All articles| All Pictures| All Softwares| All Video| Go home page| Write articles| Upload pictures

Reading number is top 10 articles
17 tweets you know foreigners in the eyes of the United Kingdom from the European Union,
旅游圣地很美丽,那里的WiFi也很危险 - WiFi,旅游
Super cute robot MiP: master tea and bottled water, remote control,
HTC衰落是因没控制好消费预期? - HTC,HTC One M9
Former electronics store in transition: Zhongguancun will be built “Zhongguancun acquisition capital Centre“
外国另类胡子插花艺术走红网络 - 胡子插花
Listing of Twitter! First open up 73%
为了避免闪瞎狗眼,这对情侣发明了一副眼镜 - 太阳镜,眼镜
那些国人追过的日本“神器”,真的有用? - 日货,日本
别叫我修电脑的,做IT我也是够了…… - IT,表情包
Reading number is top 10 pictures
NeedWallpaper11
A man's favorite things1
Soong ching ling's former residence2
恶搞漫画1
你白吃了多少药
为什么别人说你是疯子
A man's favorite things11
Household design comfortable contracted
Beautiful Japanese beauty(漂亮的日本美女)2
Beauty ZhiHuiLin2
Download software ranking
SQL2000 For 4IN1
Boxer's Top ten classic battle8
SP4 for SQL2000
WebService在.NET中的实战应用教学视频 → 第4集
C++编程教程第三版
传奇私服架设教程-chm
虚拟机5.5.3版
I'm come from Beijing1
Tram sex maniac 2 (H) rar bag2
Unix video tutorial6
qq published in(发表于) 2014/6/24 8:36:37 Edit(编辑)
Distorted graphics: more secure screen lock password schemes,

Distorted graphics: more secure screen lock password schemes,

Distorted graphics: safer programme – lock screen screen lock password password password-IT news Distorted graphics: more secure screen lock password scheme

In order to protect the user's financial information and personal privacy, many phones require the user to use a mobile phone, enter a personal identification number, biometric information or a four-digit password. But when they are in a noisy place, this method really work?

"This is not necessarily" from New Jersey, Rutgers University, the Max Planck Institute for Informatics, Germany University of Saarland, and Finland's Helsinki University team of scientists thinks so. According to the consumer reports study released in May, United States last year alone, 3.1 million smart phones were stolen. Most of these phones do not use password protection, only one-third per a user set a four-digit password. Researchers also said that even password-protected mobile phone can "strike"; over the traffic in a noisy environment, of those with ulterior motives are often in overcrowded places, on victim side peep and spotted the victim using the unlock code after they start.

In addition to a personal identification number (PIN code) and a four-digit password, researchers are exploring the possibility of using the touchscreen drawing to replace the former, they refer to this technique as "pantomime" password ". Using this technology, users touch-screen setup password can be a line, a curve, or some other graphic. Equipment this password will be converted to a numeric value. The next time the user only needs to set graphics, you can turn on the device. Usually convert the graphical values need to be as close as possible to the preset value.

As one of the leaders of the project, as both Rutgers University Associate Professor of electrical and computer engineering engineering Janne Lindqvist says, "users can gesture of repetition had set a password, but certainly very difficult for others, because each person's hand features, the above difference in muscles and joints. "Later called" recognition "(recognizer) program will determine the gestures belong to a single user.

In the study, the researchers asked participants to paint a pattern, and then asked them to repeat, and then paint again anew in ten days. Indeed, want accurate paint painted pattern is almost impossible for the first time; and what software will recognize the "extremely similar" graphic. However, the picture how similar they will were recognized, this degree will depend on the requirement for security.

Researchers on June 18, 2014 in the United States, New Hampshire held the International Conference on mobile systems (MobiSys) published research concluded, security gestures both inner complexity and simple operability. "Pantomime" password "combines these two features is because users can easily remember and copy, and thieves are difficult to copy.

The novel idea is still in the development stage, but may not be able to achieve in the next-generation iPhone. However, the hand gesture recognition researchers believe this personalized security mechanisms has led to some interesting results.

With alphanumeric passwords are different, longer or more complex gesture patterns are not necessarily safer than the shorter and simpler patterns.

Gesture patterns usually have the most security features: there are so many turns, like the letters in the signature.

Relatively insecure gesture patterns usually have a small amount of turns. In addition, these will turn more relaxed, and turning point of similar, such as a circle.

In General, participants draw their design gestures password again will be a little more difficult. When they gave the finger to create a password, and then paint again when mistakes they make will be more.




添加到del.icio.us 添加到新浪ViVi 添加到百度搜藏 添加到POCO网摘 添加到天天网摘365Key 添加到和讯网摘 添加到天极网摘 添加到黑米书签 添加到QQ书签 添加到雅虎收藏 添加到奇客发现 diigo it 添加到饭否 添加到飞豆订阅 添加到抓虾收藏 添加到鲜果订阅 digg it 貼到funP 添加到有道阅读 Live Favorites 添加到Newsvine 打印本页 用Email发送本页 在Facebook上分享


Disclaimer Privacy Policy About us Site Map

If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.