Smartphone Fingerprint Authentication versus PINs: A Usability Study (CMU-CyLab-14-012)
نویسندگان
چکیده
Today’s smartphones store a variety of sensitive information and provide access to sensitive functionality. Despite an abundance of features to secure one’s phone, many users leave their devices unprotected putting themselves and their organizations at risk. Over the past year, several vendors have started to offer fingerprinting functionality in an effort to increase the number of people who protect their phones. We present the results of a study conducted to determine whether fingerprint-based authentication functionality is likely to gain greater levels of adoption than today’s PIN-based solutions. Our study utilizes a task-based method in which participants complete a set of ten tasks. The study compares the usability of Apple’s iPhone 5S Touch ID fingerprint-based authentication with more traditional PIN-based authentication. Our results suggest that, from a usability standpoint, fingerprint-based authentication is better than PIN-based authentication and could contribute to reduce the dismal number of people who do not have locking functionality in place to protect access to their phones.
منابع مشابه
Smartphone Fingerprint Authentication versus PINs: A Usability Study
Today’s smartphones store a variety of sensitive information and provide access to sensitive functionality. Despite an abundance of features to secure one’s phone, many users leave their devices unprotected putting themselves and their organizations at risk. Over the past year, several vendors have started to offer fingerprinting functionality in an effort to increase the number of people who p...
متن کاملBehavioral Biometrics for Smartphone User Authentication
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...
متن کاملAuthentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and ...
متن کاملUse the Force: Evaluating Force-Sensitive Authentication for Mobile Devices
Modern, off-the-shelf smartphones provide a rich set of possible touchscreen interactions, but knowledge-based authentication schemes still rely on simple digit or character input. Previous studies examined the shortcomings of such schemes based on unlock patterns, PINs, and passcodes. In this paper, we propose to integrate pressure-sensitive touchscreen interactions into knowledge-based authen...
متن کاملA Comparative Usability Study of Two-Factor Authentication
Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an explorato...
متن کامل