{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00083104","sets":["1164:6389:6784:6830"]},"path":["6830"],"owner":"11","recid":"83104","title":["モバイル端末のロック解除向けパターン認証の安全性評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-07-12"},"_buckets":{"deposit":"b442fd83-6667-4236-80e4-e7255f05d14d"},"_deposit":{"id":"83104","pid":{"type":"depid","value":"83104","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"モバイル端末のロック解除向けパターン認証の安全性評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"モバイル端末のロック解除向けパターン認証の安全性評価"},{"subitem_title":"Security Analysis of Pattern Authentication on Smartphone","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2012-07-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社KDDI研究所"},{"subitem_text_value":"株式会社KDDI研究所"},{"subitem_text_value":"株式会社KDDI研究所"},{"subitem_text_value":"株式会社KDDI研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"KDDI R&D Laboratories Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories Inc.","subitem_text_language":"en"},{"subitem_text_value":"KDDI R&D Laboratories Inc.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/83104/files/IPSJ-SPT12004041.pdf"},"date":[{"dateType":"Available","dateValue":"2014-07-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT12004041.pdf","filesize":[{"value":"188.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"0a0f2d56-0f98-4bc7-b6e9-4407b659e000","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"石黒, 司"},{"creatorName":"福島, 和英"},{"creatorName":"清本, 晋作"},{"creatorName":"三宅, 優"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tsukasa, Ishiguro","creatorNameLang":"en"},{"creatorName":"Kazuhide, Fukushima","creatorNameLang":"en"},{"creatorName":"Shinsaku, Kiyomoto","creatorNameLang":"en"},{"creatorName":"Yutaka, Miyake","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"現在,本人認証方式としてパターン認証があり,Android 等のスマートフォンで広く使われている.パターン認証とは指の軌跡を入力とし,本人を認証する方式である.この方式はユーザビリティの高さと実現の容易性から広く受け入れられているが,安全性に関する十分な解析はなされていない.そこで,本稿ではパターン認証のモデルを定義し,現在使われているパターンルールと,ルールを変えた場合の安全性について解析する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Pattern authentication is a motion-based user authentication method where a user traces dots on a screen with his/her finger and it has been widely used for a unlock function on smart phones. The pattern authentication is user-friendly and easy to implement in smart phones; however, the security analysis of the pattern authentication is not sufficient in comparison with security analyses of other user authentication methods. In this paper, we model the pattern authentication, and then we explain the security analysis of the pattern authentication with basic and relaxed rules for patterns.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2012-07-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"41","bibliographicVolumeNumber":"2012-SPT-4"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":83104,"updated":"2025-01-21T18:45:42.521097+00:00","links":{},"created":"2025-01-18T23:36:42.203825+00:00"}