Mitchell et al., 2015 - Google Patents
Cashtags: Protecting the input and display of sensitive dataMitchell et al., 2015
View PDF- Document ID
- 9049491698372518575
- Author
- Mitchell M
- Wang A
- Reiher P
- Publication year
- Publication venue
- 24th USENIX Security Symposium (USENIX Security 15)
External Links
Snippet
Mobile computing is the new norm. As people feel increasingly comfortable computing in public places such as coffee shops and transportation hubs, the threat of exposing sensitive information increases. While solutions exist to guard the communication channels used by …
- 230000002633 protecting 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems adapted for combination with other electrical systems
- H04M11/08—Telephonic communication systems adapted for combination with other electrical systems adapted for optional reception of entertainment or informative matter
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
- H04N7/147—Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10025952B1 (en) | Obfuscation of sensitive human-perceptual output | |
US11593055B2 (en) | Selective screen sharing | |
Do et al. | Is the data on your wearable device secure? An Android Wear smartwatch case study | |
Kim et al. | A new shoulder-surfing resistant password for mobile environments | |
US11082425B2 (en) | Pressure-based authentication | |
Mohsen et al. | Android keylogging threat | |
CN109492412A (en) | The encryption storage method and system of file | |
CN112559987A (en) | Multi-factor authentication via multiple devices | |
Kumar et al. | From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges | |
US20140281549A1 (en) | Methods and apparatus for securing user input in a mobile device | |
CN106203141A (en) | The data processing method of a kind of application and device | |
Vecchiato et al. | The perils of Android security configuration | |
Mueller | Security for Web Developers: Using JavaScript, HTML, and CSS | |
US20150310206A1 (en) | Password management | |
KR101914416B1 (en) | System for providing security service based on cloud computing | |
Yang et al. | Inference attack in android activity based on program fingerprint | |
Cho et al. | Vulnerabilities of android data sharing and malicious application to leaking private information | |
Mitchell et al. | Cashtags: Protecting the input and display of sensitive data | |
Mitchell et al. | Cashtags: Prevent leaking sensitive information through screen display | |
CN106933666B (en) | Method for calling information input program and electronic equipment | |
CN115996140A (en) | Access content acquisition method, device, equipment and storage medium | |
Gangwal et al. | AutoSpill: Credential Leakage from Mobile Password Managers | |
Dhanjani | New age application attacks against apple’s iOS (and countermeasures) | |
Hidhaya et al. | Supplementary event-listener injection attack in smart phones | |
Nomoto et al. | Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers |