UNLOCK SECURITY DEVELOPMENT FOR SMART PHONE SECURITY IMPROVEMENT
Abstract
With emergence of new technology, the influence exerted by telephone communication gadgets on our daily lives is increasing. Due to the fact that the information contained on such small gadgets is becoming highly confidential and sensitive. In United States of America alone, over 2012 there were more than 1.6 million thefts of smartphones. And, every year, this number continues to grow. In this situation, the first question that comes to mind about the protection of the personal information. One of the better solutions is the creation of new, or the improvement of the existing blocking systems of smartphones. In this paper, we introduce the keyboared saftety algorithm for improving the static unlock systems for smartphones. The proposed keyboad safety algorithm randomly allocates number in the keyboard that helps protect safety of the keyboard. The proposed algorithm is implented by using real device. Based on the testing result, we confirm the validity of the proposed algorithm.
About the Authors
A. RazaqueKazakhstan
S. T. Amanzholova
Kazakhstan
O. S. Tokanov
Kazakhstan
R. Davletov
Kazakhstan
T. Molutbekov
Kazakhstan
A. Kantselyaristov
Kazakhstan
References
1. Dunnewijk T, Hulten S. A brief history of mobile communication in Europe [J]. Telematics and Informatics, 2007, 24 (3): 164-179.
2. Khan S, Nauman M, Othman A T, et al. How secure is your smartphone: An analysis of smartphone security mechanisms [C] // Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE, 2012: 76-81.
3. Mulliner C., Miller C. Fuzzing the Phone in your Phone [J]. Black Hat USA, June, 2009.
4. Jacob R. J., Karn K. S. Eye tracking in human-computer interaction and usability research: Ready to deliver the promises [J]. Mind, 2003, 2 (3): 4.
5. Abroms L. C., Westmaas J. L., Bontemps-Jones J., et al. A content analysis of popular smartphone apps for smoking cessation [J]. American journal of preventive medicine, 2013, 45 (6): 732-736.
6. Harbach M., De Luca A., Egelman S. The anatomy of smartphone unlocking: A field study of android lock screens [C] // Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2016: 4806-4817.
7. Winkler C., Gugenheimer J., De Luca A., et al. Glass unlock: Enhancing security of smartphone unlocking through leveraging a private near-eye display [C] // Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015: 1407-1410.
8. Lindell A. Y. Attacks on the pairing protocol of bluetooth v2. 1 [J]. Black Hat USA, Las Vegas, Nevada, 2008.
9. Harbach M., Von Zezschwitz E., Fichtner A., et al. It’sa hard lock life: A field study of smartphone (un) locking behavior and risk perception[C]//Symposium on usable privacy and security (SOUPS). 2014: 9-11.
10. Melnyk V. Simultaneous screen unlock and operation initiation: U. S. Patent Application 13/047,358 [P]. 2011-3-14.
11. Minwook N. A., Jongwoo S., Kangsik C., et al. Mobile terminal having a screen operation and operation method thereof: U. S. Patent 9,772,738 [P]. 2017-9-26.
12. Cao K., Jain A. K. Hacking mobile phones using 2D Printed Fingerprints [R]. MSU Technical report, MSU-CSE-16-2, 2016
Review
For citations:
Razaque A., Amanzholova S.T., Tokanov O.S., Davletov R., Molutbekov T., Kantselyaristov A. UNLOCK SECURITY DEVELOPMENT FOR SMART PHONE SECURITY IMPROVEMENT. Herald of the Kazakh-British technical university. 2019;16(3):212-218.