

Abstract

Current user-identification techniques are often based on logins and PIN codes or passwords. The overhead of logging in was more acceptable when researchers used to sit down for long sessions of work in front of a PC, but it now has become a nuisance to the point where many users forgo any authentication on their mobile devices. Biometric techniques, such as fingerprint readers or face recognition, are more resource intensive and face their own usability challenges. The token transmits electrical signals when brought in contact with a device's touchscreen or when the user's finger touches the screen. In this latter case, the signal is transmitted through the human skin. Upon receiving a sequence of touch events corresponding to that known bit sequence, the receiver software synchronizes with the transmitter, then counts the number of touch events in each one and zero bit to calculate the average number of expected events in each.

Original languageEnglish (US)
Article number6504854
Pages (from-to)10-13
Number of pages4
JournalIEEE Pervasive Computing
Volume12
Issue number2
DOIs
StatePublished - Apr 2013

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Personal touch-identification tokens'. Together they form a unique fingerprint.

Cite this