{"created":"2025-01-19T00:20:49.567267+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00145152","sets":["1164:6389:8234:8324"]},"path":["8324"],"owner":"11","recid":"145152","title":["録画画像を用いた攻撃に耐性を持つパズル型認証方式の一検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-09-18"},"_buckets":{"deposit":"acdcee1e-03f4-4608-a311-ece64cfff510"},"_deposit":{"id":"145152","pid":{"type":"depid","value":"145152","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"録画画像を用いた攻撃に耐性を持つパズル型認証方式の一検討","author_link":["222448","222457","222451","222456","222454","222450","222453","222458","222459","222452","222449","222455"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"録画画像を用いた攻撃に耐性を持つパズル型認証方式の一検討"},{"subitem_title":"A Study of Puzzle Authentication Method with Video Recording Attack Resistance","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"認証とセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2015-09-18","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"宮崎大学"},{"subitem_text_value":"東京工科大学"},{"subitem_text_value":"宮崎大学"},{"subitem_text_value":"宮崎大学"},{"subitem_text_value":"神奈川工科大学"},{"subitem_text_value":"宮崎大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Miyazaki","subitem_text_language":"en"},{"subitem_text_value":"Tokyo University of Technology","subitem_text_language":"en"},{"subitem_text_value":"University of Miyazaki","subitem_text_language":"en"},{"subitem_text_value":"University of Miyazaki","subitem_text_language":"en"},{"subitem_text_value":"Kanagawa Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"University of Miyazaki","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/145152/files/IPSJ-SPT15015004.pdf","label":"IPSJ-SPT15015004.pdf"},"date":[{"dateType":"Available","dateValue":"2017-09-18"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT15015004.pdf","filesize":[{"value":"882.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"78f9e521-39ab-46c1-8683-63df9cd47225","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2015 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"日隈, 光基"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"喜多, 義弘"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山場, 久昭"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"久保田, 真一郎"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"朴, 美娘"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岡崎, 直宜"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Koki, Hinokuma","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshihiro, Kita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hisaaki, Yamaba","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shinichiro, Kubota","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Mirang, Park","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Naonobu, Okazaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在広く使用されている PIN やパスワードなどの携帯端末における認証方式では,覗き見攻撃により認証情報が盗まれ,認証を突破される可能性がある.これに対して,人による覗き見攻撃に耐性を持つ認証方式として,従来のパスワード方式による認証にパズルの要素を組み込み,パスワードを指定した位置に揃える,パズル型認証方式がある.この認証方式の大きな特長として,パズルを解くというゲーム的な要素を持ち楽しく認証できる点が挙げられる.しかし,ランダムな入力により偶然に認証を突破してしまう確率が十分に低く保てないことや,ビデオカメラ等を利用した,認証画面の録画画像を用いた攻撃に対して脆弱であることなどの改善すべき点がある.そこで,本研究では,次の改良を行った.まず,偶然認証突破確率を低減するために,認証時の入力を複数回に分割し入力の候補を増加させた.次に,録画攻撃への耐性を向上させるために,認証に必要な情報の一部は固定せずにその都度端末が選びなおすようにするとともに,その情報のユーザへの伝達が動画に記録されないような提示方法を提案した.そして,提案方式の実装を行い,安全性やユーザビリティの観点から評価を行った結果を示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Currently, user authentication methods such as PINs, passwords and so on, are used to protect important and private data in mobile devices. However, those existing methods are not sufficiently safe against shoulder surfing attacks. Attackers can easily steal PIN codes or passwords. To prevent such attacks, the puzzle authentication method was proposed. In the method, users unlock their devices thorough solving a “puzzle”. A user drags an orb to adjacent positions, and the dragged orb swaps places with the orb already there. The authentication will succeed when all of the orbs corresponding to characters of the password are put into the designated positions. The special feature of this method is that users have fun while they unlock their devices. However, it was also known that the method has several drawbacks. First, the method is not strong enough against brute-force attacks. Next, the correct answer is easily revealed by shooting the authenticated screen using a video camera. In this study, several improvements were made to the method to overcome brute-force attacks and video recording attacks. The improved authentication method was implemented and experiments for evaluation were carried out.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2015-09-18","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"2015-SPT-15"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":145152,"updated":"2025-01-20T18:27:36.053461+00:00","links":{}}