Distinguishing users with capacitive touch communication

T Vu, A Baid, S Gao, M Gruteser, R Howard… - Proceedings of the 18th …, 2012 - dl.acm.org
Proceedings of the 18th annual international conference on Mobile computing …, 2012dl.acm.org
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods
for identifying and authenticating users have become cumbersome and time-consuming. In
this paper, we present a capacitive communication method through which a device can
recognize who is interacting with it. This method exploits the capacitive touchscreens, which
are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies
the user can be generated by a small transmitter embedded into a ring, watch, or other …
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve datarates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果