Preview

Herald of the Kazakh-British technical university

Advanced search

UNLOCK SECURITY DEVELOPMENT FOR SMART PHONE SECURITY IMPROVEMENT

Abstract

With emergence of new technology, the influence exerted by telephone communication gadgets on our daily lives is increasing. Due to the fact that the information contained on such small gadgets is becoming highly confidential and sensitive. In United States of America alone, over 2012 there were more than 1.6 million thefts of smartphones. And, every year, this number continues to grow. In this situation, the first question that comes to mind about the protection of the personal information. One of the better solutions is the creation of new, or the improvement of the existing blocking systems of smartphones. In this paper, we introduce the keyboared saftety algorithm for improving the static unlock systems for smartphones. The proposed keyboad safety algorithm randomly allocates number in the keyboard that helps protect safety of the keyboard. The proposed algorithm is implented by using real device. Based on the testing result, we confirm the validity of the proposed algorithm.

About the Authors

A. Razaque
International IT University
Kazakhstan


S. T. Amanzholova
International IT University
Kazakhstan


O. S. Tokanov
International IT University
Kazakhstan


R. Davletov
International IT University
Kazakhstan


T. Molutbekov
International IT University
Kazakhstan


A. Kantselyaristov
International IT University
Kazakhstan


References

1. Dunnewijk T, Hulten S. A brief history of mobile communication in Europe [J]. Telematics and Informatics, 2007, 24 (3): 164-179.

2. Khan S, Nauman M, Othman A T, et al. How secure is your smartphone: An analysis of smartphone security mechanisms [C] // Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE, 2012: 76-81.

3. Mulliner C., Miller C. Fuzzing the Phone in your Phone [J]. Black Hat USA, June, 2009.

4. Jacob R. J., Karn K. S. Eye tracking in human-computer interaction and usability research: Ready to deliver the promises [J]. Mind, 2003, 2 (3): 4.

5. Abroms L. C., Westmaas J. L., Bontemps-Jones J., et al. A content analysis of popular smartphone apps for smoking cessation [J]. American journal of preventive medicine, 2013, 45 (6): 732-736.

6. Harbach M., De Luca A., Egelman S. The anatomy of smartphone unlocking: A field study of android lock screens [C] // Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2016: 4806-4817.

7. Winkler C., Gugenheimer J., De Luca A., et al. Glass unlock: Enhancing security of smartphone unlocking through leveraging a private near-eye display [C] // Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015: 1407-1410.

8. Lindell A. Y. Attacks on the pairing protocol of bluetooth v2. 1 [J]. Black Hat USA, Las Vegas, Nevada, 2008.

9. Harbach M., Von Zezschwitz E., Fichtner A., et al. It’sa hard lock life: A field study of smartphone (un) locking behavior and risk perception[C]//Symposium on usable privacy and security (SOUPS). 2014: 9-11.

10. Melnyk V. Simultaneous screen unlock and operation initiation: U. S. Patent Application 13/047,358 [P]. 2011-3-14.

11. Minwook N. A., Jongwoo S., Kangsik C., et al. Mobile terminal having a screen operation and operation method thereof: U. S. Patent 9,772,738 [P]. 2017-9-26.

12. Cao K., Jain A. K. Hacking mobile phones using 2D Printed Fingerprints [R]. MSU Technical report, MSU-CSE-16-2, 2016


Review

For citations:


Razaque A., Amanzholova S.T., Tokanov O.S., Davletov R., Molutbekov T., Kantselyaristov A. UNLOCK SECURITY DEVELOPMENT FOR SMART PHONE SECURITY IMPROVEMENT. Herald of the Kazakh-British technical university. 2019;16(3):212-218.

Views: 272


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)