DOI QR코드

DOI QR Code

Research on Secure Keypads for Mobile Devices with Stretchable Displays

스트레처블 디스플레이가 적용된 모바일 기기의 보안 키패드 연구

  • Dongmin Choi (Div. of General Studies, Chosun Univ)
  • 최동민 (조선대학교 자유전공학부)
  • Received : 2024.03.04
  • Accepted : 2024.04.20
  • Published : 2024.05.31

Abstract

This study proposes a secure keypad structure that can adapt to screen changes in mobile devices equipped with stretchable display. For this purpose, we compared and analyzed the authentication methods applied to current rigid form factor smartphones with those applied to rollable and bendable display based smartphones, which are the previous stages of stretchable display. Based on the results of this analysis, we identified potential user convenience and security safety issues that may arise in the form factor structure for smart wallets, multitasking, screen expansion and media viewing, and gaming and entertainment applications where stretchable displays will be applied, then proposed a security keypad structure for these form factors. Our keypad structure provides enhanced user convenience and security compared to the structures applied in the smartphone environment based on the conventional rigid display form factor and rollable, bendable display form factor.

본 연구는 스트레처블 디스플레이 기술이 적용된 모바일 기기의 화면 변화에 대응 가능한 보안 키패드 구조를 제안하였다. 이를 위해 우리는 현재의 리지드 폼 팩터 기반 스마트폰에 적용된 인증기법들을 스트레처블 디스플레이 기술의 전 단계에 해당하는 롤러블 및 벤더블 디스플레이 기술이 적용된 스마트폰에 적용된 인증기법들과 비교 분석하였다. 이 분석 결과를 바탕으로 우리는 스트레처블 디스플레이가 적용될 모바일 응용제품 규격인 스마트 월렛, 멀티태스킹, 스크린 확장 및 미디어 시청, 게임 및 엔터테인먼트용 폼팩터 구조에서 발생할 수 있는 사용자 편의성 문제와 보안 안전성 문제를 도출하였고 이에 대응하는 보안 키패드 구조를 제안하였다. 제안하는 보안 키패드 구조는 기존의 리지드 디스플레이 기반 폼 팩터 및 롤러블, 벤더블 디스플레이 기반 폼 팩터의 스마트폰 환경에 적용된 구조에 비해 더욱 향상된 사용자 편의성 및 보안 안전성을 제공한다.

Keywords

Acknowledgement

This study was supported by research fund from Chosun University, 2022.

References

  1. https://blog.uplus.co.kr/2149
  2. https://cjh38.tistory.com/entry/%EC%B5%9C%EC%B4%88%EC%9D%98-%EC%8A%A4%EB%A7%88%ED%8A%B8%ED%8F%B0-%EC%8A%A4%EB%A7%88%ED%8A%B8%ED%8F%B0%EC%9D%98-%EC%97%AD%EC%82%AC-%EB%B3%80%EC%B2%9C%EC%82%AC
  3. Seung Hyeog Moon, "A Study on ICT Conversion and Change of Industrial Society", The Journal of the Convergence on Culture Technology (JCCT), Vol 7, No. 4, pp. 653-658, November, 2021. https://doi.org/10.17703/JCCT.2021.7.4.653
  4. Tae-Seung Ko, Byeong-Joo Kim, Jeong-Woo Jwa,"Development of wearable devices and mobile apps for fall detection and health management" International Journal of Advanced Culture Technology, Vol. 11, No. 1, pp. 370-375, 2023. https://doi.org/10.17703/IJACT.2023.11.1.370
  5. https://infogalactic.com/info/Form_factor_(mobile_phones)
  6. https://spectrum.ieee.org/consumerelectronics/portable-devices/from-foldablephones-to-stretchy-screens
  7. https://www.infopulse.com/blog/how-to-enable-secure-authentication-in-mobile-applications/
  8. C. Wang, Y. Wang, Y. Chen, H. Liu & J. Liu., "User authentication on mobile devices: Approaches, threats and trends," Computer Networks, Vol. 120, No. 7, pp. 107118, DOI : 10.1016/j.comnet.2020.107118
  9. E. Miluzzo, A. Varshavsky, S. Balakrishnan & R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, Low Wood Bay : ACM. DOI : 10.1145/2307636.2307666
  10. T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, Valencia : IARIA. DOI : 10.1109/UBICOMM.2008.76
  11. A.J. Aviv, K. Gibson, E. Mossop, M. Blaze & J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceeding of the 4th USENIX Conference on Offensive Technologies, pp. 1-7, Washington : ACM.
  12. Y. Abdelrahman, M. Khamis, S. Schneegass & F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751-3763, Denver : ACM. DOI : 10.1145/3025453.3025461
  13. Cai,L.and Chen H., "Touch Logger:inferring keystrokes on touch screen from smartphone motion," Proceedings of the 6th USENIX Workshop on Hot Topics in Security, pp. 9-9, 2011.
  14. Dongmin Choi, " A Study on the Correlation between Atypical Form Factor-based Smartphones and Display-dependent Authentication Methods," Journal of Korea Multimedia Society, Vol. 24, No. 8, pp. 1076-1089 August 2021. https://doi.org/10.9717/kmms.2021.24.8.1076
  15. https://pc-solucion.es/terminos/shoulder-surfing/
  16. Paul Bekaert, Norah Alotaibi, Florian Mathis, Nina Gerber, Aidan Christopher Rafferty, Mohamed Khamis, and Karola Marky."Are Thermal Attacks a Realistic Threat? Investigating the Preconditions of Thermal Attacks in Users' Daily Lives," In Nordic Human-Computer Interaction Conference (NordiCHI '22), October 8-12, 2022, Aarhus, Denmark. ACM, New York, NY, USA pp. 1-9. https://doi.org/10.1145/3546155.3546706
  17. Do Kyung Kim, Chang Kuk You, "Analysis of Mobile Product Design Applying Stretchable Display(SD) -focused on the expansionary application design structure for 2030 new-media-generation in mobile environment-," vol. 24, no. 2, pp. 33-45, April 2023. DOI : 10.47294/KSBDA.24.2.3