Due to the rapid development of touch screens, smart devices have become immensely popular. Different smart devices, such as digital cameras, televisions, door-lock systems, tablet PCs, and smart phones, now have touch screens. Many functions on which people depend are built into such smart devices, and people may now use their smart phones to perform the same tasks they once carried out on desktop PCs. Therefore, touch screens have become popular due to the convenience and ease of use that they offer to users. However, the development of software application programs for popular smart devices focuses on providing diverse functions, therefore creating a risk of personal information leakage. In addition, portability is one of the advantages of smart devices; however, this also means that they may be lost, which is one of their disadvantages. Consequently, different lock functions have been created for information protection. Such lock functions include a different screen being displayed without a security function, a personal identification number (PIN) function, an existing button method, and pattern lock. However, PIN and pattern lock are very vulnerable to shoulder surfing or smudge attack. In this paper, the researcher proposes One Push out Free (OPOF), a function that provides users with an intuitive and easy interface and heightened security for their smart devices. Under OPOF, the pattern that a user input for the lock screen is perceived in different ways. This reduces the risk element for the pattern to be leaked by a third party’s unlocking of the locked screen, and when the pattern is incorrectly input, another input mode is provided, heightening security and providing convenience through a simple interface.
[1]
Christopher J. Alberts,et al.
Managing Information Security Risks: The OCTAVE Approach
,
2002
.
[2]
Qun Jin,et al.
A human-centric integrated approach to web information search and sharing
,
2011,
Human-centric Computing and Information Sciences.
[3]
Sandeep K. Singh,et al.
A Novel Approach for Deriving Test Scenarios and Test Cases from Events
,
2012,
J. Inf. Process. Syst..
[4]
Pavel Laskov,et al.
Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings
,
2022,
International Conference on Detection of intrusions and malware, and vulnerability assessment.
[5]
Mun-Kyu Lee,et al.
Shoulder-Surfing Resistant Password Input Method for Mobile Environment
,
2010,
Inscrypt 2010.
[6]
Giovanni Vigna,et al.
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
,
2006,
DIMVA.