• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on user authentication systems for mobile terminals that could counter the threats depending on usage situations

Research Project

Project/Area Number 26540055
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionThe University of Electro-Communications

Principal Investigator

Takada Tetsuji  電気通信大学, 大学院情報理工学研究科, 准教授 (70415701)

Project Period (FY) 2014-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2016: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2015: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2014: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
KeywordsUser authentication / Usable security / Mobile system / Shoulder surfing attack / 個人認証 / ユーザビリティ / 自己制御性 / 利用可能性 / 携帯端末 / ユーザインタフェース / 覗き見攻撃 / 画像認証
Outline of Final Research Achievements

Since a mobile terminal is always carried and used in various situations, assumed threats in a use of the mobile terminal are also changed depending on the context. Therefore, a user authentication in mobile terminals, as a basic security function of them, should be flexible according to the situations and threats.
In this research,We worked on developing user authentication systems that could contribute to the above goal. The research results are as follows.
1) Image-based user authentication system that can flexibly configure a providable security level without changing a user credential, 2) a user authentication method with a time-limited password that is defined using a "time-period based rule" for life-log based data, 3) credential input schemes that could make it hard to steal a credential data by a shoulder surfing attack by using vibration information and pressure input, 4) Proposal a scheme of an availability control of a user authentication by users themselves.

Report

(5 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (12 results)

All 2017 2016 2015 2014

All Journal Article (2 results) (of which Peer Reviewed: 2 results,  Acknowledgement Compliant: 1 results) Presentation (10 results) (of which Int'l Joint Research: 2 results)

  • [Journal Article] 秘密情報を変更せずに提供しうる安全性を柔軟に変更可能な再認式画像認証の提案2017

    • Author(s)
      森康洋,高田哲司
    • Journal Title

      情報処理学会論文誌

      Volume: 57 Pages: 2641-2653

    • NAID

      170000131122

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] CCC:携帯端末での暗証番号認証における振動機能を応用した覗き見攻撃対策手法2015

    • Author(s)
      石塚正也,高田哲司
    • Journal Title

      情報処理学会論文誌

      Volume: 56 Pages: 1877-1888

    • NAID

      170000130730

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Presentation] 携帯端末における画面押し込み圧力を用いた多値離散値入力の可能性検証2017

    • Author(s)
      荻野貴大
    • Organizer
      インタラクション
    • Place of Presentation
      明治大学(東京都中野区)
    • Year and Date
      2017-03-02
    • Related Report
      2016 Research-status Report
  • [Presentation] Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control2017

    • Author(s)
      Tetsuji Takada
    • Organizer
      12th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2017)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 1つの秘密情報で複数の安全性を提供しうる個人認証2016

    • Author(s)
      高田哲司
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      秋田キャッスルホテル(秋田県秋田市)
    • Year and Date
      2016-10-11
    • Related Report
      2016 Research-status Report
  • [Presentation] 圧力を利用した個人認証の提案2016

    • Author(s)
      荻野貴大
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      秋田キャッスルホテル(秋田県秋田市)
    • Year and Date
      2016-10-11
    • Related Report
      2016 Research-status Report
  • [Presentation] 回答候補画像の追加と正解画像の集中配置による再認式画像認証の安全性改善と操作負担抑制2015

    • Author(s)
      高田哲司
    • Organizer
      コンピュータセキュリティシンポジウム2015
    • Place of Presentation
      Nagasaki, Japan
    • Year and Date
      2015-10-22
    • Related Report
      2015 Research-status Report
  • [Presentation] Chameleon Dial: Repeated Camera-recording Attack Resilient PIN input scheme2015

    • Author(s)
      Tetsuji Takada
    • Organizer
      ACM Int'l Joint Conf. on Pervasive and Ubiquitous Computing
    • Place of Presentation
      Osaka, Japan
    • Year and Date
      2015-09-09
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] スクロールとスライド操作による携帯端末向け個人認証2015

    • Author(s)
      森康洋、高田哲司
    • Organizer
      インタラクション2015
    • Place of Presentation
      日本科学未来館/国際交流館
    • Year and Date
      2015-03-05 – 2015-03-07
    • Related Report
      2014 Research-status Report
  • [Presentation] 個人認証のパーソナライズ化を目指した規則ベース個人認証の提案2014

    • Author(s)
      高浪悟、高田哲司
    • Organizer
      コンピュータセキュリティシンポジウム2014 (CSS 2014)
    • Place of Presentation
      札幌コンベンションセンター
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] 選択と並べ替えによる個人認証手法の提案2014

    • Author(s)
      森康洋、高田哲司
    • Organizer
      コンピュータセキュリティシンポジウム2014 (CSS 2014)
    • Place of Presentation
      札幌コンベンションセンター
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] Authentication Shutter: 個人認証における攻撃を遮断可能にする対策の提案2014

    • Author(s)
      高田哲司
    • Organizer
      コンピュータセキュリティシンポジウム2014 (CSS 2014)
    • Place of Presentation
      札幌コンベンションセンター
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi