Smartphones Editor: Roy Want N Google N [email protected]
Total Page:16
File Type:pdf, Size:1020Kb
Smartphones Editor: Roy Want n Google n [email protected] Personal Touch- Identification Tokens Tam Vu and Marco Gruteser EDITOR’S INTRO pervasive devices. Capacitive touch sensors have emerged as a dominant One of the goals of pervasive computing is the automatic personalization of com- user interface technology for mobile puter infrastructure to create a customized user experience that’s better suited to and pervasive devices. Touch sensors the task at hand. The ideas presented in this article are a significant step toward reside in hundreds of millions of smart- that goal. The authors provide a convenient and accurate mechanism to convey a unique identifier using no more than a signet ring pressed against the capacitive phones and tablets as well as in ATM touchscreen of a computer. It brings to mind the “secret decoder ring” used by the machines, car dashboard displays, and fictional character, Dick Tracy—but this time it’s for real. — Roy Want even home appliances such as televi- sions, microwaves, and refrigerators. Given that touch is the predominant n this emerging era of pervasive com- users and serve age-appropriate con- way of navigating and interacting with I puting, we interact with and rapidly tent and media. Our approach is to use today’s computer-embedded devices, switch among a diverse set of digital a wearable personal token to commu- our approach seeks to identify who devices. We tend to transition from a nicate an identification code through touches a device, which can be more smartphone to a notebook when arriving touch. accurate (or secure) than user-proximity in the office, and when we return home, sensing with short-range radios such as we often switch to a tablet. In between, UseR IDENTIFICATION Bluetooth or NFC. When there are sev- we might use large wall-mounted dis- CHALLENGES eral potential users near a device, one plays, car navigation systems, self- Current user-identification techniques of the most meaningful ways to identify checkout kiosks at retail stores, and are often based on logins and PIN who’s really interacting with the device home security or smart home controls. codes or passwords. The overhead of is to identify who is touching it. Many of these devices—even if only used logging in was more acceptable when in the home—have multiple users. Over we used to sit down for long sessions A TOucH-IDENTIFICATION the next decade, this range of devices will of work in front of a PC, but it now TOKEN likely increase, and our time with any has become a nuisance—to the point We’ve explored how to design a wear- single device will grow shorter. where many users forgo any authentica- able personal token that exploits the We argue that it’s time for touch- tion on their mobile devices. Biometric pervasive capacitive touchscreen and based personal tokens that let devices techniques, such as fingerprint readers touchpad input devices as receivers for unobtrusively identify who is interact- or face recognition, are more resource an identification code or password. Our ing with the device at any given time. intensive and face their own usability current token is in the form of a ring, This would let devices tailor services to challenges. Fingerprint readers require but other devices, such as wristbands users and apply authentication to con- space on a device, add cost, and can be or watches, are also possible. The trol access to sensitive information and difficult to use in low-humidity envi- token transmits electrical signals when online services. Consider, for example, ronments. Face recognition has higher brought in contact with a device’s touch- that a child reportedly spent more than processing requirements and can be dif- screen or when the user’s finger touches $1,000 on in-app purchases while ficult in low-lighting conditions. the screen. In this latter case, the sig- playing games on his mother’s iPhone.1 Our goal has therefore been to find nal is transmitted through the human Devices that know their users could a less obtrusive way to identify users skin. The transmitted electrical signals limit such spending from unauthorized during their regular interactions with from the token essentially spoofs the 10 PERVASIVE computing Published by the IEEE CS n 1536-1268/13/$31.00 © 2013 IEEE PC-12-02-Smartphones.indd 10 3/21/13 10:57 AM device’s touchscreen, mimicking the sig- 1 0110… nals from up and down movements of a Input bit sequence finger, while the finger (or token) itself remains stationary on the device.2 … Transmitter To understand this, consider how a (a hardware token) capacitive touchscreen works.3 It com- On-off keying modulation prises an array of conducting electrodes Electrical pulses behind a transparent insulating glass Channel layer, which form a capacitor with the (touch screen human finger when the user touches the hardware and firmware) screen. The finger is in turn capacitively coupled through the human body (and Artificial touch events sometimes through the ground) to the Receiver Threshold-based demodulation device’s case. A touch can therefore be (software decoder) detected by driving the electrodes with 1 0110 an AC signal to repeatedly charge and bit discharge the capacitor and measure Received bit sequence period the change in capacitance through the change in charge voltage. Where on Figure 1. Modeling the system as a classical communication system that includes a the electrode array this change occurs transmitter, communication channel, and receiver. reveals the location of the touch. Owing to the small capacitance events to receive the originally trans- the same input, generating different involved, a charge integration circuit mitted bit sequence). received bit patterns. For example, the might be necessary. When this change number of touch events registered when in voltage exceeds a certain threshold The transmitter generates elec- a one bit is sent after a long sequence of and meets several other filtering crite- trical pulses that are modulated to zeros is lower than that of a one bit that ria, the screen’s firmware reports the carry the input bit sequence using on- comes after a long sequence of ones. presence of a new touch event to the off keying modulation—that is, a one The variable delay between the trans- device’s operating system, which then bit is represented by turning on the elec- mission of a bit and its reception at the traverses up the software stack to the trical signal, and a zero bit is represented receiver makes it even more challenging application level. As our wearable hard- by switching that signal off. As a result, to demodulate it to retrieve the original ware token comes in contact with the the pattern of the sequence of touch bit sequence. screen, its own AC signal charges and events generated follows the original bit In addition, the channel adds an discharges the capacitor formed with sequence. These events thus can be used unknown delay between the receiver the screen’s electrodes, leading to repet- to reconstruct the originally transmit- and the transmitter due to the unknown itive but irregular touch events captured ted bit sequence on the receiver side— processing delay of the device, which by the touchscreen controller. otherwise unknown to the screen. The depends on the device’s workload. As Our system then exploits this ability software component, acting as the a result, traditional demodulation tech- to generate touch events through elec- receiver, counts the number of touch niques aren’t applicable. Instead, we trical signals to modulate these events events in each bit period to determine devised a two-step process to decode the and communicate a short identification which bit was transmitted. It receives a originally transmitted data: first calibra- code between the token and device. one bit if the number of events appear- tion, then correlation. During offline As Figure 1 shows, the system can be ing in that bit period is greater than a calibration, the software component viewed as a classical communication certain threshold; otherwise, it receives selects a threshold, which is used for bit system with a a zero bit. detection during the correlation phase. The offline calibration step computes • transmitter (a hardware token); Decoding Challenges the expected number of touch events • communication channel (the hard- Because touchscreens weren’t designed when a one bit or zero bit are transmit- ware and firmware of the device’s for communication purposes, and we ted. To determine this number, the step touchscreen, the software stack, and only had operating-system level access must be performed once per device, its operating system); and to the touchscreen hardware, this per data rate, during initialization. The • receiver (the software component approach posed several challenges. The hardware token repeatedly transmits a demodulating the sequence of touch touchscreen responded differently to bit sequence that’s known to the receiver. APRIL–JUNE 2013 PERVASIVE computing 11 PC-12-02-Smartphones.indd 11 3/21/13 10:57 AM SMARTPHONES SMARTPHONES Top view Bottom view Figure 2. A wearable battery-powered hardware token that transmits a short message from the ring to a touchscreen-enabled device. Upon receiving a sequence of touch signals without the hardware token Further improvement in the transmis- events corresponding to that known bit directly contacting the screen. Note sion rate, reliability, and security would sequence, the receiver software synchro- that, in this case, contact times lon- result in immense opportunities to create nizes with the transmitter, then counts ger than a typical touch are required, a unified user identification and authen- the number of touch events in each one but such longer contact times can be tication scheme around personal tokens and zero bit to calculate the average expected during swiping motions.